tor-commits
Threads by month
- ----- 2025 -----
- June
- May
- April
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
April 2018
- 17 participants
- 1638 discussions

[translation-tools/master] Adding support-miscellaneous and _completed
by colin@torproject.org 09 Apr '18
by colin@torproject.org 09 Apr '18
09 Apr '18
commit 712f30c0d56ad33a11dd6bf04a3d95a40fe292ea
Author: Colin Childs <colin(a)torproject.org>
Date: Mon Apr 9 18:33:54 2018 -0500
Adding support-miscellaneous and _completed
---
config | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/config b/config
index 0f262d8..117e244 100644
--- a/config
+++ b/config
@@ -38,7 +38,8 @@ tails-greeter-2 tails-greeter-2_completed exoneratorproperties
exoneratorproperties_completed tor-browser-manual
tor-browser-manual_completed support-censorship support-censorship_completed
support-connecting support-connecting_completed support-faq support-faq_completed
-support-gettor support-gettor_completed support-https support-https_completed"
+support-gettor support-gettor_completed support-https support-https_completed
+support-miscellaneous support-miscellaneous_completed"
PIDFILE=/srv/translation.torproject.org/run/update_translations.pid
1
0

[translation/support-miscellaneous_completed] pulling translations from transifex
by translation@torproject.org 09 Apr '18
by translation@torproject.org 09 Apr '18
09 Apr '18
commit ddc07718cdb5131bd69a02d05e9cc6946dd3338a
Author: Translation commit bot <translation(a)torproject.org>
Date: Mon Apr 9 23:33:17 2018 +0000
pulling translations from transifex
---
es.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
fr.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
id.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
support-miscellaneous.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
zh_CN.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
5 files changed, 460 insertions(+)
diff --git a/es.json b/es.json
new file mode 100644
index 000000000..75836d7aa
--- /dev/null
+++ b/es.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "Tengo una razón imperiosa para trazar a un usuario de Tor. ¿Me puede ayudar?",
+ "description": "<p class=\"mb-3\">No hay nada que los desarrolladores de Tor puedan hacer para trazar a los usuarios de Tor. Las mismas protecciones que evitan que indeseables rompan el anonimato de Tor nos impiden a nosotros rastrear usuarios.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "¿Por qué no evitan que gente indeseable haga maldades cuando usa Tor?",
+ "description": "<p class=\"mb-3\">Tor está diseñado para defender los derechos humanos y la privacidad evitando que cualquiera censure cosas, incluso nosotros. Aborrecemos que haya algunas personas que usen Tor para hacer cosas terribles, pero no podemos hacer nada para librarnos de ellos sin socavar también los activistas pro derechos humanos, periodistas, supervivientes de abuso, y otras personas que usan Tor para cosas buenas. Si queremos evitar que ciertas personas usen Tor, básicamente estaríamos añadiendo una puerta trasera al software, lo que dejaría vulnerables a nuestros usuarios a ataques de regímenes opresivos y otros adversarios.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "¿Quién financia Tor?",
+ "description": "<p class=\"mb-3\">Tor está financiado por varios patrocinadores distintos, incluyendo agencias federales de EEUU, fundaciones privadas, y donantes individuales. Revise la lista completa de <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">nuestros patrocinadores</a></mark> y una serie de <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">artículos del blog</a></mark> sobre nuestros informes financieros.</p><p class=\"mb-3\">Sentimos que hablar abiertamente sobre quienes nos financian y nuestro modelo de financiación es la mejor forma de mantener la confianza con nuestra comunidad. Siempre estamos buscando más diversidad para nuestras fuentes de financiación, especialmente desde fundaciones y personas a título individual.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "¿Puedo usar Tor con bittorrent?",
+ "description": "<p class=\"mb-3\">No recomendamos usar Tor con bittorrent. Para más detalles lee nuestro <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">artículo del blog sobre este tema</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "¡Los archivos de mi equipo han sido bloqueados, y alguien me está exigiendo que descargue el Navegador Tor para pagar un rescate por mis archivos!",
+ "description": "<p class=\"mb-3\">Lo sentimos mucho, pero ha sido infectado por malware. The Tor Project no ha creado este malware. Los autores de este malware le están urgiendo a que descargue el Navegador Tor presumiblemente para que contacte con ellos de forma anónima con el rescate que le están exigiendo. Si este es su primer contacto con el Navegador Tor, entendemos que pueda pensar que somos unos indeseables que facultamos a gente todavía más indeseable. Pero, por favor, considere que nuestro software es usado cada día por una amplia variedad de propósitos por activistas pro derechos humanos, periodistas, supervivientes de violencia doméstica, informantes, agentes de la ley, y muchos otros. Desafortunadamente, la protección que puede proporcionar nuestro software a estos grupos de personas también puede ser abusada por criminales y autores de malware. The Tor Project no apoya ni excusa el uso de nuestro software para propósitos maliciosos.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "¿Tor conserva registros?",
+ "description": "<p class=\"mb-3\">Tor no conserva ningún registro que pueda identificar a un usuario concreto. Tomamos algunas mediciones seguras acerca de cómo funciona la red, que puede revisar en <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "¿Tor Project ofrece servicio de correo electrónico u otros servicios web protectores de la privacidad?",
+ "description": "<p class=\"mb-3\">No, no proporcionamos ningún servicio en línea. Puedes leer una lista de todos nuestros proyectos de software en la <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">página de nuestro proyecto</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "¿Puedo usar el logotipo de Tor en mi producto?",
+ "description": "<p class=\"mb-3\">Puedes leer todo lo relacionado con eso en nuestra <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">página de preguntas frecuentes sobre marca registrada</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "Estoy teniendo un problema actualizando o usando Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia ya no es mantenido ni está soportado. Una gran porción de las características que ofrecía Vidalia ahora están integradas en el propio Navegador Tor.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "¿Tor Project ofrece alojamiento?",
+ "description": "<p class=\"mb-3\">No, Tor Project no ofrece servicios de alojamiento.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "¿Puedo cambiar el número de saltos que usa Tor?",
+ "description": "<p class=\"mb-3\">Ahora mismo la longitud de la ruta está internamente codificada en 3 más el número de nodos en tu ruta que sean sensibles. Esto en casos normales es 3, pero por ejemplo, si estás accediendo a un servicio onion o a una dirección \".exit\" podrían ser más.</p><p class=\"mb-3\"No queremos animar a que la gente use rutas más largas que esta, ya que incrementaría la carga de la red sin (hasta donde podemos decir) proporcionar más seguridad. Además, usar rutas más largas que 3 podría dañar el anonimato, en primer lugar, porque facilita los ataques de <mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denegación de seguridad</a></mark>, y en segundo, porque podría actuar como un identificador si sólo un pequeño número de usuarios tiene la misma longitud de ruta que tú.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "¿Cómo puedo compartir ficheros anónimamente a través de Tor?",
+ "description": "<p class=\"mb-3\">Muchos nodos de salida están configurados para bloquear ciertos tipos de tráfico de compartición de ficheros, como bittorrent. Específicamente bittorrent <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">no es anónimo sobre Tor</a></mark>.</p><p class=\"mb-3\">Para compartición de ficheros a través de Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> es una buena opción.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "¿Puedo usar una VPN con Tor?",
+ "description": "<p class=\"mb-3\">En términos generales, no recomendamos usar una VPN con Tor a menos que seas un usuario avanzado que sabe cómo configurar ambos de forma que no comprometa su privacidad. Puedes encontrar más información detallada sobre Tor + VPN en <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">nuestro wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "¿Cómo puedo ofrecerme voluntario para Tor Project?",
+ "description": "<p class=\"mb-3\">Por favor, ¡vea nuestra <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">página de voluntariado</a></mark> para ver cómo involucrarse!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "¿Cómo puedo donar a Tor Project?",
+ "description": "<p class=\"mb-3\">¡Gracias por su apoyo! Puede encontrar más información sobre donación en nuestras <mark><a href=\"https://donate.torproject.org/donor-faq\">preguntas frecuentes del donante</a></mark>.</p>"
+ }
+}
diff --git a/fr.json b/fr.json
new file mode 100644
index 000000000..89d6676da
--- /dev/null
+++ b/fr.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#divers-1",
+ "control": "divers-1",
+ "title": "J’ai une raison impérieuse de suivre un utilisateur de Tor à la trace. Pouvez-vous m’aider ?",
+ "description": "<p class=\"mb-3\">Les développeurs de Tor ne peuvent rien faire pour suivre les utilisateurs de Tor à la trace. Les mêmes protections qui empêchent les personnes mal intentionnées de percer l’anonymat de Tor nous empêchent aussi de suivre les utilisateurs à la trace.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#divers-2",
+ "control": "divers-2",
+ "title": "Pourquoi n’empêchez-vous pas les personnes mal intentionnées de commettre des méfaits en utilisant Tor ?",
+ "description": "<p class=\"mb-3\">Tor est conçu pour défendre les droits de la personne et la confidentialité en empêchant quiconque de censurer quoi que ce soit, ce qui s’applique aussi à nous. Nous détestons que certaines personnes qui utilisent Tor fassent des choses horribles, mais nous ne pouvons rien faire pour nous en débarrasser sans porter atteinte aux activistes des droits de la personne, aux journalistes, aux survivants de violence et autres personnes qui utilisent Tor à de fins louables. Si nous voulions empêcher certaines personnes d’utiliser Tor, nous ajouterions essentiellement une porte dérobée aux logiciels, ce qui exposerait nos utilisateurs vulnérables aux attaques de régimes condamnables et autres adversaires.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#divers-3",
+ "control": "divers-3",
+ "title": "Qui finance Tor ?",
+ "description": "<p class=\"mb-3\">Tor est financé par plusieurs commanditaires différents dont des organismes fédéraux états-uniens, des fondations privées et des donateurs particuliers. Consulter notre liste de tous <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">nos commanditaires</a></mark> et une série de <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">billets de blogue</a></mark> sur nos rapports financiers.</p><p class=\"mb-3\">Nous estimons que parler ouvertement de nos bailleurs de fonds et de notre modèle de financement est la meilleure façon de maintenir un rapport de confiance avec notre communauté. Nous cherchons toujours à diversifier nos sources de financement, notamment de fondations et de particuliers.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#divers-4",
+ "control": "divers-4",
+ "title": "Puis-je utiliser Tor avec BitTorrent ?",
+ "description": "<p class=\"mb-3\">Nous ne recommandons pas l’utilisation de Tor avec BitTorrent. Pour de plus amples renseignements, consulter notre <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">billet de blogue à ce sujet</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#divers-5",
+ "control": "divers-5",
+ "title": "Les fichiers sur mon ordinateur ont été verrouillée et quelqu'un demande que je télécharge le navigateur Tor pour payer une rançon pour mes fichiers !",
+ "description": "<p class=\"mb-3\">Nous sommes désolés, mais vous avez été infecté par un rançongiciel. Le projet Tor n’a pas créé ce rançongiciel. Les auteurs du rançongiciel vous demandent de télécharger le navigateur Tor pour probablement les contacter de manière anonyme avec la rançon qu’ils vous demandent. Si c’est la première fois que vous entendez parler du navigateur Tor, nous comprenons que vous pensez que nous sommes des personnes mal intentionnées qui ouvrent la porte à des personnes encore pires. Mais veuillez prendre en considération que nos logiciels sont utilisés tous les jours à des fins les plus diverses par des activistes des droits de la personne, des journalistes, des survivants de violence familiale, des lanceurs d’alerte, des représentants des forces de l’ordre et bien d’autres. Malheureusement, la protection que nos logiciels peut fournir à ces groupes de personnes peut aussi être détournée par des criminels et des auteurs
de programmes malveillants. Le Projet Tor n’appuie ni ne cautionne l’utilisation de nos logiciels à des fins malveillantes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#divers-6",
+ "control": "divers-6",
+ "title": "Est-ce Tor que conserve des journaux ?",
+ "description": "<p class=\"mb-3\">Tor ne conserve aucun journal qui pourrait identifier un utilisateur particulier. Nous effectuons des mesures sans risque du fonctionnement du réseau, que vous pouvez consulter sur notre site de mesures <mark><a href=\"https://metrics.torproject.org/\">« Tor Metrics »</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#divers-7",
+ "control": "divers-7",
+ "title": "Le Projet Tor offre-t-il des services de courriel ou autres services Web de protection de la confidentialité ?",
+ "description": "<p class=\"mb-3\">Non, nous ne fournissons aucun service en ligne. Une liste (en anglais) de tous nos projets de logiciels se trouve sur notre <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">page de projets</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#divers-8",
+ "control": "divers-8",
+ "title": "Puis-je utiliser le logo de Tor sur mon produit ?",
+ "description": "<p class=\"mb-3\">Vous trouverez tous les renseignements à ce sujet sur la <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">FAQ de notre marque de commerce</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#divers-9",
+ "control": "divers-9",
+ "title": "J’éprouve des difficultés à mettre à jour ou à utiliser Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia n’est plus maintenue ni prise en charge. Une grande partie des fonctions qu’offrait Vidalia a maintenant été intégrée dans le navigateur Tor même.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#divers-10",
+ "control": "divers-10",
+ "title": "Le Projet Tor offre-t-il de l’hébergement ?",
+ "description": "<p class=\"mb-3\">Non, le Projet Tor n’offre pas de service d’hébergement.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#divers-11",
+ "control": "divers-11",
+ "title": "Puis-je changer le nombre de sauts utilisés par Tor ?",
+ "description": "<p class=\"mb-3\">La longueur du chemin est actuellement figée dans le code à 3 plus le nombre de nœuds délicats dans votre chemin. C’est-à-dire que pour les cas normaux c’est 3, mais possiblement plus si vous accédez par exemple à un service oignon ou à une adresse « .exit ».</p><p class=\"mb-3\"> Nous ne voulons pas encourager l’utilisation de chemins plus longs, car cela augmente la charge du réseau sans (d’après ce que nous pouvons voir) fournir une sécurité accrue. De plus, utiliser des chemins plus longs que 3 pourrait nuire à l’anonymat, d’abord parce que cela facilite les <mark> <a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">attaques par saturation </a> </mark>, et aussi parce que cela pourrait être utilisé pour vous identifier si seulement quelques utilisateurs utilisent la même longueur de chemin que vous.</p>\n"
+ },
+ "miscellaneus-12": {
+ "id": "#divers-12",
+ "control": "divers-12",
+ "title": "Comment puis-je partager des fichiers anonymement avec Tor ?",
+ "description": "<p class=\"mb-3\">De nombreux nœuds de sortie sont configurés pour bloquer certains types de trafic de partage de fichiers tels que BitTorrent. BitTorrent en particulier <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">n’est pas anonyme avec Tor</a></mark>.</p><p class=\"mb-3\"><mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> est une bonne option pour partager des fichiers avec Tor.</p>\n"
+ },
+ "miscellaneus-13": {
+ "id": "#divers-13",
+ "control": "divers-13",
+ "title": "Puis-je utiliser un RPV avec Tor ?",
+ "description": "<p class=\"mb-3\">De manière générale, nous ne recommandons pas d’utiliser un RPV avec Tor à moins que vous ne soyez un utilisateur expérimenté qui sait comment configurer l’un et l’autre sans compromettre la confidentialité. De plus amples renseignements sur Tor + RPV se trouvent sur <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">notre wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#divers-14",
+ "control": "divers-14",
+ "title": "Comment puis-je devenir bénévole auprès du Projet Tor ?",
+ "description": "<p class=\"mb-3\">Notre page <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">Devenir bénévole</a></mark> (en anglais) explique comment s’impliquer.</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#divers-15",
+ "control": "divers-15",
+ "title": "Comment puis-je faire un don au projet Tor ?",
+ "description": "<p class=\"mb-3\">Nous vous remercions de votre soutien ! De plus amples renseignements sur les dons se trouvent dans notre <mark><a href=\"https://donate.torproject.org/donor-faq\">FAQ pour les donateurs</a></mark> (en anglais).</p>"
+ }
+}
diff --git a/id.json b/id.json
new file mode 100644
index 000000000..e1bec4592
--- /dev/null
+++ b/id.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "Saya punya alasan kuat untuk melacak seorang pengguna Tor. Apakah Anda dapat membantu saya?",
+ "description": "<p class=\"mb-3\"> Tidak ada yang dapat dilakukan oleh para pengembang Tor dalam melacak pengguna Tor. Perlindungan yang menghalangi orang jahat untuk merusak anonimitas Tor juga mencegah kami melacak pengguna.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Kenapa kalian tidak mencegah orang jahat melakukan kejahatan menggunakan Tor?",
+ "description": "<p class=\"mb-3\"> Tor dirancang untuk melindungi hak asasi manusia dan privasi dengan mencegah siapa saja dalam menyensor apapun, mencegah siapapun bahkan diri kami sendiri. Kami tidak suka kalau ada orang-orang yang menggunakan Tor untuk hal-hal buruk, tapi kami tidak dapat melakukan apapun dalam menyingkirkan mereka tanpa mengabaikan aktivis HAM, wartawan, orang-orang yang selamat dari pelecehan, dan orang lain yang menggunakan Tor untuk kebaikan. Jika kami menghalangi sebagian orang menggunakan Tor, kami pada dasarnya akan menambah pintu belakang di perangkat lunak ini, yang akan buka kelemahan pengguna kami kepada pemerintah yang tidak baik dan musuh-musuh lain.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Siapa yang membiayai Tor?",
+ "description": "<p class=\"mb-3\">Tor dibiayai beberapa sponsor termasuk lembaga federal Amerika Serikat, yayasan swasta, dan donor individu. Silakan lihat semua <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\"> sponsors kami</a></mark> dan beberapa <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">posting blog</a></mark>tentang laporan keuangan kami.</p>Menurut kami, mengumumkan tentang donor dan model pembiayaan kami adalah cara terbaik memelihara kepercayaan komunitas kami. Kami selalu mencara cara lain dalam pembiayaan, termasuk dari yayasan dan orang perorangan.<p class=\"mb-3\">"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Apakah saya dapat menggunakan Tor dengan bittorent?",
+ "description": "<p class=\"mb-3\"> Kami tidak menyarankan penggunaan Tor dengan bittorent. Untuk penjelasan lebih lanjut, silakan baca <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">posting blog tentang hal ini</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "File-file di komputer saya terkunci dan seseorang menyuruh saya mengunduh peramban Tor Browser untuk membayar tebusan atas file-file saya!",
+ "description": "<p class=\"mb-3\">Kami turut berduka atas terkenanya Anda oleh malware. Tor Project tidak menciptakan malware ini. Pencipta malware itu meminta Anda mengunduh Tor Browser supaya Anda dapat menghubungi mereka secara anonim dengan tebusannya. Jika ini adalah perkenalan pertama Anda dengan Tor Browser, kami paham kalau Anda berpikir kami adalah orang-orang jahat yang membantu orang-orang yang lebih jahat. Namu, mohon ketahui bahwa perangkat lunak kami digunakan untuk beragam tujuan oleh aktivis hak asasi manusia, wartawan, orang-orang yang selamat dari kekerasan rumah tangga, whistle blower, penegak hukum, dan banyak lain. Sayangnya, perlindungan yang disediakan perangkat lunak kami kepada orang-orang tersebut dapat disalahgunakan oleh penjahat dan pembuat malware. Tor Project tidak mendukung atau merestui penggunaan perangkat lunak kami untuk tujuan jahat.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Apakah Tor menyimpan log?",
+ "description": "<p class=\"mb-3\">Tor tidak menyimpan log apapun yang dapat mengidentifikasi pengguna tertentu. Kami melakukan beberapa langkah aman dalam cara jaringan Tor berfungsi, yang dapat Anda baca di <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Apakah Tor Project menawarkan jasa email atau jasa web lain yang menawarkan perlindungan privasi?",
+ "description": "<p class=\"mb-3\"> Tidak, kami tidak menawarkan jasa online. Daftar semua proyek perangkat lunak kami dapat ditemukan di <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">halaman proyek </a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Apakah saya dapat menggunakan logo Tor di produk saya?",
+ "description": "<p class=\"mb-3\">Anda dapat membaca semua tentang hal ini di <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">halaman trademark faq</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "Saya mendapat masalah dalam memperbarui atau menggunakan Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia sudah tidak dipelihara atau didukung. Sebagian besar fitur Vidalia sudah terintegrasi ke Tor Browser.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Apakah Tor Project menawarkan jasa hosting situs web?",
+ "description": "<p class=\"mb-3\">Tidak, Tor Project tidak menawarkan jasa hosting.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Apakah saya dapat mengubah jumlah hop yang digunakan Tor?",
+ "description": "<p class=\"mb-3\"> Saat ini panjangnya path terkode dalam 3 plus jumlah node di path Anda yang sensitif. Yaitu, di keadaan normal, adalah 3, tapi misalnya jika Anda mengakses sebuah onion service atau sebuah alamat \".exit\", jumlah ini dapat lebih besar.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">serangan denial of security</a></mark> akan lebih mudah, dan juga karena bisa digunakan sebagai pengenal jika hanya ada sedikit pengguna yang menggunakan panjang path yang sama dengan Anda.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "Bagaimana berbagi file secara anonim melalui Tor?",
+ "description": "<p class=\"mb-3\"> Banyak exit node diatur untuk menghalangi beberapa jenis lalu-lintas file sharing, seperti bittorent. Bittorent secara spesifik <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">tidak anonim di Tor</a></mark>.</p><p class=\"mb-3\">Untuk berbagi file melalui Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark>adalah pilihan yang tepat.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Apa saya dapat menggunakan VPN dengan Tor?",
+ "description": "<p class=\"mb-3\">Umumnya kami tidak menyarankan VPN dengan Tor kecuali Anda adalah pengguna tingkat lanjut yang dapat mengatur keduanya sehingga tidak mengurangi privasi Anda. Silakan cari tahu lebih tentang menggabungkan Tor + VPN di <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">wiki kami</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "Bagaimana cara menjadi relawan pada Tor Project?",
+ "description": "<p class=\"mb-3\">Silakan lihat <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">halaman relawan</a></mark> untuk ikut terlibat!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "Bagaimana cara memberikan donasi kepada Tor Project?",
+ "description": "<p class=\"mb-3\">Terima kasih atas dukungan Anda! Anda dapat menemukan lebih banyak info tentang sumbangan di <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/support-miscellaneous.json b/support-miscellaneous.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/support-miscellaneous.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/zh_CN.json b/zh_CN.json
new file mode 100644
index 000000000..2d88acd23
--- /dev/null
+++ b/zh_CN.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#杂项-1",
+ "control": "杂项-1",
+ "title": "我必须追查一个tor用户,你们能帮助我吗?",
+ "description": "<p class=\"mb-3\">tor的开发者们对于追查tor的使用者这方面无法提供任何帮助。tor避免具有恶意的人去窥视您的隐私,这个功能对我们也起到同样的效果。</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#杂项-2",
+ "control": "杂项-2",
+ "title": "你们为什么不阻止那些心怀不轨的人用tor做坏事呢?",
+ "description": "<p class=\"mb-3\">tor的设计宗旨是通过避免任何人监视您,包括我们,来保护您的权利。我们厌恶用tor做糟糕的事情的人,但是我们并不能在剔除他们的同时,不伤害到人权活动者,记者,虐待后的幸存者们,以及其他用tor做好事的人们。如果我们要屏蔽特定的用户,我们必须在程序里添加后门。这将会导致我们的用户暴露在政府以及敌对势力的攻击之下。</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#杂项-3",
+ "control": "杂项-3",
+ "title": "哪些个人或者集团在资助tor?",
+ "description": "<p class=\"mb-3\">tor被许多不同的赞助者资助过,包括美国联邦机构,私人基金会,个人捐赠者。点击列表查看<mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">我们的赞助者</a></mark>以及一系列的关于我们财务的<mark><a href=\"https://blog.torproject.org/category/tags/form-990\">博文</a>。</mark></p><p class=\"mb-3\">我们认为,公开谈论我们的赞助者以及资助模式,是维持社区信任的最佳方式。我们一直在尝试让我们的资助来源多样化,尤其是基金会以及个人资助者方面。</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#杂项-4",
+ "control": "杂项-4",
+ "title": "我们将tor和比特流结合起来使用吗?",
+ "description": "<p class=\"mb-3\">我们不推荐将两者结合起来使用。更多信息请查阅我们的<mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">有关这个项目的博文</a></mark>。</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#杂项-5",
+ "control": "杂项-5",
+ "title": "我电脑上的一些文件被锁住了,有人要求我下载tor浏览器来支付赎金,赎回文件!",
+ "description": "<p class=\"mb-3\">我们十分抱歉,您应该是被恶意软件攻击了。tor项目并没有创造这个恶意软件。这个软件的作者要求您下载tor浏览器大概是因为他们想匿名的获取您的赎金。如果这是您对tor的初体验,我们了解您的心情,您大概会认为我们是纵容那些家伙的坏人。不过,我们的软件每天都被许多人使用,包括人权活动者,记者,家庭暴力幸存者,揭发者,执法机关的员工等等。不幸的是,我们软件对这些人提供的防护,同时会被罪犯以及恶意软件的作者利用。tor项目坚决不支持或者容忍恶意的使用我们的软件。</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#杂项-6",
+ "control": "杂项-6",
+ "title": "tor会留存日志吗?",
+ "description": "<p class=\"mb-3\">tor不会留存可以辨别特定用户的日志。我们会存留一些关于网络功能的日志,用于提高安全性,您可以在<mark><a href=\"https://metrics.torproject.org/\">tor的量度</a></mark>中查看到。</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#杂项-7",
+ "control": "杂项-7",
+ "title": "tor项目提供邮件服务或者其他保护隐私的互联网服务吗?",
+ "description": "<p class=\"mb-3\">抱歉,我们尚未提供任何其他的网络服务。您可以在我们的<mark><a href=\"https://www.torproject.org/projects/projects.html.en\">项目网页</a></mark>查看我们所有的软件。</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#杂项-8",
+ "control": "杂项-8",
+ "title": "我能将tor的图标用于我的产品中吗?",
+ "description": "<p class=\"mb-3\">您可以在<mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">商标问答界面</a></mark>了解一切有关我们商标的事情。</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#杂项-9",
+ "control": "杂项-9",
+ "title": "我在使用或是升级vidalia的时候出现问题。",
+ "description": "<p class=\"mb-3\">vidalia已经被废弃,不再被维护与支持。vidalia的绝大部分功能,现在已经被被整合到tor浏览器上。</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#杂项-10",
+ "control": "杂项-10",
+ "title": "tor项目提供虚拟主机服务吗?",
+ "description": "<p class=\"mb-3\">抱歉,tor项目不提供虚拟主机服务。</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#杂项-11",
+ "control": "杂项-11",
+ "title": "我能修改tor网络中的跳跃次数吗?",
+ "description": "<p class=\"mb-3\">现在路径长度被锁定为三加上您路径中敏感的节点数量。也就是说,在正常的状况下这是三。不过如果您正在访问洋葱服务或者.exit地址,它可能会更多。</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">安全攻击</a></mark>会变得更加容易。而且这只有少数用户才拥有的路径长度也会变成辨识您身份的符号。</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#杂项-12",
+ "control": "杂项-12",
+ "title": "我该怎么使用tor匿名的分享文件?",
+ "description": "<p class=\"mb-3\">许多出口节点都被设置为禁止某些特定类型的文件分享流量,比如比特流。在某些特定的情况下,tor与比特流结合使用无法维持匿名状态。</p><p class=\"mb-3\">如果您希望使用tor来分享文件,<mark><a href=\"https://onionshare.org/\">OnionShare</a></mark>是一个好选择。</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#杂项-13",
+ "control": "杂项-13",
+ "title": "我能搭配VPN使用Tor吗?",
+ "description": "<p class=\"mb-3\">通常情况下,我们不推荐搭配VPN使用Tor。除非您是懂得使用恰当配置,确保您隐私不被侵犯的高级用户。了解更多关于Tor与VPN的组合使用,请访问<mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">我们的wiki</a></mark>。</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#杂项-14",
+ "control": "杂项-14",
+ "title": "我该作为一个志愿者参与tor项目?",
+ "description": "<p class=\"mb-3\">请参见我们的<mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">志愿者页面</a></mark>以了解参与项目的方法!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#杂项-15",
+ "control": "杂项-15",
+ "title": "我该怎样向Tor Project捐款?",
+ "description": "<p class=\"mb-3\">多谢您的支持!您可以访问<mark><a href=\"https://donate.torproject.org/donor-faq\">捐款常见问题界面</a></mark>,以了解更多捐款方面的信息。</p>"
+ }
+}
1
0

[translation/support-miscellaneous] pulling translations from transifex
by translation@torproject.org 09 Apr '18
by translation@torproject.org 09 Apr '18
09 Apr '18
commit 070e9e19e0d48189a2734c0d1e76daa6a2431d5d
Author: Translation commit bot <translation(a)torproject.org>
Date: Mon Apr 9 23:32:10 2018 +0000
pulling translations from transifex
---
ach.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ady.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
af.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ak.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
am.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ar.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
arn.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ast.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
az.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ba.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
be.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
bg.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
bn.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
bn_BD.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
bn_IN.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
bo.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
br.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
brx.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
bs.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ca.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ceb.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
cs.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
csb.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
cv.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
cy.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
da.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
de.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
dz.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
el.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
en_GB.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
eo.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
es.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
es_AR.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
es_CL.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
es_CO.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
es_MX.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
et.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
eu.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
fa.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
fi.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
fil.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
fo.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
fr.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
fr_CA.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
fur.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
fy.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ga.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
gd.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
gl.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
gu.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
gu_IN.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
gun.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ha.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
he.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
hi.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
hr.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
hr_HR.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ht.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
hu.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
hy.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ia.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
id.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
is.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
it.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ja.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
jv.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ka.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
kk.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
km.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
kn.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ko.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ko_KR.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ku.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ku_IQ.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
kw.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ky.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
la.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
lb.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
lg.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ln.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
lo.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
lt.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
lv.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
mg.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
mi.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
mk.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ml.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
mn.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
mr.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ms_MY.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
mt.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
my.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
nah.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
nap.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
nb.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
nds.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ne.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
nl.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
nl_BE.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
nn.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
nso.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
oc.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
om.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
or.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
pa.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
pap.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
pl.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
pms.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ps.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
pt.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
pt_BR.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ro.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ru.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ru(a)petr1708.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
scn.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
sco.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
si_LK.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
sk.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
sk_SK.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
sl.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
sl_SI.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
sn.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
so.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
son.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
sq.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
sr.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
sr(a)latin.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
st.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
su.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
support-miscellaneous.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
sv.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
sw.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
szl.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ta.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
te.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
te_IN.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
tg.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
th.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ti.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
tk.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
tr.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
tzm.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ug(a)Arab.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
uk.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ur.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ur_PK.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
uz.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
ve.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
vi.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
wa.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
wo.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
zh_CN.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
zh_HK.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
zh_TW.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
zu.json | 92 ++++++++++++++++++++++++++++++++++++++++++++++
155 files changed, 14260 insertions(+)
diff --git a/ach.json b/ach.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ach.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ady.json b/ady.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ady.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/af.json b/af.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/af.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ak.json b/ak.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ak.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/am.json b/am.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/am.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ar.json b/ar.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ar.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/arn.json b/arn.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/arn.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ast.json b/ast.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ast.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/az.json b/az.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/az.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ba.json b/ba.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ba.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/be.json b/be.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/be.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/bg.json b/bg.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/bg.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/bn.json b/bn.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/bn.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/bn_BD.json b/bn_BD.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/bn_BD.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/bn_IN.json b/bn_IN.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/bn_IN.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/bo.json b/bo.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/bo.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/br.json b/br.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/br.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/brx.json b/brx.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/brx.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/bs.json b/bs.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/bs.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ca.json b/ca.json
new file mode 100644
index 000000000..5089764dd
--- /dev/null
+++ b/ca.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Puc utilitzar una VPN amb el Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ceb.json b/ceb.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ceb.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/cs.json b/cs.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/cs.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/csb.json b/csb.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/csb.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/cv.json b/cv.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/cv.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/cy.json b/cy.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/cy.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/da.json b/da.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/da.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/de.json b/de.json
new file mode 100644
index 000000000..d9e40d35f
--- /dev/null
+++ b/de.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Wer finanziert Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Funktioniert Tor mit bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Speichert Tor Protokolle?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Kann ich das Tor-Logo für mein Produkt benutzen?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "Kann ich mit Tor Dateien anonym teilen?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Kann ich ein VPN mit Tor verwenden?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "Wie kann ich beim Tor Project mithelfen? ",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "Wie kann ich an das Tor Project spenden?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/dz.json b/dz.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/dz.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/el.json b/el.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/el.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/en_GB.json b/en_GB.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/en_GB.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/eo.json b/eo.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/eo.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/es.json b/es.json
new file mode 100644
index 000000000..75836d7aa
--- /dev/null
+++ b/es.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "Tengo una razón imperiosa para trazar a un usuario de Tor. ¿Me puede ayudar?",
+ "description": "<p class=\"mb-3\">No hay nada que los desarrolladores de Tor puedan hacer para trazar a los usuarios de Tor. Las mismas protecciones que evitan que indeseables rompan el anonimato de Tor nos impiden a nosotros rastrear usuarios.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "¿Por qué no evitan que gente indeseable haga maldades cuando usa Tor?",
+ "description": "<p class=\"mb-3\">Tor está diseñado para defender los derechos humanos y la privacidad evitando que cualquiera censure cosas, incluso nosotros. Aborrecemos que haya algunas personas que usen Tor para hacer cosas terribles, pero no podemos hacer nada para librarnos de ellos sin socavar también los activistas pro derechos humanos, periodistas, supervivientes de abuso, y otras personas que usan Tor para cosas buenas. Si queremos evitar que ciertas personas usen Tor, básicamente estaríamos añadiendo una puerta trasera al software, lo que dejaría vulnerables a nuestros usuarios a ataques de regímenes opresivos y otros adversarios.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "¿Quién financia Tor?",
+ "description": "<p class=\"mb-3\">Tor está financiado por varios patrocinadores distintos, incluyendo agencias federales de EEUU, fundaciones privadas, y donantes individuales. Revise la lista completa de <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">nuestros patrocinadores</a></mark> y una serie de <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">artículos del blog</a></mark> sobre nuestros informes financieros.</p><p class=\"mb-3\">Sentimos que hablar abiertamente sobre quienes nos financian y nuestro modelo de financiación es la mejor forma de mantener la confianza con nuestra comunidad. Siempre estamos buscando más diversidad para nuestras fuentes de financiación, especialmente desde fundaciones y personas a título individual.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "¿Puedo usar Tor con bittorrent?",
+ "description": "<p class=\"mb-3\">No recomendamos usar Tor con bittorrent. Para más detalles lee nuestro <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">artículo del blog sobre este tema</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "¡Los archivos de mi equipo han sido bloqueados, y alguien me está exigiendo que descargue el Navegador Tor para pagar un rescate por mis archivos!",
+ "description": "<p class=\"mb-3\">Lo sentimos mucho, pero ha sido infectado por malware. The Tor Project no ha creado este malware. Los autores de este malware le están urgiendo a que descargue el Navegador Tor presumiblemente para que contacte con ellos de forma anónima con el rescate que le están exigiendo. Si este es su primer contacto con el Navegador Tor, entendemos que pueda pensar que somos unos indeseables que facultamos a gente todavía más indeseable. Pero, por favor, considere que nuestro software es usado cada día por una amplia variedad de propósitos por activistas pro derechos humanos, periodistas, supervivientes de violencia doméstica, informantes, agentes de la ley, y muchos otros. Desafortunadamente, la protección que puede proporcionar nuestro software a estos grupos de personas también puede ser abusada por criminales y autores de malware. The Tor Project no apoya ni excusa el uso de nuestro software para propósitos maliciosos.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "¿Tor conserva registros?",
+ "description": "<p class=\"mb-3\">Tor no conserva ningún registro que pueda identificar a un usuario concreto. Tomamos algunas mediciones seguras acerca de cómo funciona la red, que puede revisar en <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "¿Tor Project ofrece servicio de correo electrónico u otros servicios web protectores de la privacidad?",
+ "description": "<p class=\"mb-3\">No, no proporcionamos ningún servicio en línea. Puedes leer una lista de todos nuestros proyectos de software en la <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">página de nuestro proyecto</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "¿Puedo usar el logotipo de Tor en mi producto?",
+ "description": "<p class=\"mb-3\">Puedes leer todo lo relacionado con eso en nuestra <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">página de preguntas frecuentes sobre marca registrada</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "Estoy teniendo un problema actualizando o usando Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia ya no es mantenido ni está soportado. Una gran porción de las características que ofrecía Vidalia ahora están integradas en el propio Navegador Tor.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "¿Tor Project ofrece alojamiento?",
+ "description": "<p class=\"mb-3\">No, Tor Project no ofrece servicios de alojamiento.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "¿Puedo cambiar el número de saltos que usa Tor?",
+ "description": "<p class=\"mb-3\">Ahora mismo la longitud de la ruta está internamente codificada en 3 más el número de nodos en tu ruta que sean sensibles. Esto en casos normales es 3, pero por ejemplo, si estás accediendo a un servicio onion o a una dirección \".exit\" podrían ser más.</p><p class=\"mb-3\"No queremos animar a que la gente use rutas más largas que esta, ya que incrementaría la carga de la red sin (hasta donde podemos decir) proporcionar más seguridad. Además, usar rutas más largas que 3 podría dañar el anonimato, en primer lugar, porque facilita los ataques de <mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denegación de seguridad</a></mark>, y en segundo, porque podría actuar como un identificador si sólo un pequeño número de usuarios tiene la misma longitud de ruta que tú.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "¿Cómo puedo compartir ficheros anónimamente a través de Tor?",
+ "description": "<p class=\"mb-3\">Muchos nodos de salida están configurados para bloquear ciertos tipos de tráfico de compartición de ficheros, como bittorrent. Específicamente bittorrent <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">no es anónimo sobre Tor</a></mark>.</p><p class=\"mb-3\">Para compartición de ficheros a través de Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> es una buena opción.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "¿Puedo usar una VPN con Tor?",
+ "description": "<p class=\"mb-3\">En términos generales, no recomendamos usar una VPN con Tor a menos que seas un usuario avanzado que sabe cómo configurar ambos de forma que no comprometa su privacidad. Puedes encontrar más información detallada sobre Tor + VPN en <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">nuestro wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "¿Cómo puedo ofrecerme voluntario para Tor Project?",
+ "description": "<p class=\"mb-3\">Por favor, ¡vea nuestra <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">página de voluntariado</a></mark> para ver cómo involucrarse!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "¿Cómo puedo donar a Tor Project?",
+ "description": "<p class=\"mb-3\">¡Gracias por su apoyo! Puede encontrar más información sobre donación en nuestras <mark><a href=\"https://donate.torproject.org/donor-faq\">preguntas frecuentes del donante</a></mark>.</p>"
+ }
+}
diff --git a/es_AR.json b/es_AR.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/es_AR.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/es_CL.json b/es_CL.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/es_CL.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/es_CO.json b/es_CO.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/es_CO.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/es_MX.json b/es_MX.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/es_MX.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/et.json b/et.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/et.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/eu.json b/eu.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/eu.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/fa.json b/fa.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/fa.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/fi.json b/fi.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/fi.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/fil.json b/fil.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/fil.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/fo.json b/fo.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/fo.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/fr.json b/fr.json
new file mode 100644
index 000000000..89d6676da
--- /dev/null
+++ b/fr.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#divers-1",
+ "control": "divers-1",
+ "title": "J’ai une raison impérieuse de suivre un utilisateur de Tor à la trace. Pouvez-vous m’aider ?",
+ "description": "<p class=\"mb-3\">Les développeurs de Tor ne peuvent rien faire pour suivre les utilisateurs de Tor à la trace. Les mêmes protections qui empêchent les personnes mal intentionnées de percer l’anonymat de Tor nous empêchent aussi de suivre les utilisateurs à la trace.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#divers-2",
+ "control": "divers-2",
+ "title": "Pourquoi n’empêchez-vous pas les personnes mal intentionnées de commettre des méfaits en utilisant Tor ?",
+ "description": "<p class=\"mb-3\">Tor est conçu pour défendre les droits de la personne et la confidentialité en empêchant quiconque de censurer quoi que ce soit, ce qui s’applique aussi à nous. Nous détestons que certaines personnes qui utilisent Tor fassent des choses horribles, mais nous ne pouvons rien faire pour nous en débarrasser sans porter atteinte aux activistes des droits de la personne, aux journalistes, aux survivants de violence et autres personnes qui utilisent Tor à de fins louables. Si nous voulions empêcher certaines personnes d’utiliser Tor, nous ajouterions essentiellement une porte dérobée aux logiciels, ce qui exposerait nos utilisateurs vulnérables aux attaques de régimes condamnables et autres adversaires.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#divers-3",
+ "control": "divers-3",
+ "title": "Qui finance Tor ?",
+ "description": "<p class=\"mb-3\">Tor est financé par plusieurs commanditaires différents dont des organismes fédéraux états-uniens, des fondations privées et des donateurs particuliers. Consulter notre liste de tous <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">nos commanditaires</a></mark> et une série de <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">billets de blogue</a></mark> sur nos rapports financiers.</p><p class=\"mb-3\">Nous estimons que parler ouvertement de nos bailleurs de fonds et de notre modèle de financement est la meilleure façon de maintenir un rapport de confiance avec notre communauté. Nous cherchons toujours à diversifier nos sources de financement, notamment de fondations et de particuliers.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#divers-4",
+ "control": "divers-4",
+ "title": "Puis-je utiliser Tor avec BitTorrent ?",
+ "description": "<p class=\"mb-3\">Nous ne recommandons pas l’utilisation de Tor avec BitTorrent. Pour de plus amples renseignements, consulter notre <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">billet de blogue à ce sujet</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#divers-5",
+ "control": "divers-5",
+ "title": "Les fichiers sur mon ordinateur ont été verrouillée et quelqu'un demande que je télécharge le navigateur Tor pour payer une rançon pour mes fichiers !",
+ "description": "<p class=\"mb-3\">Nous sommes désolés, mais vous avez été infecté par un rançongiciel. Le projet Tor n’a pas créé ce rançongiciel. Les auteurs du rançongiciel vous demandent de télécharger le navigateur Tor pour probablement les contacter de manière anonyme avec la rançon qu’ils vous demandent. Si c’est la première fois que vous entendez parler du navigateur Tor, nous comprenons que vous pensez que nous sommes des personnes mal intentionnées qui ouvrent la porte à des personnes encore pires. Mais veuillez prendre en considération que nos logiciels sont utilisés tous les jours à des fins les plus diverses par des activistes des droits de la personne, des journalistes, des survivants de violence familiale, des lanceurs d’alerte, des représentants des forces de l’ordre et bien d’autres. Malheureusement, la protection que nos logiciels peut fournir à ces groupes de personnes peut aussi être détournée par des criminels et des auteurs
de programmes malveillants. Le Projet Tor n’appuie ni ne cautionne l’utilisation de nos logiciels à des fins malveillantes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#divers-6",
+ "control": "divers-6",
+ "title": "Est-ce Tor que conserve des journaux ?",
+ "description": "<p class=\"mb-3\">Tor ne conserve aucun journal qui pourrait identifier un utilisateur particulier. Nous effectuons des mesures sans risque du fonctionnement du réseau, que vous pouvez consulter sur notre site de mesures <mark><a href=\"https://metrics.torproject.org/\">« Tor Metrics »</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#divers-7",
+ "control": "divers-7",
+ "title": "Le Projet Tor offre-t-il des services de courriel ou autres services Web de protection de la confidentialité ?",
+ "description": "<p class=\"mb-3\">Non, nous ne fournissons aucun service en ligne. Une liste (en anglais) de tous nos projets de logiciels se trouve sur notre <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">page de projets</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#divers-8",
+ "control": "divers-8",
+ "title": "Puis-je utiliser le logo de Tor sur mon produit ?",
+ "description": "<p class=\"mb-3\">Vous trouverez tous les renseignements à ce sujet sur la <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">FAQ de notre marque de commerce</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#divers-9",
+ "control": "divers-9",
+ "title": "J’éprouve des difficultés à mettre à jour ou à utiliser Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia n’est plus maintenue ni prise en charge. Une grande partie des fonctions qu’offrait Vidalia a maintenant été intégrée dans le navigateur Tor même.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#divers-10",
+ "control": "divers-10",
+ "title": "Le Projet Tor offre-t-il de l’hébergement ?",
+ "description": "<p class=\"mb-3\">Non, le Projet Tor n’offre pas de service d’hébergement.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#divers-11",
+ "control": "divers-11",
+ "title": "Puis-je changer le nombre de sauts utilisés par Tor ?",
+ "description": "<p class=\"mb-3\">La longueur du chemin est actuellement figée dans le code à 3 plus le nombre de nœuds délicats dans votre chemin. C’est-à-dire que pour les cas normaux c’est 3, mais possiblement plus si vous accédez par exemple à un service oignon ou à une adresse « .exit ».</p><p class=\"mb-3\"> Nous ne voulons pas encourager l’utilisation de chemins plus longs, car cela augmente la charge du réseau sans (d’après ce que nous pouvons voir) fournir une sécurité accrue. De plus, utiliser des chemins plus longs que 3 pourrait nuire à l’anonymat, d’abord parce que cela facilite les <mark> <a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">attaques par saturation </a> </mark>, et aussi parce que cela pourrait être utilisé pour vous identifier si seulement quelques utilisateurs utilisent la même longueur de chemin que vous.</p>\n"
+ },
+ "miscellaneus-12": {
+ "id": "#divers-12",
+ "control": "divers-12",
+ "title": "Comment puis-je partager des fichiers anonymement avec Tor ?",
+ "description": "<p class=\"mb-3\">De nombreux nœuds de sortie sont configurés pour bloquer certains types de trafic de partage de fichiers tels que BitTorrent. BitTorrent en particulier <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">n’est pas anonyme avec Tor</a></mark>.</p><p class=\"mb-3\"><mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> est une bonne option pour partager des fichiers avec Tor.</p>\n"
+ },
+ "miscellaneus-13": {
+ "id": "#divers-13",
+ "control": "divers-13",
+ "title": "Puis-je utiliser un RPV avec Tor ?",
+ "description": "<p class=\"mb-3\">De manière générale, nous ne recommandons pas d’utiliser un RPV avec Tor à moins que vous ne soyez un utilisateur expérimenté qui sait comment configurer l’un et l’autre sans compromettre la confidentialité. De plus amples renseignements sur Tor + RPV se trouvent sur <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">notre wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#divers-14",
+ "control": "divers-14",
+ "title": "Comment puis-je devenir bénévole auprès du Projet Tor ?",
+ "description": "<p class=\"mb-3\">Notre page <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">Devenir bénévole</a></mark> (en anglais) explique comment s’impliquer.</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#divers-15",
+ "control": "divers-15",
+ "title": "Comment puis-je faire un don au projet Tor ?",
+ "description": "<p class=\"mb-3\">Nous vous remercions de votre soutien ! De plus amples renseignements sur les dons se trouvent dans notre <mark><a href=\"https://donate.torproject.org/donor-faq\">FAQ pour les donateurs</a></mark> (en anglais).</p>"
+ }
+}
diff --git a/fr_CA.json b/fr_CA.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/fr_CA.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/fur.json b/fur.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/fur.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/fy.json b/fy.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/fy.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ga.json b/ga.json
new file mode 100644
index 000000000..5e4cbd099
--- /dev/null
+++ b/ga.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "Caithfidh mé úsáideoir Tor a lorg mar gheall ar chúis an-láidir. An gcabhródh sibh liom?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Cén fáth nach gcuireann sibh cosc ar dhrochdhaoine a dhéanann drochrudaí ar líonra Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Cé atá ag maoiniú Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "An féidir liom Tor a úsáid in éindí le bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "An bhfuil cead agam lógó Tor a úsáid i dtáirge de mo chuid?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "An féidir liom VPN a úsáid le Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/gd.json b/gd.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/gd.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/gl.json b/gl.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/gl.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/gu.json b/gu.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/gu.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/gu_IN.json b/gu_IN.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/gu_IN.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/gun.json b/gun.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/gun.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ha.json b/ha.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ha.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/he.json b/he.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/he.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/hi.json b/hi.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/hi.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/hr.json b/hr.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/hr.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/hr_HR.json b/hr_HR.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/hr_HR.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ht.json b/ht.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ht.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/hu.json b/hu.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/hu.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/hy.json b/hy.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/hy.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ia.json b/ia.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ia.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/id.json b/id.json
new file mode 100644
index 000000000..e1bec4592
--- /dev/null
+++ b/id.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "Saya punya alasan kuat untuk melacak seorang pengguna Tor. Apakah Anda dapat membantu saya?",
+ "description": "<p class=\"mb-3\"> Tidak ada yang dapat dilakukan oleh para pengembang Tor dalam melacak pengguna Tor. Perlindungan yang menghalangi orang jahat untuk merusak anonimitas Tor juga mencegah kami melacak pengguna.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Kenapa kalian tidak mencegah orang jahat melakukan kejahatan menggunakan Tor?",
+ "description": "<p class=\"mb-3\"> Tor dirancang untuk melindungi hak asasi manusia dan privasi dengan mencegah siapa saja dalam menyensor apapun, mencegah siapapun bahkan diri kami sendiri. Kami tidak suka kalau ada orang-orang yang menggunakan Tor untuk hal-hal buruk, tapi kami tidak dapat melakukan apapun dalam menyingkirkan mereka tanpa mengabaikan aktivis HAM, wartawan, orang-orang yang selamat dari pelecehan, dan orang lain yang menggunakan Tor untuk kebaikan. Jika kami menghalangi sebagian orang menggunakan Tor, kami pada dasarnya akan menambah pintu belakang di perangkat lunak ini, yang akan buka kelemahan pengguna kami kepada pemerintah yang tidak baik dan musuh-musuh lain.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Siapa yang membiayai Tor?",
+ "description": "<p class=\"mb-3\">Tor dibiayai beberapa sponsor termasuk lembaga federal Amerika Serikat, yayasan swasta, dan donor individu. Silakan lihat semua <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\"> sponsors kami</a></mark> dan beberapa <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">posting blog</a></mark>tentang laporan keuangan kami.</p>Menurut kami, mengumumkan tentang donor dan model pembiayaan kami adalah cara terbaik memelihara kepercayaan komunitas kami. Kami selalu mencara cara lain dalam pembiayaan, termasuk dari yayasan dan orang perorangan.<p class=\"mb-3\">"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Apakah saya dapat menggunakan Tor dengan bittorent?",
+ "description": "<p class=\"mb-3\"> Kami tidak menyarankan penggunaan Tor dengan bittorent. Untuk penjelasan lebih lanjut, silakan baca <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">posting blog tentang hal ini</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "File-file di komputer saya terkunci dan seseorang menyuruh saya mengunduh peramban Tor Browser untuk membayar tebusan atas file-file saya!",
+ "description": "<p class=\"mb-3\">Kami turut berduka atas terkenanya Anda oleh malware. Tor Project tidak menciptakan malware ini. Pencipta malware itu meminta Anda mengunduh Tor Browser supaya Anda dapat menghubungi mereka secara anonim dengan tebusannya. Jika ini adalah perkenalan pertama Anda dengan Tor Browser, kami paham kalau Anda berpikir kami adalah orang-orang jahat yang membantu orang-orang yang lebih jahat. Namu, mohon ketahui bahwa perangkat lunak kami digunakan untuk beragam tujuan oleh aktivis hak asasi manusia, wartawan, orang-orang yang selamat dari kekerasan rumah tangga, whistle blower, penegak hukum, dan banyak lain. Sayangnya, perlindungan yang disediakan perangkat lunak kami kepada orang-orang tersebut dapat disalahgunakan oleh penjahat dan pembuat malware. Tor Project tidak mendukung atau merestui penggunaan perangkat lunak kami untuk tujuan jahat.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Apakah Tor menyimpan log?",
+ "description": "<p class=\"mb-3\">Tor tidak menyimpan log apapun yang dapat mengidentifikasi pengguna tertentu. Kami melakukan beberapa langkah aman dalam cara jaringan Tor berfungsi, yang dapat Anda baca di <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Apakah Tor Project menawarkan jasa email atau jasa web lain yang menawarkan perlindungan privasi?",
+ "description": "<p class=\"mb-3\"> Tidak, kami tidak menawarkan jasa online. Daftar semua proyek perangkat lunak kami dapat ditemukan di <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">halaman proyek </a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Apakah saya dapat menggunakan logo Tor di produk saya?",
+ "description": "<p class=\"mb-3\">Anda dapat membaca semua tentang hal ini di <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">halaman trademark faq</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "Saya mendapat masalah dalam memperbarui atau menggunakan Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia sudah tidak dipelihara atau didukung. Sebagian besar fitur Vidalia sudah terintegrasi ke Tor Browser.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Apakah Tor Project menawarkan jasa hosting situs web?",
+ "description": "<p class=\"mb-3\">Tidak, Tor Project tidak menawarkan jasa hosting.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Apakah saya dapat mengubah jumlah hop yang digunakan Tor?",
+ "description": "<p class=\"mb-3\"> Saat ini panjangnya path terkode dalam 3 plus jumlah node di path Anda yang sensitif. Yaitu, di keadaan normal, adalah 3, tapi misalnya jika Anda mengakses sebuah onion service atau sebuah alamat \".exit\", jumlah ini dapat lebih besar.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">serangan denial of security</a></mark> akan lebih mudah, dan juga karena bisa digunakan sebagai pengenal jika hanya ada sedikit pengguna yang menggunakan panjang path yang sama dengan Anda.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "Bagaimana berbagi file secara anonim melalui Tor?",
+ "description": "<p class=\"mb-3\"> Banyak exit node diatur untuk menghalangi beberapa jenis lalu-lintas file sharing, seperti bittorent. Bittorent secara spesifik <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">tidak anonim di Tor</a></mark>.</p><p class=\"mb-3\">Untuk berbagi file melalui Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark>adalah pilihan yang tepat.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Apa saya dapat menggunakan VPN dengan Tor?",
+ "description": "<p class=\"mb-3\">Umumnya kami tidak menyarankan VPN dengan Tor kecuali Anda adalah pengguna tingkat lanjut yang dapat mengatur keduanya sehingga tidak mengurangi privasi Anda. Silakan cari tahu lebih tentang menggabungkan Tor + VPN di <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">wiki kami</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "Bagaimana cara menjadi relawan pada Tor Project?",
+ "description": "<p class=\"mb-3\">Silakan lihat <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">halaman relawan</a></mark> untuk ikut terlibat!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "Bagaimana cara memberikan donasi kepada Tor Project?",
+ "description": "<p class=\"mb-3\">Terima kasih atas dukungan Anda! Anda dapat menemukan lebih banyak info tentang sumbangan di <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/is.json b/is.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/is.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/it.json b/it.json
new file mode 100644
index 000000000..2c3a28c42
--- /dev/null
+++ b/it.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Chi finanzia Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Posso usare Tor con bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "Posso offrirmi volontario per aiutare il Progetto Tor?",
+ "description": "<p class=\"mb-3\">Consulta <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">l'apposita pagina</a></mark>per sapere come fare!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "Posso fare una donazione al Progetto Tor?",
+ "description": "<p class=\"mb-3\">Grazie! Puoi trovare informazioni su come fare nelle <mark><a href=\"https://donate.torproject.org/donor-faq\">FAQ donazioni</a></mark>.</p>"
+ }
+}
diff --git a/ja.json b/ja.json
new file mode 100644
index 000000000..7cb18146e
--- /dev/null
+++ b/ja.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "誰が資金提供をしているのですか?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "TorとVPNを併用できますか?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "Torプロジェクトへ寄付するにはどのようにすればいいですか?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/jv.json b/jv.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/jv.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ka.json b/ka.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ka.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/kk.json b/kk.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/kk.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/km.json b/km.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/km.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/kn.json b/kn.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/kn.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ko.json b/ko.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ko.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ko_KR.json b/ko_KR.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ko_KR.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ku.json b/ku.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ku.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ku_IQ.json b/ku_IQ.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ku_IQ.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/kw.json b/kw.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/kw.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ky.json b/ky.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ky.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/la.json b/la.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/la.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/lb.json b/lb.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/lb.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/lg.json b/lg.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/lg.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ln.json b/ln.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ln.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/lo.json b/lo.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/lo.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/lt.json b/lt.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/lt.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/lv.json b/lv.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/lv.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/mg.json b/mg.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/mg.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/mi.json b/mi.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/mi.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/mk.json b/mk.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/mk.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ml.json b/ml.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ml.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/mn.json b/mn.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/mn.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/mr.json b/mr.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/mr.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ms_MY.json b/ms_MY.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ms_MY.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/mt.json b/mt.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/mt.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/my.json b/my.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/my.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/nah.json b/nah.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/nah.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/nap.json b/nap.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/nap.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/nb.json b/nb.json
new file mode 100644
index 000000000..5175bf667
--- /dev/null
+++ b/nb.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "Jeg tror jeg har god grunn til å spore en Tor-bruker? Kan dere hjelpe meg?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Kan jeg bruke Tor-logoen i produktet mitt?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Kan jeg endre antall hopp Tor bruker?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "Hvordan kan jeg dele filer anonymt over Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Kan jeg bruke VPN med Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/nds.json b/nds.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/nds.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ne.json b/ne.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ne.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/nl.json b/nl.json
new file mode 100644
index 000000000..04507ca2a
--- /dev/null
+++ b/nl.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "Ik heb een dringende reden om een Tor gebruiker te traceren. Kun je helpen?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Waarom voorkom je niet dat slechte mensen slechte dingen doen bij het gebruik van Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Wie financiert Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Kan ik Tor gebruiken met bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5\n",
+ "title": "De bestanden op mijn computer zijn vergrendeld en iemand eist dat ik Tor Browser download om losgeld voor mijn bestanden te betalen!",
+ "description": "<p class=\"mb-3\">Het spijt ons, maar je bent geïnfecteerd met malware. Het Tor Project heeft deze malware niet gemaakt. De malware-auteurs vragen je om Tor Browser te downloaden, waarschijnlijk om anoniem contact met hen op te nemen met het losgeld dat zij van je eisen. Als dit je eerste kennismaking met Tor Browser is, begrijpen we dat je misschien denkt dat we slechte mensen zijn die nog slechtere mensen kansen geven. Maar bedenk alsjeblieft dat onze software elke dag voor een breed scala aan doeleinden wordt gebruikt door mensenrechtenactivisten, journalisten, overlevenden van huiselijk geweld, klokkenluiders, wetshandhavers en vele anderen. Helaas kan de bescherming die onze software aan deze groepen mensen biedt, ook door criminelen en malware-auteurs worden misbruikt. Het Tor-project ondersteunt of keurt het gebruik van onze software niet goed voor kwaadwillige doeleinden.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6\n",
+ "control": "miscellaneus-6\n",
+ "title": "Houdt Tor een log bij?",
+ "description": "<p class=\"mb-3\">Tor bewaart geen logboeken die een bepaalde gebruiker kunnen identificeren. We nemen enkele veilige metingen van de werking van het netwerk, die je kunt bekijken op <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7\n",
+ "control": "miscellaneus-7",
+ "title": "Biedt Tor Project e-maildiensten of andere privacybeschermende webservices aan?",
+ "description": "<p class=\"mb-3\">Nee, we bieden geen online services. Een lijst met al onze software projecten kun je vinden op onze <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projectpagina</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Kan ik het Tor logo gebruiken in mijn product?",
+ "description": "<p class=\"mb-3\">Daarover kun je alles lezen op onze <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq pagina</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "Ik heb een probleem bij het updaten of gebruiken van Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia wordt niet langer onderhouden of ondersteund. Een groot deel van de functies die Vidalia aanbood, is nu geïntegreerd in de Tor Browser zelf.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Biedt het Tor Project ook hosting aan?",
+ "description": "<p class=\"mb-3\">Nee, het Tor Project biedt geen hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "Hoe kan ik anoniem bestanden delen via Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Kan ik een VPN gebruiken met Tor?",
+ "description": "<p class=\"mb-3\">Over het algemeen raden we het gebruik van een VPN met Tor af, tenzij je een ervaren gebruiker bent die beide weet te configureren op een manier die je privacy niet schaadt. Je kunt meer gedetailleerde informatie over Tor + VPN vinden op <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">onze wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "Hoe kan ik me aanmelden bij het Tor Project?",
+ "description": "<p class=\"mb-3\">Zie onze <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">vrijwilligerspagina</a></mark> voor meer informatie over hoe je meedoet!</p> "
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "Hoe kan ik doneren aan het Tor Project?",
+ "description": "<p class=\"mb-3\">Bedankt voor je ondersteuning! U kunt meer informatie vinden over doneren op onze donor-FAQ</a></mark>.</p>"
+ }
+}
diff --git a/nl_BE.json b/nl_BE.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/nl_BE.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/nn.json b/nn.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/nn.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/nso.json b/nso.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/nso.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/oc.json b/oc.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/oc.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/om.json b/om.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/om.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/or.json b/or.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/or.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/pa.json b/pa.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/pa.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/pap.json b/pap.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/pap.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/pl.json b/pl.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/pl.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/pms.json b/pms.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/pms.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ps.json b/ps.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ps.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/pt.json b/pt.json
new file mode 100644
index 000000000..ab2db29a7
--- /dev/null
+++ b/pt.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Por que é que não impede que pessoas más façam coisas desagradáveis quando utilizam o Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Quem financia o Tor?",
+ "description": "<p class=\"mb-3\">Tor é financiado por diversos patrocinadores, incluindo agências federais dos EUA, fundações privadas, e doadores individuais. Consulte uma lista de todos os <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">nossos patrocinadores</a></mark> e uma série de </mark></a>artigos de blogue</a></mark> sobre os nossos relatórios financeiros.</p><p class=\"mb-3\">Nós pensamos que falar abertamente sobre os nossos financiadores e modelo de financiamento é a melhor maneira de manter a confiança com a nossa comunidade. Nós procuramos sempre mais diversidade nas nossas fontes de financiamento, especialmente de fundações e indivíduos.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Eu posso utilizar o Tor com o bittorrent?",
+ "description": "<p class=\"mb-3\">Nós não recomendamos a utilização do Tor com o bittorrent. Para mais detalhes, consulte o nosso <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">artigo de blogue sobre o assunto.</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "Os ficheiros no meu computador foram bloqueados, e alguém está a exigir que eu transfira o Tor Browser para pagar um resgate pelos meus ficheiros!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "O Tor mantém registos?",
+ "description": "<p class=\"mb-3\">O Tor não mantém nenhum registo que possa identificar um utilizador em particular. Nós realizamos algumas medições seguras de como a rede funciona, e que pode verificar em <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "O Tor Project oferece serviço de e-mail ou outros serviços de proteção de privacidade na Web?",
+ "description": "<p class=\"mb-3\">Não, nós não proporcionamos quaisquer serviços on-line. Uma lista de todos os nossos projetos de software pode ser encontrada na nossa <a href=\"https://www.torproject.org/projects/projects.html.en\">página dos projetos</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Eu posso utilizar o logótipo do Tor no meu produto?",
+ "description": "<p class=\"mb-3\">Pode ler tudo sobre isso na nossa <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">página de perguntas e respostas da marca registada </a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "Eu estou com um problema ao atualizar ou a utilizar Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia não é mais mantido ou suportado. Uma grande parte das funcionalidades oferecidas pelo Vidalia já foram integradas no próprio Tor Browser.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "O Projeto Tor oferece hospedagem?",
+ "description": "<p class=\"mb-3\">Não, o Projeto Tor não oferece serviços de hospedagem.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Eu posso alterar o número de etapas que o Tor utiliza?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "Como é que eu posso partilhar os ficheiros anonimamente através do Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Eu posso utilizar uma VPN com o Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "Como me voluntariar com o Projeto Tor?",
+ "description": "<p class=\"mb-3\">Por favor, consulte a nossa <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">página de voluntariado</a></mark> para saber como pode participar!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "Como é que eu posso doar para o Projeto Tor?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/pt_BR.json b/pt_BR.json
new file mode 100644
index 000000000..3ef224071
--- /dev/null
+++ b/pt_BR.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "Eu tenho uma razão válida para rastrear um usuário do Tor. Vocês podem me ajudar? ",
+ "description": "<p class=\"mb-3\">Os programadores do Tor não podem por nenhum meio seguir alguém que usa Tor. As mesmas proteções que impedem que outras pessoas quebrem o anonimato garantido pelo Tor também impedem que nós sigamos as pessoas que usam Tor.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Por que vocês não impedem que pessoas ruins façam coisas ruins enquanto usando o Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Quem financia o Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Eu posso Tor e BitTorrent juntos?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "O Tor mantém registros?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Posso usar a logo do Tor em meu produto?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "Estou tendo problema em atualizar ou usar o Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Eu posso utilizar VPN com o Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "Como posso doar ao Projeto Tor?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ro.json b/ro.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ro.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ru.json b/ru.json
new file mode 100644
index 000000000..af5f2c0bb
--- /dev/null
+++ b/ru.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Могу ли я использовать Tor и VPN совместно?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ru(a)petr1708.json b/ru(a)petr1708.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ru(a)petr1708.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/scn.json b/scn.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/scn.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/sco.json b/sco.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/sco.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/si_LK.json b/si_LK.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/si_LK.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/sk.json b/sk.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/sk.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/sk_SK.json b/sk_SK.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/sk_SK.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/sl.json b/sl.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/sl.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/sl_SI.json b/sl_SI.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/sl_SI.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/sn.json b/sn.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/sn.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/so.json b/so.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/so.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/son.json b/son.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/son.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/sq.json b/sq.json
new file mode 100644
index 000000000..57144f372
--- /dev/null
+++ b/sq.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Mund te perdor VPN me Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/sr.json b/sr.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/sr.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/sr(a)latin.json b/sr(a)latin.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/sr(a)latin.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/st.json b/st.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/st.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/su.json b/su.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/su.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/support-miscellaneous.json b/support-miscellaneous.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/support-miscellaneous.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/sv.json b/sv.json
new file mode 100644
index 000000000..e4bc3506b
--- /dev/null
+++ b/sv.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Kan jag använda ett VPN med Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/sw.json b/sw.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/sw.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/szl.json b/szl.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/szl.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ta.json b/ta.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ta.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/te.json b/te.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/te.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/te_IN.json b/te_IN.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/te_IN.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/tg.json b/tg.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/tg.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/th.json b/th.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/th.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ti.json b/ti.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ti.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/tk.json b/tk.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/tk.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/tr.json b/tr.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/tr.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/tzm.json b/tzm.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/tzm.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ug(a)Arab.json b/ug(a)Arab.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ug(a)Arab.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/uk.json b/uk.json
new file mode 100644
index 000000000..b02a3c9b5
--- /dev/null
+++ b/uk.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#різне-1",
+ "control": "різне-1",
+ "title": "У мене є вагомі підстави для відстеження користувача Tor. Ви можете допомогти?",
+ "description": "<p class=\"mb-3\">Розробники Tor нічого не можуть зробити для відстеження користувачів Tor. Ті самі засоби захисту, які перешкоджають злодіям порушувати анонімність Tor, також перешкоджають нам відстежувати користувачів.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#різне-2",
+ "control": "різне-2",
+ "title": "Чому б вам не перешкоджати злодіям робити недобрі речі за використання Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#різне-3",
+ "control": "різне-3",
+ "title": "Хто фінансує Tor?",
+ "description": "<p class=\"mb-3\">Tor фінансується низкою різних спонсорів, включаючно з федеральними агентствами США, приватних фондів та окремих донорів. Перегляньте список усіх <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">наших спонсорів</a></mark> і ряд <a href=\"https://blog.torproject.org/category/tags/form-990\">публікацій в блозі</a> та в наших фінансових звітах.</p> <p class=\"mb-3\">Ми вважаємо, що відкрите інформування про наших спонсорів та модель фінансування є найкращим способом підтримати довіру до нашої спільноти. Ми завжди прагнемо до більшої різноманітності наших джерел фінансування, о
собливо від фондів та окремих осіб.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#різне-4",
+ "control": "різне-4",
+ "title": "Чи можу я використовувати Tor з bittorrent?",
+ "description": "<p class=\"mb-3\">Ми не рекомендуємо використовувати Tor з bittorrent. Для отримання додаткової інформації, будь ласка, перегляньте нашу <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">публікацію блогу з цього питання</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#різне-5",
+ "control": "різне-5",
+ "title": "Файли на моєму комп'ютері були заблоковані, і хтось вимагає, щоб я завантажив Браузер Tor, щоб сплатити викуп за мої файли!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#різне-6",
+ "control": "різне-6",
+ "title": "Чи зберігає Tor журнали?",
+ "description": "<p class=\"mb-3\">Tor не зберігає журналів, які могли б ідентифікувати певного користувача. Ми виконуємо певні безпечні вимірювання функцій мережі, які ви можете перевірити у <mark><a href=\"https://metrics.torproject.org/\">Показниках Tor</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#різне-7",
+ "control": "різне-7",
+ "title": "Чи пропонує Tor Project послуги електронної пошти або інші веб-служби, що захищають конфіденційність?",
+ "description": "<p class=\"mb-3\">Ні, ми не надаємо жодних онлайнових послуг. Перелік усіх наших програмних проектів можна знайти на нашій <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">сторінці проектів</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#різне-8",
+ "control": "різне-8",
+ "title": "Чи можу я використовувати логотип Tor у своєму продукті?",
+ "description": "<p class=\"mb-3\">Ви можете прочитати про це на нашій сторінці <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">ЧАПів щодо торговельних марок</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#різне-9",
+ "control": "різне-9",
+ "title": "У мене виникла проблема з оновленням або використанням Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia більше не підтримується. Значна частина функцій Vidalia тепер інтегрована у Браузер Tor.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#різне-10",
+ "control": "різне-10",
+ "title": "Чи пропонує проект Tor хостинг?",
+ "description": "<p class=\"mb-3\">Ні, проект Tor не пропонує послуги хостингу.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#різне-11",
+ "control": "різне-11",
+ "title": "Чи можу я змінити кількість стрибків, які Tor використовує?",
+ "description": "<p class=\"mb-3\">Зараз довжина шляху твердо закодована на 3 плюс кількість вузлів вашого шляху що є чутливими. Тобто, у звичайних випадках це 3, але, наприклад, якщо ви отримуєте доступ до служб onion або до \".exit\" їх може бути більше.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#різне-12",
+ "control": "різне-12",
+ "title": "Як я можу анонімно обмінюватися файлами через Tor?",
+ "description": "<p class=\"mb-3\">Багато вихідних вузлів налаштовані на блокування певних типів трафіку обміну файлами, наприклад, bittorrent. Bittorrent у конкретному вигляді <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">не є анонімним через Tor</a></mark>.</p> <p class=\"mb-3\">Хороший варіант для спільного використання файлів через Tor - це <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark>.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#різне-13",
+ "control": "різне-13",
+ "title": "Чи можу я використовувати VPN з Tor?",
+ "description": "<p class=\"mb-3\">Загалом, ми не рекомендуємо використовувати VPN з Tor, якщо ви не досвідчений користувач, який знає, як налаштувати обидва пристрої таким чином, щоб це не заважало вашій конфіденційності. Ви можете знайти більш детальну інформацію про Tor + VPN на <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">нашій вікі</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#різне-14",
+ "control": "різне-14",
+ "title": "Як я допомогти Tor Project?",
+ "description": "<p class=\"mb-3\">Будь ласка, ознайомтеся з нашою <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">волонтерською сторінкою</a></mark>, щоб дізнатись як взяти участь!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#різне-15",
+ "control": "різне-15",
+ "title": "Як я можу пожертвувати на Tor Project?",
+ "description": "<p class=\"mb-3\">Дякуємо вам за вашу підтримку! Ви можете знайти додаткову інформацію про пожертвування на <mark><a href=\"https://donate.torproject.org/donor-faq\">нашому сайті</a></mark>.</p>"
+ }
+}
diff --git a/ur.json b/ur.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ur.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ur_PK.json b/ur_PK.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ur_PK.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/uz.json b/uz.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/uz.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/ve.json b/ve.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/ve.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/vi.json b/vi.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/vi.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/wa.json b/wa.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/wa.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/wo.json b/wo.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/wo.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/zh_CN.json b/zh_CN.json
new file mode 100644
index 000000000..2d88acd23
--- /dev/null
+++ b/zh_CN.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#杂项-1",
+ "control": "杂项-1",
+ "title": "我必须追查一个tor用户,你们能帮助我吗?",
+ "description": "<p class=\"mb-3\">tor的开发者们对于追查tor的使用者这方面无法提供任何帮助。tor避免具有恶意的人去窥视您的隐私,这个功能对我们也起到同样的效果。</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#杂项-2",
+ "control": "杂项-2",
+ "title": "你们为什么不阻止那些心怀不轨的人用tor做坏事呢?",
+ "description": "<p class=\"mb-3\">tor的设计宗旨是通过避免任何人监视您,包括我们,来保护您的权利。我们厌恶用tor做糟糕的事情的人,但是我们并不能在剔除他们的同时,不伤害到人权活动者,记者,虐待后的幸存者们,以及其他用tor做好事的人们。如果我们要屏蔽特定的用户,我们必须在程序里添加后门。这将会导致我们的用户暴露在政府以及敌对势力的攻击之下。</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#杂项-3",
+ "control": "杂项-3",
+ "title": "哪些个人或者集团在资助tor?",
+ "description": "<p class=\"mb-3\">tor被许多不同的赞助者资助过,包括美国联邦机构,私人基金会,个人捐赠者。点击列表查看<mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">我们的赞助者</a></mark>以及一系列的关于我们财务的<mark><a href=\"https://blog.torproject.org/category/tags/form-990\">博文</a>。</mark></p><p class=\"mb-3\">我们认为,公开谈论我们的赞助者以及资助模式,是维持社区信任的最佳方式。我们一直在尝试让我们的资助来源多样化,尤其是基金会以及个人资助者方面。</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#杂项-4",
+ "control": "杂项-4",
+ "title": "我们将tor和比特流结合起来使用吗?",
+ "description": "<p class=\"mb-3\">我们不推荐将两者结合起来使用。更多信息请查阅我们的<mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">有关这个项目的博文</a></mark>。</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#杂项-5",
+ "control": "杂项-5",
+ "title": "我电脑上的一些文件被锁住了,有人要求我下载tor浏览器来支付赎金,赎回文件!",
+ "description": "<p class=\"mb-3\">我们十分抱歉,您应该是被恶意软件攻击了。tor项目并没有创造这个恶意软件。这个软件的作者要求您下载tor浏览器大概是因为他们想匿名的获取您的赎金。如果这是您对tor的初体验,我们了解您的心情,您大概会认为我们是纵容那些家伙的坏人。不过,我们的软件每天都被许多人使用,包括人权活动者,记者,家庭暴力幸存者,揭发者,执法机关的员工等等。不幸的是,我们软件对这些人提供的防护,同时会被罪犯以及恶意软件的作者利用。tor项目坚决不支持或者容忍恶意的使用我们的软件。</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#杂项-6",
+ "control": "杂项-6",
+ "title": "tor会留存日志吗?",
+ "description": "<p class=\"mb-3\">tor不会留存可以辨别特定用户的日志。我们会存留一些关于网络功能的日志,用于提高安全性,您可以在<mark><a href=\"https://metrics.torproject.org/\">tor的量度</a></mark>中查看到。</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#杂项-7",
+ "control": "杂项-7",
+ "title": "tor项目提供邮件服务或者其他保护隐私的互联网服务吗?",
+ "description": "<p class=\"mb-3\">抱歉,我们尚未提供任何其他的网络服务。您可以在我们的<mark><a href=\"https://www.torproject.org/projects/projects.html.en\">项目网页</a></mark>查看我们所有的软件。</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#杂项-8",
+ "control": "杂项-8",
+ "title": "我能将tor的图标用于我的产品中吗?",
+ "description": "<p class=\"mb-3\">您可以在<mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">商标问答界面</a></mark>了解一切有关我们商标的事情。</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#杂项-9",
+ "control": "杂项-9",
+ "title": "我在使用或是升级vidalia的时候出现问题。",
+ "description": "<p class=\"mb-3\">vidalia已经被废弃,不再被维护与支持。vidalia的绝大部分功能,现在已经被被整合到tor浏览器上。</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#杂项-10",
+ "control": "杂项-10",
+ "title": "tor项目提供虚拟主机服务吗?",
+ "description": "<p class=\"mb-3\">抱歉,tor项目不提供虚拟主机服务。</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#杂项-11",
+ "control": "杂项-11",
+ "title": "我能修改tor网络中的跳跃次数吗?",
+ "description": "<p class=\"mb-3\">现在路径长度被锁定为三加上您路径中敏感的节点数量。也就是说,在正常的状况下这是三。不过如果您正在访问洋葱服务或者.exit地址,它可能会更多。</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">安全攻击</a></mark>会变得更加容易。而且这只有少数用户才拥有的路径长度也会变成辨识您身份的符号。</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#杂项-12",
+ "control": "杂项-12",
+ "title": "我该怎么使用tor匿名的分享文件?",
+ "description": "<p class=\"mb-3\">许多出口节点都被设置为禁止某些特定类型的文件分享流量,比如比特流。在某些特定的情况下,tor与比特流结合使用无法维持匿名状态。</p><p class=\"mb-3\">如果您希望使用tor来分享文件,<mark><a href=\"https://onionshare.org/\">OnionShare</a></mark>是一个好选择。</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#杂项-13",
+ "control": "杂项-13",
+ "title": "我能搭配VPN使用Tor吗?",
+ "description": "<p class=\"mb-3\">通常情况下,我们不推荐搭配VPN使用Tor。除非您是懂得使用恰当配置,确保您隐私不被侵犯的高级用户。了解更多关于Tor与VPN的组合使用,请访问<mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">我们的wiki</a></mark>。</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#杂项-14",
+ "control": "杂项-14",
+ "title": "我该作为一个志愿者参与tor项目?",
+ "description": "<p class=\"mb-3\">请参见我们的<mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">志愿者页面</a></mark>以了解参与项目的方法!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#杂项-15",
+ "control": "杂项-15",
+ "title": "我该怎样向Tor Project捐款?",
+ "description": "<p class=\"mb-3\">多谢您的支持!您可以访问<mark><a href=\"https://donate.torproject.org/donor-faq\">捐款常见问题界面</a></mark>,以了解更多捐款方面的信息。</p>"
+ }
+}
diff --git a/zh_HK.json b/zh_HK.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/zh_HK.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/zh_TW.json b/zh_TW.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/zh_TW.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
diff --git a/zu.json b/zu.json
new file mode 100644
index 000000000..fe3d578cd
--- /dev/null
+++ b/zu.json
@@ -0,0 +1,92 @@
+{
+ "miscellaneus-1": {
+ "id": "#miscellaneus-1",
+ "control": "miscellaneus-1",
+ "title": "I have a compelling reason to trace a Tor user. Can you help?",
+ "description": "<p class=\"mb-3\">There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from tracking users.</p>"
+ },
+ "miscellaneus-2": {
+ "id": "#miscellaneus-2",
+ "control": "miscellaneus-2",
+ "title": "Why don't you prevent bad people from doing bad things when using Tor?",
+ "description": "<p class=\"mb-3\">Tor is designed to defend human rights and privacy by preventing anyone from censoring things, even us. We hate that there are some people who use Tor to do terrible things, but we can't do anything to get rid of them without also undermining the human rights activists, journalists, abuse survivors, and other people who use Tor for good things. If we wanted to block certain people from using Tor, we'd basically be adding a backdoor to the software, which would open up our vulnerable users to attacks from bad regimes and other adversaries.</p>"
+ },
+ "miscellaneus-3": {
+ "id": "#miscellaneus-3",
+ "control": "miscellaneus-3",
+ "title": "Who funds Tor?",
+ "description": "<p class=\"mb-3\">Tor is funded by a number of different sponsors including US federal agencies, private foundations, and individual donors. Check out a list of all <mark><a href=\"https://www.torproject.org/about/sponsors.html.en\">our sponsors</a></mark> and a series of <mark><a href=\"https://blog.torproject.org/category/tags/form-990\">blog posts</a></mark> on our financial reports.</p><p class=\"mb-3\">We feel that talking openly about our funders and funding model is the best way to maintain trust with our community. We are always seeking more diversity in our funding sources, especially from foundations and individuals.</p>"
+ },
+ "miscellaneus-4": {
+ "id": "#miscellaneus-4",
+ "control": "miscellaneus-4",
+ "title": "Can I use Tor with bittorrent?",
+ "description": "<p class=\"mb-3\">We do not recommend using Tor with bittorrent. For further details, please see our <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">blog post on the subject</a></mark>.</p>"
+ },
+ "miscellaneus-5": {
+ "id": "#miscellaneus-5",
+ "control": "miscellaneus-5",
+ "title": "The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files!",
+ "description": "<p class=\"mb-3\">We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you. If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by human rights activists, journalists, domestic violence survivors, whistleblowers, law enforcement officers, and many others. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not support or condone the use of our software for malicious purposes.</p>"
+ },
+ "miscellaneus-6": {
+ "id": "#miscellaneus-6",
+ "control": "miscellaneus-6",
+ "title": "Does Tor keep logs?",
+ "description": "<p class=\"mb-3\">Tor doesn't keep any logs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out at <mark><a href=\"https://metrics.torproject.org/\">Tor Metrics</a></mark>.</p>"
+ },
+ "miscellaneus-7": {
+ "id": "#miscellaneus-7",
+ "control": "miscellaneus-7",
+ "title": "Does Tor Project offer email service or other privacy protecting web services?",
+ "description": "<p class=\"mb-3\">No, we don't provide any online services. A list of all of our software projects can be found on our <mark><a href=\"https://www.torproject.org/projects/projects.html.en\">projects page</a></mark>.</p>"
+ },
+ "miscellaneus-8": {
+ "id": "#miscellaneus-8",
+ "control": "miscellaneus-8",
+ "title": "Can I use the Tor logo in my product?",
+ "description": "<p class=\"mb-3\">You can read all about that on our <mark><a href=\"https://www.torproject.org/docs/trademark-faq.html\">Trademark faq page</a></mark>.</p>"
+ },
+ "miscellaneus-9": {
+ "id": "#miscellaneus-9",
+ "control": "miscellaneus-9",
+ "title": "I'm having a problem updating or using Vidalia.",
+ "description": "<p class=\"mb-3\">Vidalia is no longer maintained or supported. A large portion of the features Vidalia offered have now been integrated into Tor Browser itself.</p>"
+ },
+ "miscellaneus-10": {
+ "id": "#miscellaneus-10",
+ "control": "miscellaneus-10",
+ "title": "Does the Tor Project offer hosting?",
+ "description": "<p class=\"mb-3\">No, the Tor Project does not offer hosting services.</p>"
+ },
+ "miscellaneus-11": {
+ "id": "#miscellaneus-11",
+ "control": "miscellaneus-11",
+ "title": "Can I change the number of hops Tor uses?",
+ "description": "<p class=\"mb-3\">Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a \".exit\" address it could be more.</p><p class=\"mb-3\"We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes<mark><a href=\"https://www.freehaven.net/anonbib/#ccs07-doa\">denial of security</a></mark> ttacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.</p>"
+ },
+ "miscellaneus-12": {
+ "id": "#miscellaneus-12",
+ "control": "miscellaneus-12",
+ "title": "How can I share files anonymously through Tor?",
+ "description": "<p class=\"mb-3\">Many exit nodes are configured to block certain types of file sharing traffic, such as bittorrent. Bittorrent in specific is <mark><a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">not anonymous over Tor</a></mark>.</p><p class=\"mb-3\">For sharing files through Tor, <mark><a href=\"https://onionshare.org/\">OnionShare</a></mark> is a good option.</p>"
+ },
+ "miscellaneus-13": {
+ "id": "#miscellaneus-13",
+ "control": "miscellaneus-13",
+ "title": "Can I use a VPN with Tor?",
+ "description": "<p class=\"mb-3\">Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy. You can find more detailed information about Tor + VPN at <mark><a href=\"https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN\">our wiki</a></mark>.</p>"
+ },
+ "miscellaneus-14": {
+ "id": "#miscellaneus-14",
+ "control": "miscellaneus-14",
+ "title": "How do I volunteer with Tor Project?",
+ "description": "<p class=\"mb-3\">Please see our <mark><a href=\"https://www.torproject.org/getinvolved/volunteer.html.en\">volunteer page</a></mark> for how to get involved!</p>"
+ },
+ "miscellaneus-15": {
+ "id": "#miscellaneus-15",
+ "control": "miscellaneus-15",
+ "title": "How can I donate to Tor Project?",
+ "description": "<p class=\"mb-3\">Thank you for your support! You can find more information about donating on our <mark><a href=\"https://donate.torproject.org/donor-faq\">donor FAQe</a></mark>.</p>"
+ }
+}
1
0

[translation-tools/master] Adding support-https and support-https_completed
by colin@torproject.org 09 Apr '18
by colin@torproject.org 09 Apr '18
09 Apr '18
commit f0871a6c21fa0405a5358839f58668537fa75df5
Author: Colin Childs <colin(a)torproject.org>
Date: Mon Apr 9 18:21:26 2018 -0500
Adding support-https and support-https_completed
---
config | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/config b/config
index c758449..0f262d8 100644
--- a/config
+++ b/config
@@ -38,7 +38,7 @@ tails-greeter-2 tails-greeter-2_completed exoneratorproperties
exoneratorproperties_completed tor-browser-manual
tor-browser-manual_completed support-censorship support-censorship_completed
support-connecting support-connecting_completed support-faq support-faq_completed
-support-gettor support-gettor_completed"
+support-gettor support-gettor_completed support-https support-https_completed"
PIDFILE=/srv/translation.torproject.org/run/update_translations.pid
1
0

[translation/support-https_completed] pulling translations from transifex
by translation@torproject.org 09 Apr '18
by translation@torproject.org 09 Apr '18
09 Apr '18
commit 187b14405a72963faf93b4c389effd574bcec2c4
Author: Translation commit bot <translation(a)torproject.org>
Date: Mon Apr 9 23:20:58 2018 +0000
pulling translations from transifex
---
bg.json | 8 ++++++++
ca.json | 8 ++++++++
de.json | 8 ++++++++
es.json | 8 ++++++++
fr.json | 8 ++++++++
ga.json | 8 ++++++++
id.json | 8 ++++++++
it.json | 8 ++++++++
pt_BR.json | 8 ++++++++
support-https.json | 8 ++++++++
uk.json | 8 ++++++++
zh_CN.json | 8 ++++++++
12 files changed, 96 insertions(+)
diff --git a/bg.json b/bg.json
new file mode 100644
index 000000000..a19cec0f6
--- /dev/null
+++ b/bg.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "ÐПгаÑП ОзпПлзваЌ ТПÑ, ÐŒÐŸÐ³Ð°Ñ Ð»Ðž пПЎÑлÑÑваÑОÑе вÑе ПÑе Ўа вОЎÑÑ ÐžÐœÑПÑЌаÑОÑÑа, кПÑÑП ÑпПЎелÑÐŒ ÑÑÑ ÑайÑПве, каÑП пПÑÑебОÑелÑкП ОЌе, паÑПла ОлО ÐŽÑÑгО МеÑа. кПОÑП пПпÑлваЌ вÑв ÑПÑЌО?",
+ "description": "<p class=\"mb-3\">Ð¢ÐŸÑ Ð¿ÑеЎпазва ÐŸÑ Ð²ÑзЌПжМПÑÑа пПЎÑлÑÑваÑОÑе Ўа ÐŒÐŸÐ³Ð°Ñ ÐŽÐ° МаÑÑÐ°Ñ ÑайÑПвеÑе, кПОÑП пПÑеÑаваÑе. ÐÑпÑекО ÑПва ОМÑПÑЌаÑОÑ, кПÑÑП пПпÑлваÑе в МекÑОпÑОÑаМа ÑПÑЌа пÑез ОМÑеÑМеÑ, ОзпПлзвайкО HTTP вÑе пак ЌПже ЎабÑЎе пÑеÑÑеÑМаÑа пÑО ОзÑ
ÐŸÐŽÐœÐžÑ Ð¿ÑепÑаÑÐ°Ñ ÐŸÑ ÐŸÐ¿ÐµÑаÑПÑа ÐŒÑ ÐžÐ»Ðž вÑекОгП, кПйÑП МаблÑЎава ÑÑаÑОка ÐŒÐµÐ¶ÐŽÑ ÐžÐ·Ñ
ÐŸÐŽÐœÐžÑ Ð¿ÑепÑаÑÐ°Ñ Ðž кÑÐ°Ð¹ÐœÐžÑ ÑебÑайÑ, кПйÑП пПÑеÑаваÑе. ÐкП ÑебÑайÑа ОзпПлзва HTTPS, ÑПгава ÑÑаÑОкÑÑ ÐœÐ°Ð¿ÑÑÐºÐ°Ñ ÐžÐ·Ñ
ÐŸÐŽÐœÐžÑ Ð¿ÑепÑаÑÐ°Ñ Ñе бÑЎе кÑОпÑОÑаМ О МÑЌа Ўа бÑЎе ЎПÑÑÑпеМ ЎП пПЎÑлÑÑваÑОÑе</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img c
lass=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">ÐкП ОзпПлзваÑе HTTPS, ÐаÑОÑÑ ÐžÐœÑеÑÐœÐµÑ Ð°ÐŽÑÐµÑ Ñе запПÑва Ñ \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">ÐОзÑалОзаÑОÑÑа пПказва каква ОМÑПÑЌаÑÐžÑ Ðµ ЎПÑÑÑпМа Ма пПЎÑлÑÑваÑОÑе Ñ ÐžÐ»Ðž без Ð¢ÐŸÑ Ð±ÑаÑзÑÑа О Ñ HTTPS кÑОпÑОÑаМе</h4></div></div></div></div>"
+ }
+}
diff --git a/ca.json b/ca.json
new file mode 100644
index 000000000..7fcd40d6e
--- /dev/null
+++ b/ca.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Quan utilitzo el Tor, poden esbrinar la informació que comparteixo amb els llocs web, com ara la informació d'inici de sessió i les coses que escric als formularis?",
+ "description": "<p class=\"mb-3\">El Tor us protegeix la vostra navegació de mirades indiscretes als llocs web que visiteu. Tanmateix, la informació enviada sense xifrar a Internet mitjançant HTTP bà sic, encara es pot interceptar pels relés dels operadors de de sortida o qualsevol persona que observi el trà nsit entre el relé de sortida i el lloc web de destinació. Si el lloc que esteu visitant utilitza HTTPS, el trà nsit que deixeu al relé de sortida es xifrarà i no serà visible.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Si utilitzeu HTTPS, aleshores l'URL del vostre lloc web començarà amb «https://».</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Aquesta visualització mostra
quina informació és visible amb i sense el Tor i el xifrat HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/de.json b/de.json
new file mode 100644
index 000000000..c2b78efa7
--- /dev/null
+++ b/de.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "WÀhrend ich Tor benutze, können Lauscher immer noch die Informationen sehen, die ich mit Webseiten teile, wie Login-Informationen und Dinge, die ich in Formulare eintippe?",
+ "description": "Tor stoppt Lauscher davor Ìber die Seiten die du besuchst zu lernen. Allerdings können Informationen, die unverschlÌsselt Ìber das Internet mit Hilfe von Plain-HTTP gesendet werden, weiterhin von den Betreibern der Exit-server oder jedem, der den Verkehr zwischen Ihrem Exit-server und Ihrer Ziel-seite beobachtet, abgefangen werden. Wenn die Seite, die Sie besuchen, HTTPS verwendet, dann wird der Verkehr, der Ihr Exit-server verlÀsst, verschlÌsselt und ist fÌr Lauscher nicht sichtbar. Wenn Sie HTTPS verwenden, beginnt Ihre Internetseiten-URL mit \"https://\". Diese Visualisierung zeigt, welche Informationen fÌr Lauscher mit und ohne Tor Browser und HTTPS-VerschlÌsselung sichtbar sind."
+ }
+}
diff --git a/es.json b/es.json
new file mode 100644
index 000000000..6adfcab5a
--- /dev/null
+++ b/es.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Cuando estoy usando Tor, ¿alguien a la escucha todavÃa puede ver la información que comparto con los sitios web, como la información de inicio de sesión y las cosas que escribo en los formularios?",
+ "description": "<p class=\"mb-3\">Tor protege contra que alguien a la escucha conozca los sitios que visita. Sin embargo, la información enviada sin cifrar por Internet usando HTTP simple todavÃa puede ser interceptada por los operadores de los repetidores de salida o cualquiera que observe el tráfico entre su repetidor de salida y su sitio web de destino. Si el sitio que está visitando usa HTTPS, el tráfico que abandona su repetidor de salida estará cifrado, y no será visible para quien se encuentre a la escucha.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Si está usando HTTPS, la URL de su sitio web comenzará con \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Esta vi
sualización muestra qué información es visible para alguien a la escucha con y sin el Navegador Tor y el cifrado HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/fr.json b/fr.json
new file mode 100644
index 000000000..4c1a33feb
--- /dev/null
+++ b/fr.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Quand jâutilise Tor, les systÚmes dâécoute peuvent-ils encore voir les renseignements que je partage avec les sites Web, comme les renseignements de connexion et ce que je tape dans les formulairesâ?",
+ "description": "<p class=\"mb-3\">Tor empêche aux systÚmes dâécoute de découvrir quels sites vous visitez. Cependant, les renseignements envoyés par Internet sans chiffrement en utilisant une simple connexion HTTP peuvent toujours être interceptés par les opérateurs de relais de sortie ou quiconque observe le trafic entre votre relais de sortie et votre site Web de destination. Si le site que vous visitez utilise HTTPS, le trafic quittant votre relais de sortie sera alors chiffré et invisible aux systÚmes dâécoute.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Si vous utilisez HTTPS, lâURL de votre site Web commencera par « âhttps:// ».</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"car
d-title\">Cette représentation montre quels renseignements sont visibles aux systÚmes dâécoute avec et sans le navigateur Tor et le chiffrement HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/ga.json b/ga.json
new file mode 100644
index 000000000..a6e966539
--- /dev/null
+++ b/ga.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Agus Brabhsálaà Tor in úsáid agam, an bhfuil cúléisteoirà in ann an fhaisnéis a sheolaim chuig suÃmh Ghréasáin a fheiceáil, mar shampla focail fhaire nó faisnéis a chuirim i bhfoirmeacha?",
+ "description": "<p class=\"mb-3\">NÃl cúléisteoirà in ann na suÃmh a dtugann tú cuairt orthu a fheiceáil nuair a úsáideann tú Tor. Mar sin féin, nuair a sheolann tú faisnéis neamhchriptithe trasna an IdirlÃn thar HTTP, is féidir le hoibreoirà an athsheachadáin deiridh, nó le haon duine atá ag féachaint ar an trácht idir an athsheachadán deiridh agus an suÃomh Gréasáin, an trácht sin a fheiceáil. Má úsáideann an suÃomh HTTPS, beidh an trácht idir an athsheachadán deiridh agus an suÃomh criptithe, agus nà bheidh cúléisteoirà in ann é a fheiceáil.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Má tá tú ag úsáid HTTPS, feicfidh tú \"âhttps://\" ag tús an URL.</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"http
s\"><div class=\"card-body\"><h4 class=\"card-title\">LéirÃonn an pictiúr seo an t-eolas is féidir le cúléisteoirà a fheiceáil le agus gan Brabhsálaà Tor agus criptiúchán HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/id.json b/id.json
new file mode 100644
index 000000000..b96fe6137
--- /dev/null
+++ b/id.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Saat saya menggunakan Tor, akankah pihak-pihak yang menguping melihat informasi yang saya bagikan di situs-situs, seperti informasi login dan hal-hal yang saya masukkan ke dalam formulir?",
+ "description": "<p class=\"mb-3\">Tor melindungi Anda dari pihak-pihak yang ingin mengetahui situs yang Anda kunjungi. Namun, informasi tidak terenkripsi yang terkirim lewat Internet menggunakan HTTP polos, tetap dapat ditangkap oleh operator exit relay atau siapapun yang mengamati lalu-lintas antara exit relay dan situs tujuan. Jika situsnya menggunakan HTTPS, lalu-lintas keluar dari exit relay akan terenkripsi dan tidak terlihat oleh pihak ketiga. </p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> Jika Anda menggunakan HTTPS, URL situs Anda akan dimulai dengan \n\"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> Visualisasi ini menunjukkan informasi yang terlihat oleh para penguping
, menggunakan dan tidak menggunakan Tor Browser dan enkripsi HTTPS. </h4></div></div></div></div>"
+ }
+}
diff --git a/it.json b/it.json
new file mode 100644
index 000000000..7a13c6d3f
--- /dev/null
+++ b/it.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Quando uso Tor, può qualcuno intercettare le informazioni che condivido con i siti, come le informazioni di accesso e i dati inseriti nei moduli?",
+ "description": "<p class=\"mb-3\">Tor protegge contro gli intercettatori dal sapere i siti che visiti. Comunque, le informazioni inviate su internet usando il protocollo HTTP possono essere intercettate da operatori di relay di uscita (exit node) o chiunque stia osservando il traffico tra il relay di uscita e il sito web di destinazione. Se il sito che stai visitando usa HTTPS, allora il traffico che lascia il relay di uscita sarà cifrato, e non sarà visibile da possibili intercettatori.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Se stai usando HTTPS, l'URL del sito web inizierà con \"https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Questa visualizzazione mostra quale informazione
Ú visibile agli intercettatori con e senza il Browser Tor e la cifratura HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/pt_BR.json b/pt_BR.json
new file mode 100644
index 000000000..d1295b69e
--- /dev/null
+++ b/pt_BR.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Quando eu uso Tor, alguém que me espie pode ver as informações que eu compartilho com websites, como aquelas de logins ou de formulários que eu preencho?",
+ "description": "<p class=\"mb-3\">Tor impede que outras pessoas de saberem quais sites você consulta. Mesmo assim, informações envidas sem criptografia por sites que utilizam HTTP podem ser interceptadas por operados de relés de saÃda ou por qualquer pessoa que acompanhe o tráfego entre o seu relé de saÃda e o site que você consulta. Se o site que você estiver consultando utilizar HTTPS, o tráfego que sair do seu relé de saÃda será criptografado e, assim, invisÃvel a pessoas que espionem. </p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> se você estiver usando HTTPS, a URL do seu website começará com \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Esta visualizaçÃ
£o mostra quais informações são visÃveis à s pessoas que espionem como ou sem o Navegador Tor e criptografia HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/support-https.json b/support-https.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/support-https.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/uk.json b/uk.json
new file mode 100644
index 000000000..b16b30765
--- /dev/null
+++ b/uk.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "ÐПлО Ñ ÐºÐŸÑОÑÑÑÑÑÑ Tor, ÑО ЌПжÑÑÑ Ð¿ÑÐŽÑлÑÑ
ÑваÑÑ Ð²Ñе-ÑакО баÑОÑО ÑМÑПÑЌаÑÑÑ, ÑÐºÐŸÑ Ñ ÐŽÑлÑÑÑ Ð· веб-ÑайÑаЌО, МапÑОклаЎ, ÑМÑПÑЌаÑÑÑ Ð¿ÑП вÑ
ÑÐŽ Ñа ÑМÑПÑЌаÑÑÑ, ÑÐºÑ Ñ Ð²Ð²ÐŸÐ¶Ñ Ñ ÑПÑЌО?",
+ "description": "<p class=\"mb-3\">Tor заÑ
ОÑÐ°Ñ Ð¿ÑÐŽÑлÑÑ
ÑваÑÑв вÑÐŽ вОвÑÐµÐœÐœÑ ÑайÑÑв, ÑÐºÑ Ð²Ðž вÑЎвÑÐŽÑÑÑе. ÐÑПÑе ÑМÑПÑЌаÑÑÑ, Ñка МаЎÑОлаÑÑÑÑÑ ÐœÐµÐ·Ð°ÑОÑÑÐŸÐ²Ð°ÐœÐŸÑ ÑеÑез ÐМÑеÑÐœÐµÑ Ð·Ð° ÐŽÐŸÐ¿ÐŸÐŒÐŸÐ³ÐŸÑ Ð·Ð²ÐžÑайМПгП HTTP, ЌПже пеÑеÑ
ПплÑваÑОÑÑ ÐŸÐ¿ÐµÑаÑПÑаЌО пеÑеЎаваÑÑв вОÑ
ÐŸÐŽÑ Ð°Ð±ÐŸ бÑÐŽÑ-кОЌ, Ñ
ÑП ÑпПÑÑеÑÑÐ³Ð°Ñ Ð·Ð° ÑÑаÑÑкПЌ ÐŒÑж вОÑ
ÑЎМОЌ пеÑеЎаваÑеЌ Ñа веб-ÑайÑПЌ пÑОзМаÑеММÑ. ЯкÑП веб-ÑайÑ, ÑкОй вО вÑЎвÑÐŽÑÑÑе, вОкПÑОÑÑПвÑÑ Ð¿ÑПÑПкПл HTTPS, ÑП ÑÑаÑÑк, ÑП залОÑÐ°Ñ Ð²ÐžÑ
ÑЎМОй ÑеÑÑаМÑлÑÑПÑ, бÑЎе заÑОÑÑПваМОй, Ñ Ð²ÑМ Ме бÑЎе вОЎОЌОЌ ÐŽÐ»Ñ Ð¿ÑÐŽÑлÑÑ
ÑваÑÑв.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=
\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">ЯкÑП вО вОкПÑОÑÑПвÑÑÑе HTTPS, URL-аЎÑеÑа ваÑПгП веб-ÑайÑÑ Ð¿ÐŸÑОМаÑÑÑÑÑ Ð· \"https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">ÐŠÑ Ð²ÑзÑалÑзаÑÑÑ Ð¿ÐŸÐºÐ°Ð·ÑÑ, ÑÐºÑ ÑМÑПÑЌаÑÑÑ ÐŒÐŸÐ¶ÐœÐ° пПбаÑОÑО пÑÐŽÑлÑÑ
ÑваÑаЌ з вОкПÑОÑÑаММÑÐŒ Ñ Ð±ÐµÐ· ÑОÑÑÑÐ²Ð°ÐœÐœÑ Ð±ÑаÑзеÑа Tor Ñ HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/zh_CN.json b/zh_CN.json
new file mode 100644
index 000000000..33def34d3
--- /dev/null
+++ b/zh_CN.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "åœæäœ¿çšToræ¶ïŒçªå¬è
èœå€è·åæå享ç»çœç«çä¿¡æ¯ïŒç»éä¿¡æ¯æè
å
¶ä»ä»¥è¿ç§æ ŒåŒäŒ éçä¿¡æ¯ïŒåïŒ",
+ "description": "<p class=\"mb-3\">Torä¿æ€æšçéç§ïŒå°äŒé»æ¢çªå¬è
è·åæšè®¿é®çœç«ç讯æ¯ãäœæ¯ïŒäœ¿çšHTTPåè®®äŒ èŸçæªè¢«å å¯çä¿¡æ¯å¯èœäŸæ§äŒè¢«åºå£äžç»§çææ§è
ïŒææ¯çè§åºå£äžç»§äžç®æ ç«ç¹æµéçäººææŠæªãåŠææšè®¿é®ççœç«äœ¿çšçæ¯HTTPSåè®®ïŒé£ä¹ä»åºå£äžç»§æµåºçæ°æ®å°äŒè¢«å å¯ ïŒçªå¬è
æ æ³è§£æè¿äºæ°æ®</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> åŠææšæ£åšäœ¿çšHTTPSåè®®ïŒæšè®¿é®çœç«å°ç±\"âhttps://âåŒå§ã</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> è¿äžªåšç»å±ç€ºäºïŒåšäžäœ¿çšToræµè§åšä»¥åHTTPSå å¯çæ
åµäžïŒæšçä¿¡æ¯æ¯åŠäœå¯¹çªå¬è
å
¯è§çã</h4></div></div></div></div>"
+ }
+}
1
0

[translation/support-https] pulling translations from transifex
by translation@torproject.org 09 Apr '18
by translation@torproject.org 09 Apr '18
09 Apr '18
commit e4abee34f6cc6872b53a257834704374ec0e9d7a
Author: Translation commit bot <translation(a)torproject.org>
Date: Mon Apr 9 23:19:47 2018 +0000
pulling translations from transifex
---
ach.json | 8 ++++++++
ady.json | 8 ++++++++
af.json | 8 ++++++++
ak.json | 8 ++++++++
am.json | 8 ++++++++
ar.json | 8 ++++++++
arn.json | 8 ++++++++
ast.json | 8 ++++++++
az.json | 8 ++++++++
ba.json | 8 ++++++++
be.json | 8 ++++++++
bg.json | 8 ++++++++
bn.json | 8 ++++++++
bn_BD.json | 8 ++++++++
bn_IN.json | 8 ++++++++
bo.json | 8 ++++++++
br.json | 8 ++++++++
brx.json | 8 ++++++++
bs.json | 8 ++++++++
ca.json | 8 ++++++++
ceb.json | 8 ++++++++
cs.json | 8 ++++++++
csb.json | 8 ++++++++
cv.json | 8 ++++++++
cy.json | 8 ++++++++
da.json | 8 ++++++++
de.json | 8 ++++++++
dz.json | 8 ++++++++
el.json | 8 ++++++++
en_GB.json | 8 ++++++++
eo.json | 8 ++++++++
es.json | 8 ++++++++
es_AR.json | 8 ++++++++
es_CL.json | 8 ++++++++
es_CO.json | 8 ++++++++
es_MX.json | 8 ++++++++
et.json | 8 ++++++++
eu.json | 8 ++++++++
fa.json | 8 ++++++++
fi.json | 8 ++++++++
fil.json | 8 ++++++++
fo.json | 8 ++++++++
fr.json | 8 ++++++++
fr_CA.json | 8 ++++++++
fur.json | 8 ++++++++
fy.json | 8 ++++++++
ga.json | 8 ++++++++
gd.json | 8 ++++++++
gl.json | 8 ++++++++
gu.json | 8 ++++++++
gu_IN.json | 8 ++++++++
gun.json | 8 ++++++++
ha.json | 8 ++++++++
he.json | 8 ++++++++
hi.json | 8 ++++++++
hr.json | 8 ++++++++
hr_HR.json | 8 ++++++++
ht.json | 8 ++++++++
hu.json | 8 ++++++++
hy.json | 8 ++++++++
ia.json | 8 ++++++++
id.json | 8 ++++++++
is.json | 8 ++++++++
it.json | 8 ++++++++
ja.json | 8 ++++++++
jv.json | 8 ++++++++
ka.json | 8 ++++++++
kk.json | 8 ++++++++
km.json | 8 ++++++++
kn.json | 8 ++++++++
ko.json | 8 ++++++++
ko_KR.json | 8 ++++++++
ku.json | 8 ++++++++
ku_IQ.json | 8 ++++++++
kw.json | 8 ++++++++
ky.json | 8 ++++++++
la.json | 8 ++++++++
lb.json | 8 ++++++++
lg.json | 8 ++++++++
ln.json | 8 ++++++++
lo.json | 8 ++++++++
lt.json | 8 ++++++++
lv.json | 8 ++++++++
mg.json | 8 ++++++++
mi.json | 8 ++++++++
mk.json | 8 ++++++++
ml.json | 8 ++++++++
mn.json | 8 ++++++++
mr.json | 8 ++++++++
ms_MY.json | 8 ++++++++
mt.json | 8 ++++++++
my.json | 8 ++++++++
nah.json | 8 ++++++++
nap.json | 8 ++++++++
nb.json | 8 ++++++++
nds.json | 8 ++++++++
ne.json | 8 ++++++++
nl.json | 8 ++++++++
nl_BE.json | 8 ++++++++
nn.json | 8 ++++++++
nso.json | 8 ++++++++
oc.json | 8 ++++++++
om.json | 8 ++++++++
or.json | 8 ++++++++
pa.json | 8 ++++++++
pap.json | 8 ++++++++
pl.json | 8 ++++++++
pms.json | 8 ++++++++
ps.json | 8 ++++++++
pt.json | 8 ++++++++
pt_BR.json | 8 ++++++++
ro.json | 8 ++++++++
ru.json | 8 ++++++++
ru(a)petr1708.json | 8 ++++++++
scn.json | 8 ++++++++
sco.json | 8 ++++++++
si_LK.json | 8 ++++++++
sk.json | 8 ++++++++
sk_SK.json | 8 ++++++++
sl.json | 8 ++++++++
sl_SI.json | 8 ++++++++
sn.json | 8 ++++++++
so.json | 8 ++++++++
son.json | 8 ++++++++
sq.json | 8 ++++++++
sr.json | 8 ++++++++
sr(a)latin.json | 8 ++++++++
st.json | 8 ++++++++
su.json | 8 ++++++++
support-https.json | 8 ++++++++
sv.json | 8 ++++++++
sw.json | 8 ++++++++
szl.json | 8 ++++++++
ta.json | 8 ++++++++
te.json | 8 ++++++++
te_IN.json | 8 ++++++++
tg.json | 8 ++++++++
th.json | 8 ++++++++
ti.json | 8 ++++++++
tk.json | 8 ++++++++
tr.json | 8 ++++++++
tzm.json | 8 ++++++++
ug(a)Arab.json | 8 ++++++++
uk.json | 8 ++++++++
ur.json | 8 ++++++++
ur_PK.json | 8 ++++++++
uz.json | 8 ++++++++
ve.json | 8 ++++++++
vi.json | 8 ++++++++
wa.json | 8 ++++++++
wo.json | 8 ++++++++
zh_CN.json | 8 ++++++++
zh_HK.json | 8 ++++++++
zh_TW.json | 8 ++++++++
zu.json | 8 ++++++++
155 files changed, 1240 insertions(+)
diff --git a/ach.json b/ach.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ach.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ady.json b/ady.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ady.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/af.json b/af.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/af.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ak.json b/ak.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ak.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/am.json b/am.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/am.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ar.json b/ar.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ar.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/arn.json b/arn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/arn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ast.json b/ast.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ast.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/az.json b/az.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/az.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ba.json b/ba.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ba.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/be.json b/be.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/be.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/bg.json b/bg.json
new file mode 100644
index 000000000..a19cec0f6
--- /dev/null
+++ b/bg.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "ÐПгаÑП ОзпПлзваЌ ТПÑ, ÐŒÐŸÐ³Ð°Ñ Ð»Ðž пПЎÑлÑÑваÑОÑе вÑе ПÑе Ўа вОЎÑÑ ÐžÐœÑПÑЌаÑОÑÑа, кПÑÑП ÑпПЎелÑÐŒ ÑÑÑ ÑайÑПве, каÑП пПÑÑебОÑелÑкП ОЌе, паÑПла ОлО ÐŽÑÑгО МеÑа. кПОÑП пПпÑлваЌ вÑв ÑПÑЌО?",
+ "description": "<p class=\"mb-3\">Ð¢ÐŸÑ Ð¿ÑеЎпазва ÐŸÑ Ð²ÑзЌПжМПÑÑа пПЎÑлÑÑваÑОÑе Ўа ÐŒÐŸÐ³Ð°Ñ ÐŽÐ° МаÑÑÐ°Ñ ÑайÑПвеÑе, кПОÑП пПÑеÑаваÑе. ÐÑпÑекО ÑПва ОМÑПÑЌаÑОÑ, кПÑÑП пПпÑлваÑе в МекÑОпÑОÑаМа ÑПÑЌа пÑез ОМÑеÑМеÑ, ОзпПлзвайкО HTTP вÑе пак ЌПже ЎабÑЎе пÑеÑÑеÑМаÑа пÑО ОзÑ
ÐŸÐŽÐœÐžÑ Ð¿ÑепÑаÑÐ°Ñ ÐŸÑ ÐŸÐ¿ÐµÑаÑПÑа ÐŒÑ ÐžÐ»Ðž вÑекОгП, кПйÑП МаблÑЎава ÑÑаÑОка ÐŒÐµÐ¶ÐŽÑ ÐžÐ·Ñ
ÐŸÐŽÐœÐžÑ Ð¿ÑепÑаÑÐ°Ñ Ðž кÑÐ°Ð¹ÐœÐžÑ ÑебÑайÑ, кПйÑП пПÑеÑаваÑе. ÐкП ÑебÑайÑа ОзпПлзва HTTPS, ÑПгава ÑÑаÑОкÑÑ ÐœÐ°Ð¿ÑÑÐºÐ°Ñ ÐžÐ·Ñ
ÐŸÐŽÐœÐžÑ Ð¿ÑепÑаÑÐ°Ñ Ñе бÑЎе кÑОпÑОÑаМ О МÑЌа Ўа бÑЎе ЎПÑÑÑпеМ ЎП пПЎÑлÑÑваÑОÑе</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img c
lass=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">ÐкП ОзпПлзваÑе HTTPS, ÐаÑОÑÑ ÐžÐœÑеÑÐœÐµÑ Ð°ÐŽÑÐµÑ Ñе запПÑва Ñ \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">ÐОзÑалОзаÑОÑÑа пПказва каква ОМÑПÑЌаÑÐžÑ Ðµ ЎПÑÑÑпМа Ма пПЎÑлÑÑваÑОÑе Ñ ÐžÐ»Ðž без Ð¢ÐŸÑ Ð±ÑаÑзÑÑа О Ñ HTTPS кÑОпÑОÑаМе</h4></div></div></div></div>"
+ }
+}
diff --git a/bn.json b/bn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/bn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/bn_BD.json b/bn_BD.json
new file mode 100644
index 000000000..6f9edde5a
--- /dev/null
+++ b/bn_BD.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "àŠ¯àŠàŠš àŠàŠ®àŠ¿ àŠàа àŠ¬à§àŠ¯àŠ¬àŠ¹àŠŸàŠ° àŠàаàŠàŠ¿, àŠ€àŠàŠš àŠàŠ®àŠ¿ àŠ¯à§ àŠ€àŠ¥à§àН àŠàŠ¯àŠŒà§àŠ¬àŠžàŠŸàŠàŠà§àа àŠžàŠŸàŠ¥à§ àŠ¶à§àŠ¯àŠŒàŠŸàŠ° àŠàŠ°àŠ¿, àŠ²àŠ-àŠàŠš àŠ€àŠ¥à§àН àŠàŠ¬àŠ àŠàŠ¿àŠà§ àŠàŠ®àŠ¿ àŠ«àŠ°à§àŠ®-àŠ àŠàŠŸàŠàŠªÂ àŠàŠ°àŠ¿, àŠàŠ¡àŠŒàŠ¿àŠªàŠŸàŠ€àŠàŠ°àŠŸ àŠàŠàŠšàŠ àŠžà§ àŠ€àŠ¥à§àН àŠŠà§àŠàŠ€à§Â àŠªàŠŸàŠ°à§?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/bn_IN.json b/bn_IN.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/bn_IN.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/bo.json b/bo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/bo.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/br.json b/br.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/br.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/brx.json b/brx.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/brx.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/bs.json b/bs.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/bs.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ca.json b/ca.json
new file mode 100644
index 000000000..7fcd40d6e
--- /dev/null
+++ b/ca.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Quan utilitzo el Tor, poden esbrinar la informació que comparteixo amb els llocs web, com ara la informació d'inici de sessió i les coses que escric als formularis?",
+ "description": "<p class=\"mb-3\">El Tor us protegeix la vostra navegació de mirades indiscretes als llocs web que visiteu. Tanmateix, la informació enviada sense xifrar a Internet mitjançant HTTP bà sic, encara es pot interceptar pels relés dels operadors de de sortida o qualsevol persona que observi el trà nsit entre el relé de sortida i el lloc web de destinació. Si el lloc que esteu visitant utilitza HTTPS, el trà nsit que deixeu al relé de sortida es xifrarà i no serà visible.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Si utilitzeu HTTPS, aleshores l'URL del vostre lloc web començarà amb «https://».</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Aquesta visualització mostra
quina informació és visible amb i sense el Tor i el xifrat HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/ceb.json b/ceb.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ceb.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/cs.json b/cs.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/cs.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/csb.json b/csb.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/csb.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/cv.json b/cv.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/cv.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/cy.json b/cy.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/cy.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/da.json b/da.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/da.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/de.json b/de.json
new file mode 100644
index 000000000..c2b78efa7
--- /dev/null
+++ b/de.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "WÀhrend ich Tor benutze, können Lauscher immer noch die Informationen sehen, die ich mit Webseiten teile, wie Login-Informationen und Dinge, die ich in Formulare eintippe?",
+ "description": "Tor stoppt Lauscher davor Ìber die Seiten die du besuchst zu lernen. Allerdings können Informationen, die unverschlÌsselt Ìber das Internet mit Hilfe von Plain-HTTP gesendet werden, weiterhin von den Betreibern der Exit-server oder jedem, der den Verkehr zwischen Ihrem Exit-server und Ihrer Ziel-seite beobachtet, abgefangen werden. Wenn die Seite, die Sie besuchen, HTTPS verwendet, dann wird der Verkehr, der Ihr Exit-server verlÀsst, verschlÌsselt und ist fÌr Lauscher nicht sichtbar. Wenn Sie HTTPS verwenden, beginnt Ihre Internetseiten-URL mit \"https://\". Diese Visualisierung zeigt, welche Informationen fÌr Lauscher mit und ohne Tor Browser und HTTPS-VerschlÌsselung sichtbar sind."
+ }
+}
diff --git a/dz.json b/dz.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/dz.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/el.json b/el.json
new file mode 100644
index 000000000..590fc20aa
--- /dev/null
+++ b/el.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "ÎÏαΜ ÏÏηÏιΌοÏÎ¿Î¹Ï ÏοΜ Tor, ÎŒÏοÏοÏΜ Μα Ï
ÏοκλαÏοÏΜ οι ÏληÏοÏοÏÎ¯ÎµÏ ÏοÏ
ΌοιÏάζοΌαι Ïε ιÏÏÏÏοÏοÏ
Ï, ÏÏÏÏ ÏÎ¹Ï ÏληÏοÏοÏÎ¯ÎµÏ ÏÏΜΎεÏÎ·Ï ÎºÎ±Î¹ Ïα ÏÏοιÏεία ÏοÏ
ÏληκÏÏÎ¿Î»Î¿Î³Ï Ïε ÏÏÏΌεÏ;",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/en_GB.json b/en_GB.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/en_GB.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/eo.json b/eo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/eo.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/es.json b/es.json
new file mode 100644
index 000000000..6adfcab5a
--- /dev/null
+++ b/es.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Cuando estoy usando Tor, ¿alguien a la escucha todavÃa puede ver la información que comparto con los sitios web, como la información de inicio de sesión y las cosas que escribo en los formularios?",
+ "description": "<p class=\"mb-3\">Tor protege contra que alguien a la escucha conozca los sitios que visita. Sin embargo, la información enviada sin cifrar por Internet usando HTTP simple todavÃa puede ser interceptada por los operadores de los repetidores de salida o cualquiera que observe el tráfico entre su repetidor de salida y su sitio web de destino. Si el sitio que está visitando usa HTTPS, el tráfico que abandona su repetidor de salida estará cifrado, y no será visible para quien se encuentre a la escucha.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Si está usando HTTPS, la URL de su sitio web comenzará con \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Esta vi
sualización muestra qué información es visible para alguien a la escucha con y sin el Navegador Tor y el cifrado HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/es_AR.json b/es_AR.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/es_AR.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/es_CL.json b/es_CL.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/es_CL.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/es_CO.json b/es_CO.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/es_CO.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/es_MX.json b/es_MX.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/es_MX.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/et.json b/et.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/et.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/eu.json b/eu.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/eu.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fa.json b/fa.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fa.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fi.json b/fi.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fi.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fil.json b/fil.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fil.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fo.json b/fo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fo.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fr.json b/fr.json
new file mode 100644
index 000000000..4c1a33feb
--- /dev/null
+++ b/fr.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Quand jâutilise Tor, les systÚmes dâécoute peuvent-ils encore voir les renseignements que je partage avec les sites Web, comme les renseignements de connexion et ce que je tape dans les formulairesâ?",
+ "description": "<p class=\"mb-3\">Tor empêche aux systÚmes dâécoute de découvrir quels sites vous visitez. Cependant, les renseignements envoyés par Internet sans chiffrement en utilisant une simple connexion HTTP peuvent toujours être interceptés par les opérateurs de relais de sortie ou quiconque observe le trafic entre votre relais de sortie et votre site Web de destination. Si le site que vous visitez utilise HTTPS, le trafic quittant votre relais de sortie sera alors chiffré et invisible aux systÚmes dâécoute.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Si vous utilisez HTTPS, lâURL de votre site Web commencera par « âhttps:// ».</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"car
d-title\">Cette représentation montre quels renseignements sont visibles aux systÚmes dâécoute avec et sans le navigateur Tor et le chiffrement HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/fr_CA.json b/fr_CA.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fr_CA.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fur.json b/fur.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fur.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fy.json b/fy.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fy.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ga.json b/ga.json
new file mode 100644
index 000000000..a6e966539
--- /dev/null
+++ b/ga.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Agus Brabhsálaà Tor in úsáid agam, an bhfuil cúléisteoirà in ann an fhaisnéis a sheolaim chuig suÃmh Ghréasáin a fheiceáil, mar shampla focail fhaire nó faisnéis a chuirim i bhfoirmeacha?",
+ "description": "<p class=\"mb-3\">NÃl cúléisteoirà in ann na suÃmh a dtugann tú cuairt orthu a fheiceáil nuair a úsáideann tú Tor. Mar sin féin, nuair a sheolann tú faisnéis neamhchriptithe trasna an IdirlÃn thar HTTP, is féidir le hoibreoirà an athsheachadáin deiridh, nó le haon duine atá ag féachaint ar an trácht idir an athsheachadán deiridh agus an suÃomh Gréasáin, an trácht sin a fheiceáil. Má úsáideann an suÃomh HTTPS, beidh an trácht idir an athsheachadán deiridh agus an suÃomh criptithe, agus nà bheidh cúléisteoirà in ann é a fheiceáil.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Má tá tú ag úsáid HTTPS, feicfidh tú \"âhttps://\" ag tús an URL.</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"http
s\"><div class=\"card-body\"><h4 class=\"card-title\">LéirÃonn an pictiúr seo an t-eolas is féidir le cúléisteoirà a fheiceáil le agus gan Brabhsálaà Tor agus criptiúchán HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/gd.json b/gd.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gd.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/gl.json b/gl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gl.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/gu.json b/gu.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gu.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/gu_IN.json b/gu_IN.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gu_IN.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/gun.json b/gun.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gun.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ha.json b/ha.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ha.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/he.json b/he.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/he.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/hi.json b/hi.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hi.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/hr.json b/hr.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hr.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/hr_HR.json b/hr_HR.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hr_HR.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ht.json b/ht.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ht.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/hu.json b/hu.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hu.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/hy.json b/hy.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hy.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ia.json b/ia.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ia.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/id.json b/id.json
new file mode 100644
index 000000000..b96fe6137
--- /dev/null
+++ b/id.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Saat saya menggunakan Tor, akankah pihak-pihak yang menguping melihat informasi yang saya bagikan di situs-situs, seperti informasi login dan hal-hal yang saya masukkan ke dalam formulir?",
+ "description": "<p class=\"mb-3\">Tor melindungi Anda dari pihak-pihak yang ingin mengetahui situs yang Anda kunjungi. Namun, informasi tidak terenkripsi yang terkirim lewat Internet menggunakan HTTP polos, tetap dapat ditangkap oleh operator exit relay atau siapapun yang mengamati lalu-lintas antara exit relay dan situs tujuan. Jika situsnya menggunakan HTTPS, lalu-lintas keluar dari exit relay akan terenkripsi dan tidak terlihat oleh pihak ketiga. </p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> Jika Anda menggunakan HTTPS, URL situs Anda akan dimulai dengan \n\"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> Visualisasi ini menunjukkan informasi yang terlihat oleh para penguping
, menggunakan dan tidak menggunakan Tor Browser dan enkripsi HTTPS. </h4></div></div></div></div>"
+ }
+}
diff --git a/is.json b/is.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/is.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/it.json b/it.json
new file mode 100644
index 000000000..7a13c6d3f
--- /dev/null
+++ b/it.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Quando uso Tor, può qualcuno intercettare le informazioni che condivido con i siti, come le informazioni di accesso e i dati inseriti nei moduli?",
+ "description": "<p class=\"mb-3\">Tor protegge contro gli intercettatori dal sapere i siti che visiti. Comunque, le informazioni inviate su internet usando il protocollo HTTP possono essere intercettate da operatori di relay di uscita (exit node) o chiunque stia osservando il traffico tra il relay di uscita e il sito web di destinazione. Se il sito che stai visitando usa HTTPS, allora il traffico che lascia il relay di uscita sarà cifrato, e non sarà visibile da possibili intercettatori.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Se stai usando HTTPS, l'URL del sito web inizierà con \"https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Questa visualizzazione mostra quale informazione
Ú visibile agli intercettatori con e senza il Browser Tor e la cifratura HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/ja.json b/ja.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ja.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/jv.json b/jv.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/jv.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ka.json b/ka.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ka.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/kk.json b/kk.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/kk.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/km.json b/km.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/km.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/kn.json b/kn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/kn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ko.json b/ko.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ko.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ko_KR.json b/ko_KR.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ko_KR.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ku.json b/ku.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ku.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ku_IQ.json b/ku_IQ.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ku_IQ.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/kw.json b/kw.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/kw.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ky.json b/ky.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ky.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/la.json b/la.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/la.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/lb.json b/lb.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lb.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/lg.json b/lg.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lg.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ln.json b/ln.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ln.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/lo.json b/lo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lo.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/lt.json b/lt.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lt.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/lv.json b/lv.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lv.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/mg.json b/mg.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mg.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/mi.json b/mi.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mi.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/mk.json b/mk.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mk.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ml.json b/ml.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ml.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/mn.json b/mn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/mr.json b/mr.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mr.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ms_MY.json b/ms_MY.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ms_MY.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/mt.json b/mt.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mt.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/my.json b/my.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/my.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nah.json b/nah.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nah.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nap.json b/nap.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nap.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nb.json b/nb.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nb.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nds.json b/nds.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nds.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ne.json b/ne.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ne.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nl.json b/nl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nl.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nl_BE.json b/nl_BE.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nl_BE.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nn.json b/nn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nso.json b/nso.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nso.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/oc.json b/oc.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/oc.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/om.json b/om.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/om.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/or.json b/or.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/or.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/pa.json b/pa.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pa.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/pap.json b/pap.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pap.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/pl.json b/pl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pl.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/pms.json b/pms.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pms.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ps.json b/ps.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ps.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/pt.json b/pt.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pt.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/pt_BR.json b/pt_BR.json
new file mode 100644
index 000000000..d1295b69e
--- /dev/null
+++ b/pt_BR.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Quando eu uso Tor, alguém que me espie pode ver as informações que eu compartilho com websites, como aquelas de logins ou de formulários que eu preencho?",
+ "description": "<p class=\"mb-3\">Tor impede que outras pessoas de saberem quais sites você consulta. Mesmo assim, informações envidas sem criptografia por sites que utilizam HTTP podem ser interceptadas por operados de relés de saÃda ou por qualquer pessoa que acompanhe o tráfego entre o seu relé de saÃda e o site que você consulta. Se o site que você estiver consultando utilizar HTTPS, o tráfego que sair do seu relé de saÃda será criptografado e, assim, invisÃvel a pessoas que espionem. </p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> se você estiver usando HTTPS, a URL do seu website começará com \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Esta visualizaçÃ
£o mostra quais informações são visÃveis à s pessoas que espionem como ou sem o Navegador Tor e criptografia HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/ro.json b/ro.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ro.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ru.json b/ru.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ru.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ru(a)petr1708.json b/ru(a)petr1708.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ru(a)petr1708.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/scn.json b/scn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/scn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sco.json b/sco.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sco.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/si_LK.json b/si_LK.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/si_LK.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sk.json b/sk.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sk.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sk_SK.json b/sk_SK.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sk_SK.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sl.json b/sl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sl.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sl_SI.json b/sl_SI.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sl_SI.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sn.json b/sn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/so.json b/so.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/so.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/son.json b/son.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/son.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sq.json b/sq.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sq.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sr.json b/sr.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sr.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sr(a)latin.json b/sr(a)latin.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sr(a)latin.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/st.json b/st.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/st.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/su.json b/su.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/su.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/support-https.json b/support-https.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/support-https.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sv.json b/sv.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sv.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sw.json b/sw.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sw.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/szl.json b/szl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/szl.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ta.json b/ta.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ta.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/te.json b/te.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/te.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/te_IN.json b/te_IN.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/te_IN.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/tg.json b/tg.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/tg.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/th.json b/th.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/th.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ti.json b/ti.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ti.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/tk.json b/tk.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/tk.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/tr.json b/tr.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/tr.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/tzm.json b/tzm.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/tzm.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ug(a)Arab.json b/ug(a)Arab.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ug(a)Arab.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/uk.json b/uk.json
new file mode 100644
index 000000000..b16b30765
--- /dev/null
+++ b/uk.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "ÐПлО Ñ ÐºÐŸÑОÑÑÑÑÑÑ Tor, ÑО ЌПжÑÑÑ Ð¿ÑÐŽÑлÑÑ
ÑваÑÑ Ð²Ñе-ÑакО баÑОÑО ÑМÑПÑЌаÑÑÑ, ÑÐºÐŸÑ Ñ ÐŽÑлÑÑÑ Ð· веб-ÑайÑаЌО, МапÑОклаЎ, ÑМÑПÑЌаÑÑÑ Ð¿ÑП вÑ
ÑÐŽ Ñа ÑМÑПÑЌаÑÑÑ, ÑÐºÑ Ñ Ð²Ð²ÐŸÐ¶Ñ Ñ ÑПÑЌО?",
+ "description": "<p class=\"mb-3\">Tor заÑ
ОÑÐ°Ñ Ð¿ÑÐŽÑлÑÑ
ÑваÑÑв вÑÐŽ вОвÑÐµÐœÐœÑ ÑайÑÑв, ÑÐºÑ Ð²Ðž вÑЎвÑÐŽÑÑÑе. ÐÑПÑе ÑМÑПÑЌаÑÑÑ, Ñка МаЎÑОлаÑÑÑÑÑ ÐœÐµÐ·Ð°ÑОÑÑÐŸÐ²Ð°ÐœÐŸÑ ÑеÑез ÐМÑеÑÐœÐµÑ Ð·Ð° ÐŽÐŸÐ¿ÐŸÐŒÐŸÐ³ÐŸÑ Ð·Ð²ÐžÑайМПгП HTTP, ЌПже пеÑеÑ
ПплÑваÑОÑÑ ÐŸÐ¿ÐµÑаÑПÑаЌО пеÑеЎаваÑÑв вОÑ
ÐŸÐŽÑ Ð°Ð±ÐŸ бÑÐŽÑ-кОЌ, Ñ
ÑП ÑпПÑÑеÑÑÐ³Ð°Ñ Ð·Ð° ÑÑаÑÑкПЌ ÐŒÑж вОÑ
ÑЎМОЌ пеÑеЎаваÑеЌ Ñа веб-ÑайÑПЌ пÑОзМаÑеММÑ. ЯкÑП веб-ÑайÑ, ÑкОй вО вÑЎвÑÐŽÑÑÑе, вОкПÑОÑÑПвÑÑ Ð¿ÑПÑПкПл HTTPS, ÑП ÑÑаÑÑк, ÑП залОÑÐ°Ñ Ð²ÐžÑ
ÑЎМОй ÑеÑÑаМÑлÑÑПÑ, бÑЎе заÑОÑÑПваМОй, Ñ Ð²ÑМ Ме бÑЎе вОЎОЌОЌ ÐŽÐ»Ñ Ð¿ÑÐŽÑлÑÑ
ÑваÑÑв.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=
\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">ЯкÑП вО вОкПÑОÑÑПвÑÑÑе HTTPS, URL-аЎÑеÑа ваÑПгП веб-ÑайÑÑ Ð¿ÐŸÑОМаÑÑÑÑÑ Ð· \"https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">ÐŠÑ Ð²ÑзÑалÑзаÑÑÑ Ð¿ÐŸÐºÐ°Ð·ÑÑ, ÑÐºÑ ÑМÑПÑЌаÑÑÑ ÐŒÐŸÐ¶ÐœÐ° пПбаÑОÑО пÑÐŽÑлÑÑ
ÑваÑаЌ з вОкПÑОÑÑаММÑÐŒ Ñ Ð±ÐµÐ· ÑОÑÑÑÐ²Ð°ÐœÐœÑ Ð±ÑаÑзеÑа Tor Ñ HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/ur.json b/ur.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ur.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ur_PK.json b/ur_PK.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ur_PK.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/uz.json b/uz.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/uz.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ve.json b/ve.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ve.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/vi.json b/vi.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/vi.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/wa.json b/wa.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/wa.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/wo.json b/wo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/wo.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/zh_CN.json b/zh_CN.json
new file mode 100644
index 000000000..33def34d3
--- /dev/null
+++ b/zh_CN.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "åœæäœ¿çšToræ¶ïŒçªå¬è
èœå€è·åæå享ç»çœç«çä¿¡æ¯ïŒç»éä¿¡æ¯æè
å
¶ä»ä»¥è¿ç§æ ŒåŒäŒ éçä¿¡æ¯ïŒåïŒ",
+ "description": "<p class=\"mb-3\">Torä¿æ€æšçéç§ïŒå°äŒé»æ¢çªå¬è
è·åæšè®¿é®çœç«ç讯æ¯ãäœæ¯ïŒäœ¿çšHTTPåè®®äŒ èŸçæªè¢«å å¯çä¿¡æ¯å¯èœäŸæ§äŒè¢«åºå£äžç»§çææ§è
ïŒææ¯çè§åºå£äžç»§äžç®æ ç«ç¹æµéçäººææŠæªãåŠææšè®¿é®ççœç«äœ¿çšçæ¯HTTPSåè®®ïŒé£ä¹ä»åºå£äžç»§æµåºçæ°æ®å°äŒè¢«å å¯ ïŒçªå¬è
æ æ³è§£æè¿äºæ°æ®</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> åŠææšæ£åšäœ¿çšHTTPSåè®®ïŒæšè®¿é®çœç«å°ç±\"âhttps://âåŒå§ã</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> è¿äžªåšç»å±ç€ºäºïŒåšäžäœ¿çšToræµè§åšä»¥åHTTPSå å¯çæ
åµäžïŒæšçä¿¡æ¯æ¯åŠäœå¯¹çªå¬è
å
¯è§çã</h4></div></div></div></div>"
+ }
+}
diff --git a/zh_HK.json b/zh_HK.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/zh_HK.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/zh_TW.json b/zh_TW.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/zh_TW.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/zu.json b/zu.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/zu.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"âhttps://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
1
0

09 Apr '18
commit 914f15596645632863afbd88f1ecb528705b9474
Author: Colin Childs <colin(a)torproject.org>
Date: Mon Apr 9 18:05:50 2018 -0500
adding support-gettor and _completed
---
config | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/config b/config
index 5654fcb..c758449 100644
--- a/config
+++ b/config
@@ -37,7 +37,8 @@ tor-messenger-uiproperties tor-messenger-uiproperties_completed
tails-greeter-2 tails-greeter-2_completed exoneratorproperties
exoneratorproperties_completed tor-browser-manual
tor-browser-manual_completed support-censorship support-censorship_completed
-support-connecting support-connecting_completed support-faq support-faq_completed"
+support-connecting support-connecting_completed support-faq support-faq_completed
+support-gettor support-gettor_completed"
PIDFILE=/srv/translation.torproject.org/run/update_translations.pid
1
0

[translation/support-gettor_completed] pulling translations from transifex
by translation@torproject.org 09 Apr '18
by translation@torproject.org 09 Apr '18
09 Apr '18
commit bc5b989b2b6dd9c10c4b8be49edaba29258cae7c
Author: Translation commit bot <translation(a)torproject.org>
Date: Mon Apr 9 23:05:16 2018 +0000
pulling translations from transifex
---
ca.json | 26 ++++++++++++++++++++++++++
de.json | 26 ++++++++++++++++++++++++++
es.json | 26 ++++++++++++++++++++++++++
fr.json | 26 ++++++++++++++++++++++++++
ga.json | 26 ++++++++++++++++++++++++++
id.json | 26 ++++++++++++++++++++++++++
ms_MY.json | 26 ++++++++++++++++++++++++++
pt_BR.json | 26 ++++++++++++++++++++++++++
ro.json | 26 ++++++++++++++++++++++++++
support-gettor.json | 26 ++++++++++++++++++++++++++
sv.json | 26 ++++++++++++++++++++++++++
uk.json | 26 ++++++++++++++++++++++++++
zh_CN.json | 26 ++++++++++++++++++++++++++
13 files changed, 338 insertions(+)
diff --git a/ca.json b/ca.json
new file mode 100644
index 000000000..52217ac0b
--- /dev/null
+++ b/ca.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Com puc baixar el Tor si el torproject.org està blocat?",
+ "description": "<p class=\"mb-3\">Si no podeu baixar el Tor a través del nostre <mark><a href=\"https://www.torproject.org\">lloc web</a></mark>, podeu obtindre'n una copia a través del GetTor. El GetTor és un servei que respon automàticament als missatges amb enllaços a la última versió del Tor Browser, hostatjada en una gran varietat d'ubicacions que segurament no estiguin blocades, com ara Dropbox, Google Drive i Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Per a utilitzar el GetTor via correu electrònic.",
+ "description": "<p class=\"mb-3\">Envieu un correu electrònic a gettor(a)torproject.org. Escriviu el vostre sistema operatiu (p.e. Windows, macOS o Linux) en el cos del missatge i envieu-lo. El GetTor us respondrà amb un altre correu que contindrà els enllaços des dels que podreu baixar el Tor Browser, la signatura criptogràfica (necessària per a verificar la baixada) [enllaç a la definició del glossari de la signatura criptogràfica, instruccions per a la verificació], l'empremta de la clau utilitzada per a crear la signatura, i la suma de verificació del paquet. Se us oferirà triar entre programari de «32-bit» o «64-bit»: depèn del model de l'ordinador que esteu utilitzant; consulteu la seva documentació per a més informació.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Per a utilitzar el GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">Per a obtenir enllaços per a baixar el Tor Browser, envieu un missatge directe a <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> amb un dels codis següents (no cal que seguiu eixe compte):</p> <p class=\"mb-3\"><ul><li>Linux</li><li>macOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Per a utilitzar el GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Per a obtenir enllaços per a baixar el Tor Browser, envieu un missatge a gettor@torproject(dot)org amb un dels codis següents:</p><p class=\"mb-3\"><ul><li>Linux</li><li>macOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/de.json b/de.json
new file mode 100644
index 000000000..a60827de9
--- /dev/null
+++ b/de.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Wie kann ich Tor herunterladen, wenn torproject.org blockiert ist?",
+ "description": "<p class=\"mb-3\">Wenn du Tor über unsere <mark><a href=\"https://www.torproject.org\">Website</a></mark> nicht herunterladen kannst, ist es möglich sich einen alternativen Download-Link von Tor über GetTor zusenden zu lassen. GetTor ist ein Dienst der automatisch auf Nachrichten mit Links zur aktuellsten Version des Tor Browsers antwortet, die an verschiedenen Orten wie Dropbox, Google Drive und GitHub gehostet werden.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Um GetTor über E-Mail zu nutzen.",
+ "description": "<p class=\"mb-3\">Sende eine E-Mail an gettor(a)torproject.org mit dem gewünschten Betriebssystem im Betreff (z.B. Windows, MacOS oder Linux) und GetTor wird mit einer E-Mail antworten, die die Download-Links enthalten, um das Tor-Browser-Paket herunterladen zu können. Im Paket enhalten sind neben dem Tor Browser selbst die Kryptographische Signatur, welche benötigt wird um die heruntergeladenen Inhalte zu verifizieren ([link to glossary definition of cryptographic signature; instructions for verification]), sowie der Fingerabdruck, der benutzt wurde um die Signatur zu erzeugen und die Paket-Prüfsumme. Unter Umständen wird Ihnen eine Auswahl zwischen der 32-bit oder 64-bit Anwendung angeboten, dies hängt vom Modell des Computers ab, den Sie benutzen.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Um GetTor über Twitter zu nutzen.",
+ "description": "<p class=\"mb-3\">Um Links zum Herunterladen von Tor Browser zu erhalten, sende eine direkte Nachricht an <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark>mit einem der folgenden Codes darin (du musst dafür dem Konto nicht folgen):</p><p class=\"mb-3\"><ul><li>Linux</li>, <li>MacOS (OS X)</li> oder <li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Um GetTor über XMPP (Tor Messenger, Jitsi, CoyIM) zu nutzen.",
+ "description": "<p class=\"mb-3\">Um Links zum Herunterladen von Tor Browser zu erhalten, sende eine Nachricht an gettor@toproject(dot)org mit einem der folgenden Codes darin:</p><p class=\"mb-3\"><ul><li>Linux</li>, <li>MacOS (OS X)</li> oder <li>Windows</li></ul></p>"
+ }
+}
diff --git a/es.json b/es.json
new file mode 100644
index 000000000..124182512
--- /dev/null
+++ b/es.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "¿Cómo descargo Tor si torproject.org está bloqueada?",
+ "description": "<p class=\\\"mb-3\\\">Si no puedes descargar Tor a través de nuestro <mark><a href=\\\"https://www.torproject.org\\\">sitio web</a></mark>, puedes obtener una copia de Tor que se te entregará vía GetTor. GetTor es un servicio que responde automáticamente a los mensajes con enlaces a la versión más reciente del Navegador Tor, alojada en distintas ubicaciones, que es menos probable que estén censuradas, como Dropbox, Google Drive, y GitHub.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Usar GetTor vía correo electrónico.",
+ "description": "<p class=\"mb-3\">Envíe un correo a gettor(a)torproject.org. Indique su sistema operativo (como Windows, MacOS (OS X), o Linux) en el cuerpo del mensaje, y envíelo. GetTor responderá con un correo conteniendo enlaces desde los que puede descargar el Navegador Tor, la firma criptográfica (necesaria para verificar la descarga) [enlace a la definición de glosario de la firma criptográfica; instrucciones para la verificación], la huella de validación (fingerprint) de la clave usada para crear la firma, y la suma de verificación (checksum) del paquete. Puede que le sea ofrecida una elección entre software de “32-bits” o “64-bits”: esto depende del modelo concreto de equipo que esté usando; consulte documentación sobre su computadora para averiguar más.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Usar GetTor vía Twitter.",
+ "description": "<p class=\"mb-3\">Para obtener enlaces para descargar el Navegador Tor, envíe un mensaje directo a <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> con uno de los siguientes códigos en él (no necesita seguir la cuenta en Twitter):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Para usar GetTor a través de XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Para obtener enlaces que permitan descargar el Navegador Tor, manda un mensaje a gettor@toproject(punto)org con uno de los siguientes códigos en él:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/fr.json b/fr.json
new file mode 100644
index 000000000..27cb6bc54
--- /dev/null
+++ b/fr.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Comment puis-je télécharger Tor si torproject.org est bloqué ?",
+ "description": "<p class=\"mb-3\">Si vous ne pouvez pas télécharger Tor à partir de notre <mark><a href=\"https://www.torproject.org\">site Web</a></mark>, une exemplaire de Tor peut vous être livré par GetTor. GetTor est un service qui répond automatiquement aux messages en incluant des liens vers la dernière version du navigateur Tor, hébergée en divers endroits tels que Dropbox, Google Disque et GitHub.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Pour utiliser GetTor par courriel.",
+ "description": "<p class=\"mb-3\">Envoyez un courriel à gettor(a)torproject.org. Indiquez votre système d’exploitation (comme Windows, macOS [OS X] ou Linux) dans le corps du message et envoyez-le. GetTor répondra par un courriel contenant des liens à partir desquels vous pourrez télécharger le navigateur Tor, la signature cryptographique (exigée pour contrôler le téléchargement) [lien vers la définition d’une signature cryptographique dans le glossaire ; instructions de vérification], l’empreinte de la clé utilisée pour la signature ainsi que la somme de contrôle du paquet. Selon le modèle d’ordinateur que vous utilisez, le choix entre un logiciel 32 bits ou 64 bits vous sera proposé ; consulter la documentation de votre ordinateur pour en apprendre davantage.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Pour utiliser GetTor par Twitter.",
+ "description": "<p class=\"mb-3\">Pour obtenir des liens pour télécharger le navigateur Tor, envoyez un message direct à <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> en incluant l’un des codes suivants (vous n’avez pas à suivre le compte) :</p><p class=\"mb-3\"><ul><li>Linux</li><li>macOS (OS X)</li><li>Windows</li></ul></p>\n"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Pour utiliser GetTor par XMPP (messager Tor, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Pour obtenir des liens pour télécharger le navigateur Tor, envoyez un message à gettor@toproject(dot)org en incluant l’un des codes suivants :</p><p class=\"mb-3\"><ul><li>Linux</li><li>macOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ga.json b/ga.json
new file mode 100644
index 000000000..6c8aa25b9
--- /dev/null
+++ b/ga.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Conas is féidir Tor a íoslódáil má tá cosc ar torproject.org?",
+ "description": "<p class=\"mb-3\">Mura bhfuil tú in ann Tor a íoslódáil ónár <mark><a href=\"https://www.torproject.org\">suíomh Gréasáin</a></mark>, is féidir leat Tor a fháil trí sheirbhís GetTor. Is éard atá ann ná seirbhís a thugann freagra ar theachtaireachtaí le nascanna leis an leagan is déanaí de Bhrabhsálaí Tor, óstáilte in áiteanna nach ndéantar cinsireacht orthu rómhinic, mar shampla Dropbox, Google Drive, nó Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Le GetTor a úsáid trí ríomhphost.",
+ "description": "<p class=\"mb-3\">Seol teachtaireacht r-phoist chuig gettor(a)torproject.org. Cuir ainm do chóras oibriúcháin (mar shampla, Windows, MacOS (OS X), nó Linux) i gcorp na teachtaireachta. Tabharfaidh GetTor freagra ina bhfuil nasc íoslódála do Bhrabhsálaí Tor, síniú cripteagrafach (ag teastáil leis an íoslódáil a dheimhniú) [gluais], méarlorg na heochrach a úsáideadh chun an síniú a dhéanamh, agus suim sheiceála an phacáiste. Seans go mbeidh rogha agat idir leagan \"32-bit\" nó \"64-bit\"; braitheann sé sin ar an sórt ríomhaire atá agat. Féach ar dhoiciméadú do ríomhaire chun tuilleadh eolais a fháil.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Le GetTor a úsáid trí Twitter.",
+ "description": "<p class=\"mb-3\">Le nasc íoslódála do Bhrabhsálaí Tor a fháil, seol teachtaireacht dhíreach chuig <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> a bhfuil ceann de na cóid seo a leanas inti (ní gá duit an cuntas a leanúint):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Le GetTor a úsáid trí XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Le nasc íoslódála do Bhrabhsálaí Tor a fháil, seol teachtaireacht r-phoist chuig gettor@toproject(ponc)org a bhfuil ceann de na cóid seo a leanas inti:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/id.json b/id.json
new file mode 100644
index 000000000..cd382ba8d
--- /dev/null
+++ b/id.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Bagaimana cara mengunduh Tor jika torproject.org diblokir?",
+ "description": "<p class=\"mb-3\">Jika Anda tidak dapat mengunduh Tor dari <mark><a href=\"https://www.torproject.org\">situs web kami</a></mark>, Tor dapat dikirim kepada Anda melalui GetTor. GetTor adalah service yang yang otomatis merespon pesan berisi tautan ke versi terakhir Tor Browser, yang dihosting di lokasi beragam sehingga kemungkinan kecil disensor, seperti Dropbox, Google Drive, dan Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Menggunakan GetTor lewat email:",
+ "description": "<p class=\"mb-3\">Kirim email ke gettor(a)torproject.org.. Tulis sistem operasi yang digunakan (seperti Windows, MacOS (OSX), atau Linux) di isi pesan lalu kirimkan emailnya. GetTor akan merespon dengan email yang memuat tautan dari sumber pengunduh paket Tor Browser, tanda tangan kriptografi (diperlukan untuk memverikasi unduhan), [tautan ke definisi glossary dari tanda tangan kriptografi; instruksi untuk verifikasi], sidik jari yang akan digunakan untuk membuat tanda tangan, dan paket checksum. Anda akan di tawarkan dengan dua pilihan perangkat lunak: '32 bit\" atau 64 bit. Pilihan ini tergantung dengan model komputer yang anda gunakan; silakan baca dokumentasi tentang komputer Anda untuk informasi lebih lanjut.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Mengunakan GetTor melalui Twitter",
+ "description": "<p class=\"mb-3\">Untuk mendapatkan tautan untuk mengunduh Tor Browser, kirim DM ke <mark><a href=\"https://twitter.com/get_tor\">@get_to</a></mark>yang berisi salah satu kode berikut ini (Anda tidak perlu mengikuti akun Twitter tersebut): </p><p class=\"mb-3\"><ul><li>Linux </li><li> MacOS (OS X) </li><li> Windows </li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Menggunakan GetTor melalui XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Untuk mendapatkan tautan untuk mengunduh Tor Browser, kirim pesan ke gettor@toproject(dot)org yang berisi salah satu kode berikut ini: </p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X) </li><li>Windows </li></ul></p>"
+ }
+}
diff --git a/ms_MY.json b/ms_MY.json
new file mode 100644
index 000000000..58f279c15
--- /dev/null
+++ b/ms_MY.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Bagaimana saya boleh memuat turun Tor jika torproject.org telah disekat?",
+ "description": "<p class=\"mb-3\">Jika anda tidak boleh memuat turun Tor melalui <mark><a href=\"https://www.torproject.org\">laman sesawang</a></mark> kami, anda boleh dapatkan satu salinan Tor yang dihantar terus menerusi GetTor. GetTor merupakan servis yang membalas secara automatik mesej dengan pautan ke versi terkini Pelayar Tor, telah dihos dengan pada pelbagai lokasi yang berkemungkinan tidak ditapis, seperti Dropbox, Google Drive, dan Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Menggunakan GetTor melalui emel.",
+ "description": "<p class=\"mb-3\">Hantar emel kepada gettor(a)torproject.org. Tulis sistem pengoperasian anda (seperti windows, MacOS (OS X), atau linux) dalam badan teks kemudian hantar. GetTor akan membalas emel yang mengandungi pautan yang boleh memuat turun Pelayar Tor, tandatangan kriptografik (diperlukan untuk memuat turun) [pautan ke definasi glosari bagi tandatangan kriptografik; arahan untuk pengesahan], capjari kunci yang digunakan untuk membuat tandatangan, dan hasil tambah semak pakej. Anda mungkin ditawarkan sama ada perisian “32-bit” atau “64-bit”: ia bergantung pada model komputer yang anda guna; rujuk dokumentasi berkenaan komputer untuk mengetahuinya dengan lebih lanjut.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Menggunakan GetTor melalui Twitter.",
+ "description": "<p class=\"mb-3\">Untuk mendapatkan pautan muat turun Pelayar Tor, hantar mesej kepada <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> dengan salah satu kod berikut di dalamnya (anda tidak perlu mengikuti akaun):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Menggunakan GetTor melalui XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Untuk mendapatkan pautan muat turun Pelayar Tor, hantar mesej kepada gettor@toproject(dot)org dengan salah satu kod berikut di dalamnya:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/pt_BR.json b/pt_BR.json
new file mode 100644
index 000000000..df8d9f4f7
--- /dev/null
+++ b/pt_BR.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Como eu baixo Tor caso torproject.org esteja bloqueado?",
+ "description": "<p class=\"mb-3\">Se você não conseguir fazer download do Tor usando nosso <mark><a href=\"https://www.torproject.org\">website</a></mark>, é possível obter uma cópia do Tor via GetTor. GetTor é um serviço que responde automaticamente a mensagens com links para a última versão do Navegador Tor, hospedado em diversas localidades menos censuradas, como Dropbox, Google Drive e GitHub.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Usar GetTor via e-mail.",
+ "description": "<p class=\"mb-3\">Envie um e-mail para gettor(a)torproject.org. Informe seu sistema operacional (como Windows, macOS (OS X) ou Linux) no corpo da mensagem e envie. GetTor irá responder com um e-mail contendo links a partir dos quais você poderá fazer o download do Navegador Tor, da assinatura critpográfica (necessária para verificação do download) [link para a definição do glossário de assinatura criptográfica; instruções para verificação], a impressão digital da chave utilizada para fazer a assinatura e a checksum do pacote. É possível que lhe peçam para escolher entre o software \"32-bit\" ou \"64-bit\": isso depende do modelo do computador que você estiver utilizando. Consulte a documentação sobre seu computador para saber mais. </p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Usar GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">Para conseguir links para o download do Tor Browser, envie uma mensagem direta para <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> contendo um dos códigos seguintes (você não precisa seguir a conta no twitter): </p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li> Windows </li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Usar GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Para obter links para o download do Navegador Tor envie uma mensagem direta para gettor@torproject(dot)org contendo um dos códigos seguintes:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ro.json b/ro.json
new file mode 100644
index 000000000..1535f215e
--- /dev/null
+++ b/ro.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Cum descarc Tor dacă torproject.org e blocat?",
+ "description": "<p class=\"mb-3\">Dacă nu poți descărca Tor din <mark><a href=\"https://www.torproject.org\">website</a></mark>, poți obține o o copie a Tor prin intermediul GetTor. GetTor e un serviciu care răspunde automat la mesaje cu legături către ultima versiune de Tor Browser stocata într-o varietate de locuri mai puțin probabil de a fi cenzurate, cum ar fi Dropbox, Google Drive sau Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Cum folosești GetTor prin email.",
+ "description": "<p class=\"mb-3\">Trimite un email la gettor(a)torproject.org. Scrie sistemul tău de operare (Windows, MacOS (OS X), or linux) în corpul mesajului și trimite. GetTor va răspunde cu un email conținînd link-uri de unde poți descărca Tor Browser, semnătura digitală (necesară pentru a verifica descărcarea) [link spre definiția semnăturii digitale; instrucțiuni de verificare], amprenta cheii folosite la semnătură, și suma de control a pachetului. Ți se pot oferi variante ale softului pe “32-bit” sau “64-bit”: aceasta depinde de modelul computerului pe care îl folosești; verifică documentația computerului pentru a afla mai multe.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Cum folosești GetTor prin Twitter.",
+ "description": "<p class=\"mb-3\">Pentru a obține link-uri de descărcare pentru Tor Browser, trimite un mesaj direct la<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> cu unul din următoarele coduri (nu e necesar să urmărești contul):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Cum folosești GetTor prin XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Pentru a obține link-uri de descărcare pentru Tor Browser prin XMPP, trimite un mesaj la gettor@toproject(dot)org cu unul din următoarele coduri:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/support-gettor.json b/support-gettor.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/support-gettor.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our <mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the package’s checksum. You may be offered a choice of “32-bit” or “64-bit” software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/sv.json b/sv.json
new file mode 100644
index 000000000..97b13bdfd
--- /dev/null
+++ b/sv.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Hur laddar jag ner Tor om torproject.org är spärrad?",
+ "description": "<p class=\"mb-3\">Om du inte kan ladda ner Tor på vår <mark><a href=\"https://www.torproject.org\">webbsajt</a></mark>, så kan du få Tor levererat till dig via GetTor. GetTor är en tjänst som automatiskt svarar på meddelanden med länkar till den senaste versionen av Tor Browser, som finns på flera olika platser som sannolikt inte är censurerade, till exempel Dropbox, Google Drive och Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "För att använda GetTor via e-post.",
+ "description": "<p class=\"mb-3\">Skicka e-post till gettor(a)torproject.org. Skriv ditt operativsystem (exempelvis windows, MacOS (OS X) eller linux) i meddelandet och skicka. GetTor svarar med ett e-postmeddelande med länkar från vilka du kan hämta Tor Browser-paketet, kryptografiska signaturen (behövs för att verifiera hämtningen), fingeravtryck av den nyckel som används för att göra signaturen och paketets kontrollsumma. Du kan erbjudas ett val av \\\"32-bitars\\\" eller \\\"64-bitars\\\" programvara: detta beror på vilken modell av datorn du använder.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Använda GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">För att få länkar för att ladda ner Tor Browser, skicka ett direktmeddelande till <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> med en av följande koder i meddelandet (du måste inte följa kontot):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Använda GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">För att få länkar för att ladda ner Tor Browser, skicka ett meddelande till gettor@toproject(punkt)org med en av följande koder i meddelandet:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/uk.json b/uk.json
new file mode 100644
index 000000000..200acc6d4
--- /dev/null
+++ b/uk.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#отриматитор-1",
+ "control": "отриматитор-1",
+ "title": "Як завантажити Tor, якщо torproject.org заблокований?",
+ "description": "<p class=\"mb-3\">Якщо ви не можете завантажити Tor через наший <mark><a href=\"https://www.torproject.org\">веб-сайт</a></mark>, ви можете отримати копію Tor, доставлену вам через GetTor. GetTor — це служба, яка автоматично відповідає на повідомлення з посиланнями на останню версію браузера Tor, що розміщується в різних місцях, які, як правило, не підлягають цензурі, таких як Dropbox, Google Диск і Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#отриматитор-2",
+ "control": "отриматитор-2",
+ "title": "Щоб скористатися GetTor електронною поштою:",
+ "description": "<p class=\"mb-3\">Надішліть електронний лист на gettor(a)torproject.org. Напишіть свою операційну систему (наприклад, Windows, MacOS (OS X) або Linux) у тілі повідомлення та відправте. GetTor відповість електронним листом, що містить посилання, з якого можна завантажити Браузер Tor, криптографічний підпис (необхідний для перевірки завантаження) [посилання на термінологічне визначення криптографічного підпису; вказівки для верифікації], відбиток, який використовується для підпису, та контрольна сума пакета. Вам може запропоновано вибрати \"32-розрядне\" або \"64-розряд
не\" програмне забезпечення: це залежить від моделі комп'ютера, який ви використовуєте; Проконсультуйтеся з документацією про свій комп'ютер, щоб дізнатись більше.</p>"
+ },
+ "gettor-3": {
+ "id": "#отриматитор-3",
+ "control": "отриматитор-3",
+ "title": "Щоб скористатися GetTor через Twitter:",
+ "description": "<p class=\"mb-3\">Щоб отримати посилання для завантаження браузера Tor, надішліть пряме повідомлення на <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> з одним із наведених нижче кодів (вам не потрібно слідкувати за обліковим записом):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#отриматитор-4",
+ "control": "отриматитор-4",
+ "title": "Щоб скористатися GetTor через XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Щоб отримати посилання для завантаження браузера Tor, надішліть повідомлення на gettor@toproject(dot)org з одним із наведених нижче кодів:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/zh_CN.json b/zh_CN.json
new file mode 100644
index 000000000..c731146f7
--- /dev/null
+++ b/zh_CN.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#获取tor-1",
+ "control": "获取tor-1",
+ "title": "torproject.org 被屏蔽了,怎么下载 Tor?",
+ "description": "<p class=\"mb-3\">如果无法通过我们的<mark><a href=\"https://www.torproject.org\">网站</a></mark>下载 Tor,你可以通过 GetTor 获取 Tor。GetTor 会自动发送下载 Tor Browser 最新版本的链接,由 Dropbox、Google Drive、GitHub 等更难受到审查的网站进行分发。"
+ },
+ "gettor-2": {
+ "id": "#获取tor-2",
+ "control": "获取tor-2",
+ "title": "通过邮箱使用GetTor。",
+ "description": "向gettor@torproject.org发送邮件。在邮件内容里写下你的操作系统(如Windows,MacOS(OS X),或者linux)并发送。GetTor会发送回复邮件,包含下载Tor Browser的链接,加密签名(核实下载时所需)[加密签名的学术性定义链接;核实步骤],生成加密签名的密钥,以及包裹的校验和。你可能会有“32-bit”和“64-bit”两个版本的软件可供选择:这取决于你正使用的电脑型号;查阅电脑文档以了解更多。"
+ },
+ "gettor-3": {
+ "id": "#获取tor-3",
+ "control": "获取tor-3",
+ "title": "通过Twitter使用GetTor",
+ "description": "<p class=\"mb-3\">请直接发送包含以下信息的其中一条的私信<p class=\"mb-3\"><ul><li> Linux</li>MacOS(OS X)<li><li>Windows</li></ul></p>到<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark>。您不需要关注这个账号。"
+ },
+ "gettor-4": {
+ "id": "#获取tor-4",
+ "control": "获取tor-4",
+ "title": "通过 XMPP (Tor Messenger, Jitsi, CoyIM)使用GetTor。",
+ "description": "<p class=\"mb-3\">获取下载Tor浏览器的连接, 发送一条信息到 gettor@toproject(dot)org 包含以下的其中一条信息:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
1
0

[translation/support-gettor] pulling translations from transifex
by translation@torproject.org 09 Apr '18
by translation@torproject.org 09 Apr '18
09 Apr '18
commit e67e06817ac9273216cd0aec81ce75ea5d9508a1
Author: Translation commit bot <translation(a)torproject.org>
Date: Mon Apr 9 22:59:59 2018 +0000
pulling translations from transifex
---
ach.json | 26 ++++++++++++++++++++++++++
ady.json | 26 ++++++++++++++++++++++++++
af.json | 26 ++++++++++++++++++++++++++
ak.json | 26 ++++++++++++++++++++++++++
am.json | 26 ++++++++++++++++++++++++++
ar.json | 26 ++++++++++++++++++++++++++
arn.json | 26 ++++++++++++++++++++++++++
ast.json | 26 ++++++++++++++++++++++++++
az.json | 26 ++++++++++++++++++++++++++
ba.json | 26 ++++++++++++++++++++++++++
be.json | 26 ++++++++++++++++++++++++++
bg.json | 26 ++++++++++++++++++++++++++
bn.json | 26 ++++++++++++++++++++++++++
bn_BD.json | 26 ++++++++++++++++++++++++++
bn_IN.json | 26 ++++++++++++++++++++++++++
bo.json | 26 ++++++++++++++++++++++++++
br.json | 26 ++++++++++++++++++++++++++
brx.json | 26 ++++++++++++++++++++++++++
bs.json | 26 ++++++++++++++++++++++++++
ca.json | 26 ++++++++++++++++++++++++++
ceb.json | 26 ++++++++++++++++++++++++++
cs.json | 26 ++++++++++++++++++++++++++
csb.json | 26 ++++++++++++++++++++++++++
cv.json | 26 ++++++++++++++++++++++++++
cy.json | 26 ++++++++++++++++++++++++++
da.json | 26 ++++++++++++++++++++++++++
de.json | 26 ++++++++++++++++++++++++++
dz.json | 26 ++++++++++++++++++++++++++
el.json | 26 ++++++++++++++++++++++++++
en_GB.json | 26 ++++++++++++++++++++++++++
eo.json | 26 ++++++++++++++++++++++++++
es.json | 26 ++++++++++++++++++++++++++
es_AR.json | 26 ++++++++++++++++++++++++++
es_CL.json | 26 ++++++++++++++++++++++++++
es_CO.json | 26 ++++++++++++++++++++++++++
es_MX.json | 26 ++++++++++++++++++++++++++
et.json | 26 ++++++++++++++++++++++++++
eu.json | 26 ++++++++++++++++++++++++++
fa.json | 26 ++++++++++++++++++++++++++
fi.json | 26 ++++++++++++++++++++++++++
fil.json | 26 ++++++++++++++++++++++++++
fo.json | 26 ++++++++++++++++++++++++++
fr.json | 26 ++++++++++++++++++++++++++
fr_CA.json | 26 ++++++++++++++++++++++++++
fur.json | 26 ++++++++++++++++++++++++++
fy.json | 26 ++++++++++++++++++++++++++
ga.json | 26 ++++++++++++++++++++++++++
gd.json | 26 ++++++++++++++++++++++++++
gl.json | 26 ++++++++++++++++++++++++++
gu.json | 26 ++++++++++++++++++++++++++
gu_IN.json | 26 ++++++++++++++++++++++++++
gun.json | 26 ++++++++++++++++++++++++++
ha.json | 26 ++++++++++++++++++++++++++
he.json | 26 ++++++++++++++++++++++++++
hi.json | 26 ++++++++++++++++++++++++++
hr.json | 26 ++++++++++++++++++++++++++
hr_HR.json | 26 ++++++++++++++++++++++++++
ht.json | 26 ++++++++++++++++++++++++++
hu.json | 26 ++++++++++++++++++++++++++
hy.json | 26 ++++++++++++++++++++++++++
ia.json | 26 ++++++++++++++++++++++++++
id.json | 26 ++++++++++++++++++++++++++
is.json | 26 ++++++++++++++++++++++++++
it.json | 26 ++++++++++++++++++++++++++
ja.json | 26 ++++++++++++++++++++++++++
jv.json | 26 ++++++++++++++++++++++++++
ka.json | 26 ++++++++++++++++++++++++++
kk.json | 26 ++++++++++++++++++++++++++
km.json | 26 ++++++++++++++++++++++++++
kn.json | 26 ++++++++++++++++++++++++++
ko.json | 26 ++++++++++++++++++++++++++
ko_KR.json | 26 ++++++++++++++++++++++++++
ku.json | 26 ++++++++++++++++++++++++++
ku_IQ.json | 26 ++++++++++++++++++++++++++
kw.json | 26 ++++++++++++++++++++++++++
ky.json | 26 ++++++++++++++++++++++++++
la.json | 26 ++++++++++++++++++++++++++
lb.json | 26 ++++++++++++++++++++++++++
lg.json | 26 ++++++++++++++++++++++++++
ln.json | 26 ++++++++++++++++++++++++++
lo.json | 26 ++++++++++++++++++++++++++
lt.json | 26 ++++++++++++++++++++++++++
lv.json | 26 ++++++++++++++++++++++++++
mg.json | 26 ++++++++++++++++++++++++++
mi.json | 26 ++++++++++++++++++++++++++
mk.json | 26 ++++++++++++++++++++++++++
ml.json | 26 ++++++++++++++++++++++++++
mn.json | 26 ++++++++++++++++++++++++++
mr.json | 26 ++++++++++++++++++++++++++
ms_MY.json | 26 ++++++++++++++++++++++++++
mt.json | 26 ++++++++++++++++++++++++++
my.json | 26 ++++++++++++++++++++++++++
nah.json | 26 ++++++++++++++++++++++++++
nap.json | 26 ++++++++++++++++++++++++++
nb.json | 26 ++++++++++++++++++++++++++
nds.json | 26 ++++++++++++++++++++++++++
ne.json | 26 ++++++++++++++++++++++++++
nl.json | 26 ++++++++++++++++++++++++++
nl_BE.json | 26 ++++++++++++++++++++++++++
nn.json | 26 ++++++++++++++++++++++++++
nso.json | 26 ++++++++++++++++++++++++++
oc.json | 26 ++++++++++++++++++++++++++
om.json | 26 ++++++++++++++++++++++++++
or.json | 26 ++++++++++++++++++++++++++
pa.json | 26 ++++++++++++++++++++++++++
pap.json | 26 ++++++++++++++++++++++++++
pl.json | 26 ++++++++++++++++++++++++++
pms.json | 26 ++++++++++++++++++++++++++
ps.json | 26 ++++++++++++++++++++++++++
pt.json | 26 ++++++++++++++++++++++++++
pt_BR.json | 26 ++++++++++++++++++++++++++
ro.json | 26 ++++++++++++++++++++++++++
ru.json | 26 ++++++++++++++++++++++++++
ru(a)petr1708.json | 26 ++++++++++++++++++++++++++
scn.json | 26 ++++++++++++++++++++++++++
sco.json | 26 ++++++++++++++++++++++++++
si_LK.json | 26 ++++++++++++++++++++++++++
sk.json | 26 ++++++++++++++++++++++++++
sk_SK.json | 26 ++++++++++++++++++++++++++
sl.json | 26 ++++++++++++++++++++++++++
sl_SI.json | 26 ++++++++++++++++++++++++++
sn.json | 26 ++++++++++++++++++++++++++
so.json | 26 ++++++++++++++++++++++++++
son.json | 26 ++++++++++++++++++++++++++
sq.json | 26 ++++++++++++++++++++++++++
sr.json | 26 ++++++++++++++++++++++++++
sr(a)latin.json | 26 ++++++++++++++++++++++++++
st.json | 26 ++++++++++++++++++++++++++
su.json | 26 ++++++++++++++++++++++++++
support-gettor.json | 26 ++++++++++++++++++++++++++
sv.json | 26 ++++++++++++++++++++++++++
sw.json | 26 ++++++++++++++++++++++++++
szl.json | 26 ++++++++++++++++++++++++++
ta.json | 26 ++++++++++++++++++++++++++
te.json | 26 ++++++++++++++++++++++++++
te_IN.json | 26 ++++++++++++++++++++++++++
tg.json | 26 ++++++++++++++++++++++++++
th.json | 26 ++++++++++++++++++++++++++
ti.json | 26 ++++++++++++++++++++++++++
tk.json | 26 ++++++++++++++++++++++++++
tr.json | 26 ++++++++++++++++++++++++++
tzm.json | 26 ++++++++++++++++++++++++++
ug(a)Arab.json | 26 ++++++++++++++++++++++++++
uk.json | 26 ++++++++++++++++++++++++++
ur.json | 26 ++++++++++++++++++++++++++
ur_PK.json | 26 ++++++++++++++++++++++++++
uz.json | 26 ++++++++++++++++++++++++++
ve.json | 26 ++++++++++++++++++++++++++
vi.json | 26 ++++++++++++++++++++++++++
wa.json | 26 ++++++++++++++++++++++++++
wo.json | 26 ++++++++++++++++++++++++++
zh_CN.json | 26 ++++++++++++++++++++++++++
zh_HK.json | 26 ++++++++++++++++++++++++++
zh_TW.json | 26 ++++++++++++++++++++++++++
zu.json | 26 ++++++++++++++++++++++++++
155 files changed, 4030 insertions(+)
diff --git a/ach.json b/ach.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ach.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ady.json b/ady.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ady.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/af.json b/af.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/af.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ak.json b/ak.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ak.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/am.json b/am.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/am.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ar.json b/ar.json
new file mode 100644
index 000000000..9a0e873d7
--- /dev/null
+++ b/ar.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "ÙÙÙ ÙÙ
ÙÙÙÙ ØªÙØ²ÙÙ ØªÙØ± Ø¥Ù ÙØ§Ù Ù
ÙÙØ¹ torproject.org Ù
ØØ¬ÙØšÙØ§ Ø",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/arn.json b/arn.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/arn.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ast.json b/ast.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ast.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/az.json b/az.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/az.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ba.json b/ba.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ba.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/be.json b/be.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/be.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/bg.json b/bg.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/bg.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/bn.json b/bn.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/bn.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/bn_BD.json b/bn_BD.json
new file mode 100644
index 000000000..71024baef
--- /dev/null
+++ b/bn_BD.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Torproject.org àŠ¬à§àŠ²àŠ àŠàŠ°àŠ²à§ àŠàŠ®àŠ¿ àŠàŠ¿àŠàŠŸàŠ¬à§ àŠàа àŠ¡àŠŸàŠàŠšàŠ²à§àŠ¡ àŠàŠ°àŠ¬?",
+ "description": "<p class=\"mb-3\">àŠ¯àŠŠàŠ¿ àŠàŠªàŠšàŠ¿ àŠàŠ®àŠŸàŠŠà§àа<mark><a href=\"https://www.torproject.org\"> àŠàŠ¯àŠŒà§àŠ¬àŠžàŠŸàŠàŠà§àа àŠ®àŠŸàŠ§à§àŠ¯àŠ®à§</a></mark> àŠàа àŠ¡àŠŸàŠàŠšàŠ²à§àŠ¡ àŠàŠ°àŠ€à§ àŠšàŠŸ àŠªàŠŸàŠ°à§àŠš, àŠàŠªàŠšàŠ¿ GetTor àŠàа àŠ®àŠŸàŠ§à§àŠ¯àŠ®à§ àŠàŠªàŠšàŠŸàŠà§ àŠ¬àŠ¿àŠ€àŠ°àŠ£ àŠàŠ°àŠŸ àŠàа àŠàŠàŠàŠ¿ àŠàŠªàŠ¿ àŠªà§àŠ€à§ àŠªàŠŸàŠ°à§àŠšà¥€ GetTor àŠ¹àŠ² àŠàŠàŠàŠ¿ àŠªàŠ°àŠ¿àŠ·à§àŠ¬àŠŸ àŠ¯àŠŸ àŠžà§àŠ¬àŠ¯àŠŒàŠàŠà§àŠ°àŠ¿àŠ¯àŠŒàŠàŠŸàŠ¬à§ àŠàа àŠ¬à§àŠ°àŠŸàŠàŠàŠŸàŠ°à§àа àŠžàŠ°à§àŠ¬àŠ¶à§àŠ· àŠžàŠàŠžà§àŠàŠ°àŠ£à§ àŠ²àŠ¿àŠàŠàНà§àŠà§àŠ€ àŠ¬àŠŸàŠ°à§àŠ€àŠŸàŠà§àŠ²àŠ¿àŠ€à§ àŠªà§àŠ°àŠ€àŠ¿àŠà§àŠ°àŠ¿àŠ¯àŠŒàŠŸ àŠŠà§àŠ¯àŠŒ, àŠ¬àŠ¿àŠàŠ¿àŠšà§àŠš àŠžà§àŠ¥àŠŸàŠšà§ àŠ
àŠ¬àŠžà§àŠ¥àŠŸàŠš àŠšà§àŠ¯àŠŒ àŠ¯àŠŸ àŠžà§àŠšà§àŠžàŠ° àŠ¹àŠàŠ¯àŠŒàŠŸàŠ° àŠžàŠ®à§àŠàŠŸàŠ¬àŠšàŠŸ àŠàŠ® àŠ¥àŠŸàŠà§, àŠ¯à§àŠ®àŠš àŠ¡à§àŠ°àŠªàŠ¬àŠà§àŠž, Google àŠ¡à§àŠ°àŠŸàŠàŠ, àŠàŠ¬àŠ àŠàŠ¿àŠ¥àŠŸàŠ¬à¥€</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/bn_IN.json b/bn_IN.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/bn_IN.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/bo.json b/bo.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/bo.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/br.json b/br.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/br.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/brx.json b/brx.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/brx.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/bs.json b/bs.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/bs.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ca.json b/ca.json
new file mode 100644
index 000000000..52217ac0b
--- /dev/null
+++ b/ca.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Com puc baixar el Tor si el torproject.org està blocat?",
+ "description": "<p class=\"mb-3\">Si no podeu baixar el Tor a través del nostre <mark><a href=\"https://www.torproject.org\">lloc web</a></mark>, podeu obtindre'n una copia a través del GetTor. El GetTor és un servei que respon automà ticament als missatges amb enllaços a la última versió del Tor Browser, hostatjada en una gran varietat d'ubicacions que segurament no estiguin blocades, com ara Dropbox, Google Drive i Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Per a utilitzar el GetTor via correu electrònic.",
+ "description": "<p class=\"mb-3\">Envieu un correu electrònic a gettor(a)torproject.org. Escriviu el vostre sistema operatiu (p.e. Windows, macOS o Linux) en el cos del missatge i envieu-lo. El GetTor us respondrà amb un altre correu que contindrà els enllaços des dels que podreu baixar el Tor Browser, la signatura criptogrà fica (necessà ria per a verificar la baixada) [enllaç a la definició del glossari de la signatura criptogrà fica, instruccions per a la verificació], l'empremta de la clau utilitzada per a crear la signatura, i la suma de verificació del paquet. Se us oferirà triar entre programari de «32-bit» o «64-bit»: depÚn del model de l'ordinador que esteu utilitzant; consulteu la seva documentació per a més informació.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Per a utilitzar el GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">Per a obtenir enllaços per a baixar el Tor Browser, envieu un missatge directe a <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> amb un dels codis segÌents (no cal que seguiu eixe compte):</p> <p class=\"mb-3\"><ul><li>Linux</li><li>macOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Per a utilitzar el GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Per a obtenir enllaços per a baixar el Tor Browser, envieu un missatge a gettor@torproject(dot)org amb un dels codis segÌents:</p><p class=\"mb-3\"><ul><li>Linux</li><li>macOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ceb.json b/ceb.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ceb.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/cs.json b/cs.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/cs.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/csb.json b/csb.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/csb.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/cv.json b/cv.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/cv.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/cy.json b/cy.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/cy.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/da.json b/da.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/da.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/de.json b/de.json
new file mode 100644
index 000000000..a60827de9
--- /dev/null
+++ b/de.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Wie kann ich Tor herunterladen, wenn torproject.org blockiert ist?",
+ "description": "<p class=\"mb-3\">Wenn du Tor Ìber unsere <mark><a href=\"https://www.torproject.org\">Website</a></mark> nicht herunterladen kannst, ist es möglich sich einen alternativen Download-Link von Tor Ìber GetTor zusenden zu lassen. GetTor ist ein Dienst der automatisch auf Nachrichten mit Links zur aktuellsten Version des Tor Browsers antwortet, die an verschiedenen Orten wie Dropbox, Google Drive und GitHub gehostet werden.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Um GetTor ÃŒber E-Mail zu nutzen.",
+ "description": "<p class=\"mb-3\">Sende eine E-Mail an gettor(a)torproject.org mit dem gewÌnschten Betriebssystem im Betreff (z.B. Windows, MacOS oder Linux) und GetTor wird mit einer E-Mail antworten, die die Download-Links enthalten, um das Tor-Browser-Paket herunterladen zu können. Im Paket enhalten sind neben dem Tor Browser selbst die Kryptographische Signatur, welche benötigt wird um die heruntergeladenen Inhalte zu verifizieren ([link to glossary definition of cryptographic signature; instructions for verification]), sowie der Fingerabdruck, der benutzt wurde um die Signatur zu erzeugen und die Paket-PrÌfsumme. Unter UmstÀnden wird Ihnen eine Auswahl zwischen der 32-bit oder 64-bit Anwendung angeboten, dies hÀngt vom Modell des Computers ab, den Sie benutzen.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Um GetTor ÃŒber Twitter zu nutzen.",
+ "description": "<p class=\"mb-3\">Um Links zum Herunterladen von Tor Browser zu erhalten, sende eine direkte Nachricht an <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark>mit einem der folgenden Codes darin (du musst dafÃŒr dem Konto nicht folgen):</p><p class=\"mb-3\"><ul><li>Linux</li>, <li>MacOS (OS X)</li> oder <li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Um GetTor ÃŒber XMPP (Tor Messenger, Jitsi, CoyIM) zu nutzen.",
+ "description": "<p class=\"mb-3\">Um Links zum Herunterladen von Tor Browser zu erhalten, sende eine Nachricht an gettor@toproject(dot)org mit einem der folgenden Codes darin:</p><p class=\"mb-3\"><ul><li>Linux</li>, <li>MacOS (OS X)</li> oder <li>Windows</li></ul></p>"
+ }
+}
diff --git a/dz.json b/dz.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/dz.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/el.json b/el.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/el.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/en_GB.json b/en_GB.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/en_GB.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/eo.json b/eo.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/eo.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/es.json b/es.json
new file mode 100644
index 000000000..124182512
--- /dev/null
+++ b/es.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "¿Cómo descargo Tor si torproject.org está bloqueada?",
+ "description": "<p class=\\\"mb-3\\\">Si no puedes descargar Tor a través de nuestro â<mark><a href=\\\"https://www.torproject.org\\\">sitio web</a></mark>, puedes obtener una copia de Tor que se te entregará vÃa GetTor. GetTor es un servicio que responde automáticamente a los mensajes con enlaces a la versión más reciente del Navegador Tor, alojada en distintas ubicaciones, que es menos probable que estén censuradas, como Dropbox, Google Drive, y GitHub.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Usar GetTor vÃa correo electrónico.",
+ "description": "<p class=\"mb-3\">EnvÃe un correo a gettor(a)torproject.org. Indique su sistema operativo (como Windows, MacOS (OS X), o Linux) en el cuerpo del mensaje, y envÃelo. GetTor responderá con un correo conteniendo enlaces desde los que puede descargar el Navegador Tor, la firma criptográfica (necesaria para verificar la descarga) [enlace a la definición de glosario de la firma criptográfica; instrucciones para la verificación], la huella de validación (fingerprint) de la clave usada para crear la firma, y la suma de verificación (checksum) del paquete. Puede que le sea ofrecida una elección entre software de â32-bitsâ o â64-bitsâ: esto depende del modelo concreto de equipo que esté usando; consulte documentación sobre su computadora para averiguar más.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Usar GetTor vÃa Twitter.",
+ "description": "<p class=\"mb-3\">Para obtener enlaces para descargar el Navegador Tor, envÃe un mensaje directo a â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> con uno de los siguientes códigos en él (no necesita seguir la cuenta en Twitter):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Para usar GetTor a través de XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Para obtener enlaces que permitan descargar el Navegador Tor, manda un mensaje a gettor@toproject(punto)org con uno de los siguientes códigos en él:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/es_AR.json b/es_AR.json
new file mode 100644
index 000000000..6f734c5eb
--- /dev/null
+++ b/es_AR.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "¿Como descargo Tor si torproject.org esta bloqueado?",
+ "description": "<p class=\"mb-3\">Si no podes descargar Tor mediante nuestro <mark><a href=\"https://www.torproject.org\">sitio web</a></mark>, te podemos enviar una copia mediante GetTor. GetTor es un servicio que automáticamente responde mensajes con enlaces a la ultima versión de Tor Browser, alojadas en varios lugares que generalmente no están bloqueados, como Dropbox, Google Drive y Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/es_CL.json b/es_CL.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/es_CL.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/es_CO.json b/es_CO.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/es_CO.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/es_MX.json b/es_MX.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/es_MX.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/et.json b/et.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/et.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/eu.json b/eu.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/eu.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/fa.json b/fa.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/fa.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/fi.json b/fi.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/fi.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/fil.json b/fil.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/fil.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/fo.json b/fo.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/fo.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/fr.json b/fr.json
new file mode 100644
index 000000000..27cb6bc54
--- /dev/null
+++ b/fr.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Comment puis-je télécharger Tor si torproject.org est bloquéâ?",
+ "description": "<p class=\"mb-3\">Si vous ne pouvez pas télécharger Tor à partir de notre <mark><a href=\"https://www.torproject.org\">site Web</a></mark>, une exemplaire de Tor peut vous être livré par GetTor. GetTor est un service qui répond automatiquement aux messages en incluant des liens vers la derniÚre version du navigateur Tor, hébergée en divers endroits tels que Dropbox, Google Disque et GitHub.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Pour utiliser GetTor par courriel.",
+ "description": "<p class=\"mb-3\">Envoyez un courriel à gettor(a)torproject.org. Indiquez votre systÚme dâexploitation (comme Windows, macOS [OS X] ou Linux) dans le corps du message et envoyez-le. GetTor répondra par un courriel contenant des liens à partir desquels vous pourrez télécharger le navigateur Tor, la signature cryptographique (exigée pour contrÃŽler le téléchargement) [lien vers la définition dâune signature cryptographique dans le glossaireâ; instructions de vérification], lâempreinte de la clé utilisée pour la signature ainsi que la somme de contrÃŽle du paquet. Selon le modÚle dâordinateur que vous utilisez, le choix entre un logiciel 32 bits ou 64 bits vous sera proposéâ; consulter la documentation de votre ordinateur pour en apprendre davantage.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Pour utiliser GetTor par Twitter.",
+ "description": "<p class=\"mb-3\">Pour obtenir des liens pour télécharger le navigateur Tor, envoyez un message direct à â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> en incluant lâun des codes suivants (vous nâavez pas à suivre le compte) :</p><p class=\"mb-3\"><ul><li>Linux</li><li>macOS (OS X)</li><li>Windows</li></ul></p>\n"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Pour utiliser GetTor par XMPP (messager Tor, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Pour obtenir des liens pour télécharger le navigateur Tor, envoyez un message à gettor@toproject(dot)org en incluant lâun des codes suivants :</p><p class=\"mb-3\"><ul><li>Linux</li><li>macOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/fr_CA.json b/fr_CA.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/fr_CA.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/fur.json b/fur.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/fur.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/fy.json b/fy.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/fy.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ga.json b/ga.json
new file mode 100644
index 000000000..6c8aa25b9
--- /dev/null
+++ b/ga.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Conas is féidir Tor a Ãoslódáil má tá cosc ar torproject.org?",
+ "description": "<p class=\"mb-3\">Mura bhfuil tú in ann Tor a Ãoslódáil ónár â<mark><a href=\"https://www.torproject.org\">suÃomh Gréasáin</a></mark>, is féidir leat Tor a fháil trà sheirbhÃs GetTor. Is éard atá ann ná seirbhÃs a thugann freagra ar theachtaireachtaà le nascanna leis an leagan is déanaà de Bhrabhsálaà Tor, óstáilte in áiteanna nach ndéantar cinsireacht orthu rómhinic, mar shampla Dropbox, Google Drive, nó Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Le GetTor a úsáid trà rÃomhphost.",
+ "description": "<p class=\"mb-3\">Seol teachtaireacht r-phoist chuig gettor(a)torproject.org. Cuir ainm do chóras oibriúcháin (mar shampla, Windows, MacOS (OS X), nó Linux) i gcorp na teachtaireachta. Tabharfaidh GetTor freagra ina bhfuil nasc Ãoslódála do Bhrabhsálaà Tor, sÃniú cripteagrafach (ag teastáil leis an Ãoslódáil a dheimhniú) [gluais], méarlorg na heochrach a úsáideadh chun an sÃniú a dhéanamh, agus suim sheiceála an phacáiste. Seans go mbeidh rogha agat idir leagan \"32-bit\" nó \"64-bit\"; braitheann sé sin ar an sórt rÃomhaire atá agat. Féach ar dhoiciméadú do rÃomhaire chun tuilleadh eolais a fháil.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Le GetTor a úsáid trà Twitter.",
+ "description": "<p class=\"mb-3\">Le nasc Ãoslódála do Bhrabhsálaà Tor a fháil, seol teachtaireacht dhÃreach chuig â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> a bhfuil ceann de na cóid seo a leanas inti (nà gá duit an cuntas a leanúint):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Le GetTor a úsáid trà XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Le nasc Ãoslódála do Bhrabhsálaà Tor a fháil, seol teachtaireacht r-phoist chuig gettor@toproject(ponc)org a bhfuil ceann de na cóid seo a leanas inti:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/gd.json b/gd.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/gd.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/gl.json b/gl.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/gl.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/gu.json b/gu.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/gu.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/gu_IN.json b/gu_IN.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/gu_IN.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/gun.json b/gun.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/gun.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ha.json b/ha.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ha.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/he.json b/he.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/he.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/hi.json b/hi.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/hi.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/hr.json b/hr.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/hr.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/hr_HR.json b/hr_HR.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/hr_HR.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ht.json b/ht.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ht.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/hu.json b/hu.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/hu.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/hy.json b/hy.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/hy.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ia.json b/ia.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ia.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/id.json b/id.json
new file mode 100644
index 000000000..cd382ba8d
--- /dev/null
+++ b/id.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Bagaimana cara mengunduh Tor jika torproject.org diblokir?",
+ "description": "<p class=\"mb-3\">Jika Anda tidak dapat mengunduh Tor dari <mark><a href=\"https://www.torproject.org\">situs web kami</a></mark>, Tor dapat dikirim kepada Anda melalui GetTor. GetTor adalah service yang yang otomatis merespon pesan berisi tautan ke versi terakhir Tor Browser, yang dihosting di lokasi beragam sehingga kemungkinan kecil disensor, seperti Dropbox, Google Drive, dan Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Menggunakan GetTor lewat email:",
+ "description": "<p class=\"mb-3\">Kirim email ke gettor(a)torproject.org.. Tulis sistem operasi yang digunakan (seperti Windows, MacOS (OSX), atau Linux) di isi pesan lalu kirimkan emailnya. GetTor akan merespon dengan email yang memuat tautan dari sumber pengunduh paket Tor Browser, tanda tangan kriptografi (diperlukan untuk memverikasi unduhan), [tautan ke definisi glossary dari tanda tangan kriptografi; instruksi untuk verifikasi], sidik jari yang akan digunakan untuk membuat tanda tangan, dan paket checksum. Anda akan di tawarkan dengan dua pilihan perangkat lunak: '32 bit\" atau 64 bit. Pilihan ini tergantung dengan model komputer yang anda gunakan; silakan baca dokumentasi tentang komputer Anda untuk informasi lebih lanjut.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Mengunakan GetTor melalui Twitter",
+ "description": "<p class=\"mb-3\">Untuk mendapatkan tautan untuk mengunduh Tor Browser, kirim DM ke <mark><a href=\"https://twitter.com/get_tor\">@get_to</a></mark>yang berisi salah satu kode berikut ini (Anda tidak perlu mengikuti akun Twitter tersebut): </p><p class=\"mb-3\"><ul><li>Linux </li><li> MacOS (OS X) </li><li> Windows </li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Menggunakan GetTor melalui XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Untuk mendapatkan tautan untuk mengunduh Tor Browser, kirim pesan ke gettor@toproject(dot)org yang berisi salah satu kode berikut ini: </p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X) </li><li>Windows </li></ul></p>"
+ }
+}
diff --git a/is.json b/is.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/is.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/it.json b/it.json
new file mode 100644
index 000000000..ec3b4e16a
--- /dev/null
+++ b/it.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Come scarico Tor se torproject.org viene bloccato?",
+ "description": "<p class=\"mb-3\">Se non posso scaricare Tor attraverso a nostro <mark><a href=\"https://www.torproject.org\">website</a></mark>,tu puoi prendere una copia di Tor qui aveva dato per via GetFor. GetFor é un servizio qui automaticamente risponde da messaggio con links di ultima versione del Tor Browser, aveva ospitando una varieta di locazioni quella attendibile minore essere censurato, come Dropbox, Google Drive e Github</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ja.json b/ja.json
new file mode 100644
index 000000000..5f272c726
--- /dev/null
+++ b/ja.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "torproject.orgããããã¯ãããŠããå Žåãã©ã®ããã«TorãããŠã³ããŒãã§ããŸããïŒ",
+ "description": "<p class=\"mb-3\">ç§ãã¡ã®<mark><a href=\"https://www.torproject.org\">WEBãµã€ã</mark></a>ããTorãããŠã³ããŒãã§ããªãå ŽåãGetTorã«ãã£ãŠTorãããŠã³ããŒãã§ããŸããGetTor ã¯ææ°ããŒãžã§ã³ã® Tor Browser ãžã®ãªã³ã¯ãã¡ãã»ãŒãžã§èªåçã«è¿ä¿¡ãããµãŒãã¹ã§ãããã¡ã€ã«ã¯ DropboxïŒGoogle Drive ããã³ GitHub ãšãã£ãããŸããŸãªæ€é²ãããå¯èœæ§ãäœãå Žæã§ãã¹ããããŠããŸãã </p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "é»åã¡ãŒã«ã§GetTorã䜿çšããã",
+ "description": "gettor@torproject.orgã«é»åã¡ãŒã«ãéã£ãŠãã ãããã¡ãã»ãŒãžã®æ¬æã«ãªãã¬ãŒãã£ã³ã°ã·ã¹ãã ïŒWindowsãMacOSïŒOS XïŒãLinuxãªã©ïŒãæžã蟌ãã§éä¿¡ããŸãã GetTorã¯Torãã©ãŠã¶ãããŠã³ããŒãããããšãã§ãããªã³ã¯ãå«ãé»åã¡ãŒã«ã§å¿çããŸããæå·çœ²åïŒããŠã³ããŒãã®æ€èšŒã«å¿
èŠïŒ[æå·çœ²åã®çšèªéå®çŸ©ãžã®ãªã³ã¯ãæ€èšŒã®ããã®æç€º]ã眲åãäœæããããã«äœ¿çšãããéµã®ãã£ã³ã¬ãŒããªã³ããããã³ããã±ãŒãžã®ãã§ãã¯ãµã ãå«ãã ã32ãããããŸãã¯ã64ããããã®ãœãããŠã§ã¢ãéžæã§ããŸããããã¯äœ¿çšããŠããã³ã³ãã¥ãŒã¿ã®ã¢ãã«ã«ãã£ãŠç°ãªããŸããã䜿ãã®ã³ã³ãã¥ãŒã¿ã«é¢ããããã¥ã¡ã³ããåç
§ããŠãã ããã"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Twitterçµç±ã§GetTorã䜿çšããã",
+ "description": "Torãã©ãŠã¶ãããŠã³ããŒãããããã®ãªã³ã¯ãåŸãã«ã¯ã@get_tor次ã®ã³ãŒãã®ãã¡ã®1ã€ãå
¥åããŸãïŒã¢ã«ãŠã³ãã«åŸãå¿
èŠã¯ãããŸãã):1456Linux67MacOSïŒOS XïŒ78Windows"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "XMPPïŒTor MessengerãJitsiãCoyIMïŒçµç±ã§GetTorã䜿çšããã«ã¯",
+ "description": "Torãã©ãŠã¶ãããŠã³ããŒãããããã®ãªã³ã¯ãåŸãã«ã¯ã次ã®ã³ãŒãã®ãã¡ã®1ã€ã䜿ã£ãŠgettor@toprojectïŒdotïŒorgã«ã¡ãã»ãŒãžãéããŸãïŒ1234Linux45MacOSïŒOS XïŒ56 Windows"
+ }
+}
diff --git a/jv.json b/jv.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/jv.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ka.json b/ka.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ka.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/kk.json b/kk.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/kk.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/km.json b/km.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/km.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/kn.json b/kn.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/kn.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ko.json b/ko.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ko.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ko_KR.json b/ko_KR.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ko_KR.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ku.json b/ku.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ku.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ku_IQ.json b/ku_IQ.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ku_IQ.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/kw.json b/kw.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/kw.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ky.json b/ky.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ky.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/la.json b/la.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/la.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/lb.json b/lb.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/lb.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/lg.json b/lg.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/lg.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ln.json b/ln.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ln.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/lo.json b/lo.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/lo.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/lt.json b/lt.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/lt.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/lv.json b/lv.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/lv.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/mg.json b/mg.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/mg.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/mi.json b/mi.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/mi.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/mk.json b/mk.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/mk.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ml.json b/ml.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ml.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/mn.json b/mn.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/mn.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/mr.json b/mr.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/mr.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ms_MY.json b/ms_MY.json
new file mode 100644
index 000000000..58f279c15
--- /dev/null
+++ b/ms_MY.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Bagaimana saya boleh memuat turun Tor jika torproject.org telah disekat?",
+ "description": "<p class=\"mb-3\">Jika anda tidak boleh memuat turun Tor melalui â<mark><a href=\"https://www.torproject.org\">laman sesawang</a></mark> kami, anda boleh dapatkan satu salinan Tor yang dihantar terus menerusi GetTor. GetTor merupakan servis yang membalas secara automatik mesej dengan pautan ke versi terkini Pelayar Tor, telah dihos dengan pada pelbagai lokasi yang berkemungkinan tidak ditapis, seperti Dropbox, Google Drive, dan Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Menggunakan GetTor melalui emel.",
+ "description": "<p class=\"mb-3\">Hantar emel kepada gettor(a)torproject.org. Tulis sistem pengoperasian anda (seperti windows, MacOS (OS X), atau linux) dalam badan teks kemudian hantar. GetTor akan membalas emel yang mengandungi pautan yang boleh memuat turun Pelayar Tor, tandatangan kriptografik (diperlukan untuk memuat turun) [pautan ke definasi glosari bagi tandatangan kriptografik; arahan untuk pengesahan], capjari kunci yang digunakan untuk membuat tandatangan, dan hasil tambah semak pakej. Anda mungkin ditawarkan sama ada perisian â32-bitâ atau â64-bitâ: ia bergantung pada model komputer yang anda guna; rujuk dokumentasi berkenaan komputer untuk mengetahuinya dengan lebih lanjut.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Menggunakan GetTor melalui Twitter.",
+ "description": "<p class=\"mb-3\">Untuk mendapatkan pautan muat turun Pelayar Tor, hantar mesej kepada â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> dengan salah satu kod berikut di dalamnya (anda tidak perlu mengikuti akaun):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Menggunakan GetTor melalui XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Untuk mendapatkan pautan muat turun Pelayar Tor, hantar mesej kepada gettor@toproject(dot)org dengan salah satu kod berikut di dalamnya:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/mt.json b/mt.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/mt.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/my.json b/my.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/my.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/nah.json b/nah.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/nah.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/nap.json b/nap.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/nap.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/nb.json b/nb.json
new file mode 100644
index 000000000..602e13ed5
--- /dev/null
+++ b/nb.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Hvordan kan jeg laste ned Tor hvis torproject.org er blokkert?",
+ "description": "<p class=\"mb-3\">Hvis du ikke kan laste ned Tor fra vÃ¥r â<mark><a href=\"https://www.torproject.org\">nettside</a></mark>, kan du fÃ¥ en kopi levert via GetTor, en tjeneste som automatisk svarer med lenker til seneste versjon av Tor-nettleseren, hvis vertskap er betjent av forskjellige steder det er mindre mulighet for at er sensurert, som Dropbox, Google Drive og GitHub.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "For å bruke GetTor via XMPP (Tor-messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/nds.json b/nds.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/nds.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ne.json b/ne.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ne.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/nl.json b/nl.json
new file mode 100644
index 000000000..08a28c660
--- /dev/null
+++ b/nl.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Hoe kan ik Tor downloaden als torproject.org geblokkeerd wordt?",
+ "description": "<p class=\"mb-3\">Als u Tor niet via onze <mark><a href=\"https://www.torproject.org\">website</a></mark> kunt downloaden, kunt u via GetTor een exemplaar van Tor aan u laten bezorgen. GetTor is een service die automatisch reageert op berichten met links naar de nieuwste versie van Tor Browser, gehost op verschillende locaties die minder vaak worden gecensureerd, zoals Dropbox, Google Drive en Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Gebruik GetTor via email",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Gebruik GetTor via Twitter",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/nl_BE.json b/nl_BE.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/nl_BE.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/nn.json b/nn.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/nn.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/nso.json b/nso.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/nso.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/oc.json b/oc.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/oc.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/om.json b/om.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/om.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/or.json b/or.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/or.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/pa.json b/pa.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/pa.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/pap.json b/pap.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/pap.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/pl.json b/pl.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/pl.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/pms.json b/pms.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/pms.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ps.json b/ps.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ps.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/pt.json b/pt.json
new file mode 100644
index 000000000..b6ba6ed21
--- /dev/null
+++ b/pt.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Como é que eu transfiro o Tor se o torproject.org estiver bloqueado?",
+ "description": "<p class=\"mb-3\">Se não conseguir transferir o Tor através do nosso <mark><a href=\"https://www.torproject.org\">site da Web</a></mark>, pode obter uma cópia do Tor enviada para si através do GetTor. O GetTor é um serviço que responde automaticamente às mensagens com hiperligações para a versão mais recente do Tor Browser, alojado em vários locais que são menos propensos a serem censurados, tais como Dropbox, Google Drive e Github.1"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Para utilizar o GetTor via e-mail.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Para utilizar o GetTor via Twitter:",
+ "description": "<p class=\"mb-3\">Para obter as hiperligações para transferir o Tor Browser, envie uma mensagem direta para â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> com um dos seguintes códigos (não precisa de seguir a conta):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Para utilizar o GetTor via XMPP (Tor Messenger, Jitsi, CoyIM):",
+ "description": "<p class=\"mb-3\">Para obter as hiperligações para transferir o Tor Browser, envie uma mensagem para âgettor@toproject(dot)org com um dos seguintes códigos:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li> Windows</li></ul></p>"
+ }
+}
diff --git a/pt_BR.json b/pt_BR.json
new file mode 100644
index 000000000..df8d9f4f7
--- /dev/null
+++ b/pt_BR.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Como eu baixo Tor caso torproject.org esteja bloqueado?",
+ "description": "<p class=\"mb-3\">Se você não conseguir fazer download do Tor usando nosso <mark><a href=\"https://www.torproject.org\">website</a></mark>, é possÃvel obter uma cópia do Tor via GetTor. GetTor é um serviço que responde automaticamente a mensagens com links para a última versão do Navegador Tor, hospedado em diversas localidades menos censuradas, como Dropbox, Google Drive e GitHub.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Usar GetTor via e-mail.",
+ "description": "<p class=\"mb-3\">Envie um e-mail para gettor(a)torproject.org. Informe seu sistema operacional (como Windows, macOS (OS X) ou Linux) no corpo da mensagem e envie. GetTor irá responder com um e-mail contendo links a partir dos quais você poderá fazer o download do Navegador Tor, da assinatura critpográfica (necessária para verificação do download) [link para a definição do glossário de assinatura criptográfica; instruções para verificação], a impressão digital da chave utilizada para fazer a assinatura e a checksum do pacote. à possÃvel que lhe peçam para escolher entre o software \"32-bit\" ou \"64-bit\": isso depende do modelo do computador que você estiver utilizando. Consulte a documentação sobre seu computador para saber mais. </p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Usar GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">Para conseguir links para o download do Tor Browser, envie uma mensagem direta para <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> contendo um dos códigos seguintes (você não precisa seguir a conta no twitter): </p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li> Windows </li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Usar GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Para obter links para o download do Navegador Tor envie uma mensagem direta para gettor@torproject(dot)org contendo um dos códigos seguintes:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ro.json b/ro.json
new file mode 100644
index 000000000..1535f215e
--- /dev/null
+++ b/ro.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Cum descarc Tor dacÄ torproject.org e blocat?",
+ "description": "<p class=\"mb-3\">DacÄ nu poÈi descÄrca Tor din â<mark><a href=\"https://www.torproject.org\">website</a></mark>, poÈi obÈine o o copie a Tor prin intermediul GetTor. GetTor e un serviciu care rÄspunde automat la mesaje cu legÄturi cÄtre ultima versiune de Tor Browser stocata într-o varietate de locuri mai puÈin probabil de a fi cenzurate, cum ar fi Dropbox, Google Drive sau Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "Cum foloseÈti GetTor prin email.",
+ "description": "<p class=\"mb-3\">Trimite un email la gettor(a)torproject.org. Scrie sistemul tÄu de operare (Windows, MacOS (OS X), or linux) în corpul mesajului Èi trimite. GetTor va rÄspunde cu un email conÈinînd link-uri de unde poÈi descÄrca Tor Browser, semnÄtura digitalÄ (necesarÄ pentru a verifica descÄrcarea) [link spre definiÈia semnÄturii digitale; instrucÈiuni de verificare], amprenta cheii folosite la semnÄturÄ, Èi suma de control a pachetului. Èi se pot oferi variante ale softului pe â32-bitâ sau â64-bitâ: aceasta depinde de modelul computerului pe care îl foloseÈti; verificÄ documentaÈia computerului pentru a afla mai multe.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "Cum foloseÈti GetTor prin Twitter.",
+ "description": "<p class=\"mb-3\">Pentru a obÈine link-uri de descÄrcare pentru Tor Browser, trimite un mesaj direct la<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> cu unul din urmÄtoarele coduri (nu e necesar sÄ urmÄreÈti contul):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "Cum foloseÈti GetTor prin XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">Pentru a obÈine link-uri de descÄrcare pentru Tor Browser prin XMPP, trimite un mesaj la gettor@toproject(dot)org cu unul din urmÄtoarele coduri:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ru.json b/ru.json
new file mode 100644
index 000000000..b4b88a122
--- /dev/null
+++ b/ru.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Ðак загÑÑзОÑÑ Tor, еÑлО torproject.org заблПкОÑПваМ?",
+ "description": "<p class=\"mb-3\">ÐÑлО ÐÑ ÐœÐµ ЌПжеÑе ÑкаÑаÑÑ Tor ÑеÑез ÐœÐ°Ñ <mark><a href=\"https://www.torproject.org\">ÑайÑ</a></mark>, Ð²Ñ ÐŒÐŸÐ¶ÐµÑе пПлÑÑОÑÑ ÐºÐŸÐ¿ÐžÑ Tor ÑеÑез GetTor. GetTor - ÑÑП ÑÑлÑга, кПÑПÑÐ°Ñ Ð°Ð²ÑПЌаÑОÑеÑкО ПÑвеÑÐ°ÐµÑ ÐœÐ° ÑППбÑÐµÐœÐžÑ ÑÑÑлкаЌО Ма пПÑлеЎМÑÑ Ð²ÐµÑÑÐžÑ Tor Browser, ÑазЌеÑеММÑе в ÑазлОÑМÑÑ
ЌеÑÑаÑ
, кПÑПÑÑе ЌеМее веÑПÑÑМП пПЎвеÑгаÑÑÑÑ ÑеМзÑÑе, ÑакОе как Dropbox, Google ÐОÑк О Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "ÐÑпПлÑзПваÑÑ GetTor ÑеÑез ÑлекÑÑПММÑÑ Ð¿ÐŸÑÑÑ.",
+ "description": "<p class=\"mb-3\">ÐÑпÑавÑÑе ÑлекÑÑПММПе пОÑÑЌП Ма gettor(a)torproject.org. ÐапОÑОÑе МазваМОе ваÑей ПпеÑаÑОПММПй ÑОÑÑÐµÐŒÑ (МапÑОЌеÑ, Windows, macOS (ÐS X) ОлО Linux) в ÑекÑÑе ÑППбÑÐµÐœÐžÑ Ðž ПÑпÑавÑÑе егП. GetTor ПÑвеÑÐžÑ ÑлекÑÑПММÑÐŒ пОÑÑЌПЌ, ÑПЎеÑжаÑОЌ ÑÑÑлкО, ÑеÑез кПÑПÑÑе Ð²Ñ ÐŒÐŸÐ¶ÐµÑе ÑкаÑаÑÑ Tor Browser, кÑОпÑПгÑаÑОÑеÑкÑÑ Ð¿ÐŸÐŽÐ¿ÐžÑÑ (МеПбÑ
ПЎОЌа ÐŽÐ»Ñ Ð¿ÑПвеÑкО загÑÑзкО) [ÑÑÑлка Ма ПпÑеЎелеМОе кÑОпÑПгÑаÑОÑеÑкПй пПЎпОÑО Оз глПÑÑаÑОÑ; ОМÑÑÑÑкÑОО ÐŽÐ»Ñ Ð¿ÑПвеÑкО], ПÑпеÑаÑПк клÑÑа, ОÑпПлÑзÑеЌПгП ÐŽÐ»Ñ ÑÐŸÐ·ÐŽÐ°ÐœÐžÑ Ð¿ÐŸÐŽÐ¿ÐžÑО О кПМÑÑПлÑМÑÑ ÑÑÐŒÐŒÑ Ð¿Ð°ÐºÐµÑа. ÐаЌ ÐŒÐŸÐ¶ÐµÑ Ð±ÑÑÑ Ð¿ÑеЎлПжеМП вÑбÑаÑÑ Â«32-bit» ОлÐ
ž «64-bit» веÑÑÐžÑ Ð¿ÑПгÑаЌЌМПгП ПбеÑпеÑеМОÑ: ÑÑП завОÑÐžÑ ÐŸÑ ÐŒÐŸÐŽÐµÐ»Ðž ОÑпПлÑзÑеЌПгП ваЌО кПЌпÑÑÑеÑа; ПбÑаÑОÑеÑÑ Ðº ЎПкÑЌеМÑаÑОО пП ваÑÐµÐŒÑ ÐºÐŸÐŒÐ¿ÑÑÑеÑÑ, ÑÑÐŸÐ±Ñ ÑзМаÑÑ Ð±ÐŸÐ»ÑÑе.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "ÐÑпПлÑзПваÑÑ GetTor ÑеÑез Twitter.",
+ "description": "<p class=\"mb-3\">ЧÑÐŸÐ±Ñ Ð¿ÐŸÐ»ÑÑОÑÑ ÑÑÑлкО Ма загÑÑÐ·ÐºÑ Tor Browser, ПÑпÑавÑÑе ÑППбÑеМОе Ма <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> Ñ ÐŸÐŽÐœÐžÐŒ Оз ÑлеЎÑÑÑОÑ
кПЎПв (ваЌ Ме МÑжМП ÑОÑаÑÑ Ð°ÐºÐºÐ°ÑМÑ):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "ÐÑпПлÑзПваÑÑ GetTor ÑеÑез XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">ЧÑÐŸÐ±Ñ Ð¿ÐŸÐ»ÑÑОÑÑ ÑÑÑлкО Ма загÑÑÐ·ÐºÑ Tor Browser, ПÑпÑавÑÑе ÑППбÑеМОе Ма gettor@toproject(dot)org Ñ ÐŸÐŽÐœÐžÐŒ Оз ÑлеЎÑÑÑОÑ
кПЎПв:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ru(a)petr1708.json b/ru(a)petr1708.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ru(a)petr1708.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/scn.json b/scn.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/scn.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/sco.json b/sco.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/sco.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/si_LK.json b/si_LK.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/si_LK.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/sk.json b/sk.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/sk.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/sk_SK.json b/sk_SK.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/sk_SK.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/sl.json b/sl.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/sl.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/sl_SI.json b/sl_SI.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/sl_SI.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/sn.json b/sn.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/sn.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/so.json b/so.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/so.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/son.json b/son.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/son.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/sq.json b/sq.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/sq.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/sr.json b/sr.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/sr.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/sr(a)latin.json b/sr(a)latin.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/sr(a)latin.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/st.json b/st.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/st.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/su.json b/su.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/su.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/support-gettor.json b/support-gettor.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/support-gettor.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/sv.json b/sv.json
new file mode 100644
index 000000000..97b13bdfd
--- /dev/null
+++ b/sv.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "Hur laddar jag ner Tor om torproject.org Àr spÀrrad?",
+ "description": "<p class=\"mb-3\">Om du inte kan ladda ner Tor pÃ¥ vÃ¥r â<mark><a href=\"https://www.torproject.org\">webbsajt</a></mark>, sÃ¥ kan du fÃ¥ Tor levererat till dig via GetTor. GetTor Àr en tjÀnst som automatiskt svarar pÃ¥ meddelanden med lÀnkar till den senaste versionen av Tor Browser, som finns pÃ¥ flera olika platser som sannolikt inte Àr censurerade, till exempel Dropbox, Google Drive och Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "För att anvÀnda GetTor via e-post.",
+ "description": "<p class=\"mb-3\">Skicka e-post till gettor(a)torproject.org. Skriv ditt operativsystem (exempelvis windows, MacOS (OS X) eller linux) i meddelandet och skicka. GetTor svarar med ett e-postmeddelande med lÀnkar från vilka du kan hÀmta Tor Browser-paketet, kryptografiska signaturen (behövs för att verifiera hÀmtningen), fingeravtryck av den nyckel som anvÀnds för att göra signaturen och paketets kontrollsumma. Du kan erbjudas ett val av \\\"32-bitars\\\" eller \\\"64-bitars\\\" programvara: detta beror på vilken modell av datorn du anvÀnder.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "AnvÀnda GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">För att fÃ¥ lÀnkar för att ladda ner Tor Browser, skicka ett direktmeddelande till â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> med en av följande koder i meddelandet (du mÃ¥ste inte följa kontot):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "AnvÀnda GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">För att få lÀnkar för att ladda ner Tor Browser, skicka ett meddelande till gettor@toproject(punkt)org med en av följande koder i meddelandet:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/sw.json b/sw.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/sw.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/szl.json b/szl.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/szl.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ta.json b/ta.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ta.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/te.json b/te.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/te.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/te_IN.json b/te_IN.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/te_IN.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/tg.json b/tg.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/tg.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/th.json b/th.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/th.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ti.json b/ti.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ti.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/tk.json b/tk.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/tk.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/tr.json b/tr.json
new file mode 100644
index 000000000..568df3c93
--- /dev/null
+++ b/tr.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "torproject.org' a eriÅilemiyorsa Tor 'u nasıl indirebilirim?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/tzm.json b/tzm.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/tzm.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ug(a)Arab.json b/ug(a)Arab.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ug(a)Arab.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/uk.json b/uk.json
new file mode 100644
index 000000000..200acc6d4
--- /dev/null
+++ b/uk.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#ПÑÑОЌаÑОÑПÑ-1",
+ "control": "ПÑÑОЌаÑОÑПÑ-1",
+ "title": "Як заваМÑажОÑО Tor, ÑкÑП torproject.org заблПкПваМОй?",
+ "description": "<p class=\"mb-3\">ЯкÑП вО Ме ЌПжеÑе заваМÑажОÑО Tor ÑеÑез МаÑОй <mark><a href=\"https://www.torproject.org\">веб-ÑайÑ</a></mark>, вО ЌПжеÑе ПÑÑОЌаÑО кПпÑÑ Tor, ЎПÑÑÐ°Ð²Ð»ÐµÐœÑ Ð²Ð°ÐŒ ÑеÑез GetTor. GetTor â Ñе ÑлÑжба, Ñка авÑПЌаÑОÑМП вÑЎпПвÑÐŽÐ°Ñ ÐœÐ° пПвÑÐŽÐŸÐŒÐ»ÐµÐœÐœÑ Ð· пПÑОлаММÑЌО Ма ПÑÑÐ°ÐœÐœÑ Ð²ÐµÑÑÑÑ Ð±ÑаÑзеÑа Tor, ÑП ÑПзЌÑÑÑÑÑÑÑÑ Ð² ÑÑзМОÑ
ÐŒÑÑÑÑÑ
, ÑкÑ, Ñк пÑавОлП, Ме пÑЎлÑгаÑÑÑ ÑеМзÑÑÑ, ÑакОÑ
Ñк Dropbox, Google ÐОÑк Ñ Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#ПÑÑОЌаÑОÑПÑ-2",
+ "control": "ПÑÑОЌаÑОÑПÑ-2",
+ "title": "ЩПб ÑкПÑОÑÑаÑОÑÑ GetTor елекÑÑÐŸÐœÐœÐŸÑ Ð¿ÐŸÑÑПÑ:",
+ "description": "<p class=\"mb-3\">ÐаЎÑÑлÑÑÑ ÐµÐ»ÐµÐºÑÑПММОй лОÑÑ ÐœÐ° gettor(a)torproject.org. ÐапОÑÑÑÑ ÑÐ²ÐŸÑ ÐŸÐ¿ÐµÑаÑÑÐ¹ÐœÑ ÑОÑÑÐµÐŒÑ (МапÑОклаЎ, Windows, MacOS (OS X) абП Linux) Ñ ÑÑÐ»Ñ Ð¿ÐŸÐ²ÑÐŽÐŸÐŒÐ»ÐµÐœÐœÑ Ñа вÑЎпÑавÑе. GetTor вÑЎпПвÑÑÑÑ ÐµÐ»ÐµÐºÑÑПММОЌ лОÑÑПЌ, ÑП ÐŒÑÑÑОÑÑ Ð¿ÐŸÑОлаММÑ, з ÑкПгП ЌПжМа заваМÑажОÑО ÐÑаÑÐ·ÐµÑ Tor, кÑОпÑПгÑаÑÑÑМОй пÑÐŽÐ¿ÐžÑ (МеПбÑ
ÑЎМОй ÐŽÐ»Ñ Ð¿ÐµÑевÑÑкО заваМÑажеММÑ) [пПÑÐžÐ»Ð°ÐœÐœÑ ÐœÐ° ÑеÑÐŒÑМПлПгÑÑМе вОзМаÑÐµÐœÐœÑ ÐºÑОпÑПгÑаÑÑÑМПгП пÑЎпОÑÑ; вказÑвкО ÐŽÐ»Ñ Ð²ÐµÑОÑÑкаÑÑÑ], вÑЎбОÑПк, ÑкОй вОкПÑОÑÑПвÑÑÑÑÑÑ ÐŽÐ»Ñ Ð¿ÑЎпОÑÑ, Ñа кПМÑÑПлÑМа ÑÑЌа пакеÑа. ÐаЌ ЌПже запÑПпПМПваМП вОбÑаÑО \"32-ÑПзÑÑЎМе\" абП \"64-ÑПзÑÑÐŽ
Ме\" пÑПгÑаЌМе забезпеÑеММÑ: Ñе залежОÑÑ Ð²ÑÐŽ ÐŒÐŸÐŽÐµÐ»Ñ ÐºÐŸÐŒÐ¿'ÑÑеÑа, ÑкОй вО вОкПÑОÑÑПвÑÑÑе; ÐÑПкПМÑÑлÑÑÑйÑеÑÑ Ð· ЎПкÑЌеМÑаÑÑÑÑ Ð¿ÑП ÑвÑй кПЌп'ÑÑеÑ, ÑПб ÐŽÑзМаÑОÑÑ Ð±ÑлÑÑе.</p>"
+ },
+ "gettor-3": {
+ "id": "#ПÑÑОЌаÑОÑПÑ-3",
+ "control": "ПÑÑОЌаÑОÑПÑ-3",
+ "title": "ЩПб ÑкПÑОÑÑаÑОÑÑ GetTor ÑеÑез Twitter:",
+ "description": "<p class=\"mb-3\">ЩПб ПÑÑОЌаÑО пПÑÐžÐ»Ð°ÐœÐœÑ ÐŽÐ»Ñ Ð·Ð°Ð²Ð°ÐœÑÐ°Ð¶ÐµÐœÐœÑ Ð±ÑаÑзеÑа Tor, МаЎÑÑлÑÑÑ Ð¿ÑÑЌе пПвÑÐŽÐŸÐŒÐ»ÐµÐœÐœÑ ÐœÐ° <mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> з ПЎМОЌ Ñз МавеЎеМОÑ
МОжÑе кПЎÑв (ваЌ Ме пПÑÑÑбМП ÑлÑЎкÑваÑО за ПблÑкПвОЌ запОÑПЌ):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#ПÑÑОЌаÑОÑПÑ-4",
+ "control": "ПÑÑОЌаÑОÑПÑ-4",
+ "title": "ЩПб ÑкПÑОÑÑаÑОÑÑ GetTor ÑеÑез XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">ЩПб ПÑÑОЌаÑО пПÑÐžÐ»Ð°ÐœÐœÑ ÐŽÐ»Ñ Ð·Ð°Ð²Ð°ÐœÑÐ°Ð¶ÐµÐœÐœÑ Ð±ÑаÑзеÑа Tor, МаЎÑÑлÑÑÑ Ð¿ÐŸÐ²ÑÐŽÐŸÐŒÐ»ÐµÐœÐœÑ ÐœÐ° gettor@toproject(dot)org з ПЎМОЌ Ñз МавеЎеМОÑ
МОжÑе кПЎÑв:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ur.json b/ur.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ur.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ur_PK.json b/ur_PK.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ur_PK.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/uz.json b/uz.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/uz.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/ve.json b/ve.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/ve.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/vi.json b/vi.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/vi.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/wa.json b/wa.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/wa.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/wo.json b/wo.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/wo.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/zh_CN.json b/zh_CN.json
new file mode 100644
index 000000000..c731146f7
--- /dev/null
+++ b/zh_CN.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#è·åtor-1",
+ "control": "è·åtor-1",
+ "title": "torproject.org 被å±èœäºïŒæä¹äžèœœ TorïŒ",
+ "description": "<p class=\"mb-3\">åŠææ æ³éè¿æä»¬ç<mark><a href=\"https://www.torproject.org\">çœç«</a></mark>äžèœœ TorïŒäœ å¯ä»¥éè¿ GetTor è·å TorãGetTor äŒèªåšåéäžèœœ Tor Browser ææ°çæ¬çéŸæ¥ïŒç± DropboxãGoogle DriveãGitHub çæŽéŸåå°å®¡æ¥ççœç«è¿è¡ååã"
+ },
+ "gettor-2": {
+ "id": "#è·åtor-2",
+ "control": "è·åtor-2",
+ "title": "éè¿é®ç®±äœ¿çšGetTorã",
+ "description": "ågettor@torproject.orgåéé®ä»¶ãåšé®ä»¶å
容éåäžäœ çæäœç³»ç»ïŒåŠWindowsïŒMacOSïŒOS XïŒïŒæè
linuxïŒå¹¶åéãGetToräŒåéåå€é®ä»¶ïŒå
å«äžèœœTor BrowserçéŸæ¥ïŒå å¯çŸåïŒæ žå®äžèœœæ¶æéïŒïŒ»å å¯çŸåçåŠæ¯æ§å®ä¹éŸæ¥ïŒæ žå®æ¥éª€ïŒœïŒçæå å¯çŸåçå¯é¥ïŒä»¥åå
è£¹çæ ¡éªåãäœ å¯èœäŒæâ32-bitâåâ64-bitâäž€äžªçæ¬ç蜯件å¯äŸéæ©ïŒè¿åå³äºäœ æ£äœ¿çšççµèåå·ïŒæ¥é
çµèææ¡£ä»¥äºè§£æŽå€ã"
+ },
+ "gettor-3": {
+ "id": "#è·åtor-3",
+ "control": "è·åtor-3",
+ "title": "éè¿Twitter䜿çšGetTor",
+ "description": "<p class=\"mb-3\">è¯·çŽæ¥åéå
å«ä»¥äžä¿¡æ¯çå
¶äžäžæ¡çç§ä¿¡<p class=\"mb-3\"><ul><li> Linux</li>MacOS(OS X)<li><li>Windows</li></ul></p>å°<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark>ãæšäžéèŠå
³æ³šè¿äžªèŽŠå·ã"
+ },
+ "gettor-4": {
+ "id": "#è·åtor-4",
+ "control": "è·åtor-4",
+ "title": "éè¿ XMPP (Tor Messenger, Jitsi, CoyIM)䜿çšGetTorã",
+ "description": "<p class=\"mb-3\">è·åäžèœœToræµè§åšçè¿æ¥, åéäžæ¡ä¿¡æ¯å° gettor@toproject(dot)org å
å«ä»¥äžçå
¶äžäžæ¡ä¿¡æ¯ïŒ</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/zh_HK.json b/zh_HK.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/zh_HK.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/zh_TW.json b/zh_TW.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/zh_TW.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
diff --git a/zu.json b/zu.json
new file mode 100644
index 000000000..5eb21eb23
--- /dev/null
+++ b/zu.json
@@ -0,0 +1,26 @@
+{
+ "gettor-1": {
+ "id": "#gettor-1",
+ "control": "gettor-1",
+ "title": "How do I download Tor if the torproject.org is blocked?",
+ "description": "<p class=\"mb-3\">If you can't download Tor through our â<mark><a href=\"https://www.torproject.org\">website</a></mark>, you can get a copy of Tor delivered to you via GetTor. GetTor is a service that automatically responds to messages with links to the latest version of Tor Browser, hosted at a variety of locations that are less likely to be censored, such as Dropbox, Google Drive, and Github.</p>"
+ },
+ "gettor-2": {
+ "id": "#gettor-2",
+ "control": "gettor-2",
+ "title": "To use GetTor via email.",
+ "description": "<p class=\"mb-3\">Send an email to gettor(a)torproject.org. Write your operating system (such as windows, MacOS (OS X), or linux) in the body of the message and send. GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download) [link to glossary definition of cryptographic signature; instructions for verification], the fingerprint of the key used to make the signature, and the packageâs checksum. You may be offered a choice of â32-bitâ or â64-bitâ software: this depends on the model of the computer you are using; consult documentation about your computer to find out more.</p>"
+ },
+ "gettor-3": {
+ "id": "#gettor-3",
+ "control": "gettor-3",
+ "title": "To use GetTor via Twitter.",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a direct message to â<mark><a href=\"https://twitter.com/get_tor\">@get_tor</a></mark> with one of the following codes in it (you don't need to follow the account):</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ },
+ "gettor-4": {
+ "id": "#gettor-4",
+ "control": "gettor-4",
+ "title": "To use GetTor via XMPP (Tor Messenger, Jitsi, CoyIM).",
+ "description": "<p class=\"mb-3\">To get links for downloading Tor Browser, send a message to gettor@toproject(dot)org with one of the following codes in it:</p><p class=\"mb-3\"><ul><li>Linux</li><li>MacOS (OS X)</li><li>Windows</li></ul></p>"
+ }
+}
1
0

09 Apr '18
commit 1878f6717b8c93f8ddf82cf7cf8d17cf686b26ed
Author: Colin Childs <colin(a)torproject.org>
Date: Mon Apr 9 17:41:44 2018 -0500
adding support-faq and _completed
---
config | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/config b/config
index e143c2d..5654fcb 100644
--- a/config
+++ b/config
@@ -37,7 +37,7 @@ tor-messenger-uiproperties tor-messenger-uiproperties_completed
tails-greeter-2 tails-greeter-2_completed exoneratorproperties
exoneratorproperties_completed tor-browser-manual
tor-browser-manual_completed support-censorship support-censorship_completed
-support-connecting support-connecting_completed"
+support-connecting support-connecting_completed support-faq support-faq_completed"
PIDFILE=/srv/translation.torproject.org/run/update_translations.pid
1
0