commit e4abee34f6cc6872b53a257834704374ec0e9d7a Author: Translation commit bot translation@torproject.org Date: Mon Apr 9 23:19:47 2018 +0000
pulling translations from transifex --- ach.json | 8 ++++++++ ady.json | 8 ++++++++ af.json | 8 ++++++++ ak.json | 8 ++++++++ am.json | 8 ++++++++ ar.json | 8 ++++++++ arn.json | 8 ++++++++ ast.json | 8 ++++++++ az.json | 8 ++++++++ ba.json | 8 ++++++++ be.json | 8 ++++++++ bg.json | 8 ++++++++ bn.json | 8 ++++++++ bn_BD.json | 8 ++++++++ bn_IN.json | 8 ++++++++ bo.json | 8 ++++++++ br.json | 8 ++++++++ brx.json | 8 ++++++++ bs.json | 8 ++++++++ ca.json | 8 ++++++++ ceb.json | 8 ++++++++ cs.json | 8 ++++++++ csb.json | 8 ++++++++ cv.json | 8 ++++++++ cy.json | 8 ++++++++ da.json | 8 ++++++++ de.json | 8 ++++++++ dz.json | 8 ++++++++ el.json | 8 ++++++++ en_GB.json | 8 ++++++++ eo.json | 8 ++++++++ es.json | 8 ++++++++ es_AR.json | 8 ++++++++ es_CL.json | 8 ++++++++ es_CO.json | 8 ++++++++ es_MX.json | 8 ++++++++ et.json | 8 ++++++++ eu.json | 8 ++++++++ fa.json | 8 ++++++++ fi.json | 8 ++++++++ fil.json | 8 ++++++++ fo.json | 8 ++++++++ fr.json | 8 ++++++++ fr_CA.json | 8 ++++++++ fur.json | 8 ++++++++ fy.json | 8 ++++++++ ga.json | 8 ++++++++ gd.json | 8 ++++++++ gl.json | 8 ++++++++ gu.json | 8 ++++++++ gu_IN.json | 8 ++++++++ gun.json | 8 ++++++++ ha.json | 8 ++++++++ he.json | 8 ++++++++ hi.json | 8 ++++++++ hr.json | 8 ++++++++ hr_HR.json | 8 ++++++++ ht.json | 8 ++++++++ hu.json | 8 ++++++++ hy.json | 8 ++++++++ ia.json | 8 ++++++++ id.json | 8 ++++++++ is.json | 8 ++++++++ it.json | 8 ++++++++ ja.json | 8 ++++++++ jv.json | 8 ++++++++ ka.json | 8 ++++++++ kk.json | 8 ++++++++ km.json | 8 ++++++++ kn.json | 8 ++++++++ ko.json | 8 ++++++++ ko_KR.json | 8 ++++++++ ku.json | 8 ++++++++ ku_IQ.json | 8 ++++++++ kw.json | 8 ++++++++ ky.json | 8 ++++++++ la.json | 8 ++++++++ lb.json | 8 ++++++++ lg.json | 8 ++++++++ ln.json | 8 ++++++++ lo.json | 8 ++++++++ lt.json | 8 ++++++++ lv.json | 8 ++++++++ mg.json | 8 ++++++++ mi.json | 8 ++++++++ mk.json | 8 ++++++++ ml.json | 8 ++++++++ mn.json | 8 ++++++++ mr.json | 8 ++++++++ ms_MY.json | 8 ++++++++ mt.json | 8 ++++++++ my.json | 8 ++++++++ nah.json | 8 ++++++++ nap.json | 8 ++++++++ nb.json | 8 ++++++++ nds.json | 8 ++++++++ ne.json | 8 ++++++++ nl.json | 8 ++++++++ nl_BE.json | 8 ++++++++ nn.json | 8 ++++++++ nso.json | 8 ++++++++ oc.json | 8 ++++++++ om.json | 8 ++++++++ or.json | 8 ++++++++ pa.json | 8 ++++++++ pap.json | 8 ++++++++ pl.json | 8 ++++++++ pms.json | 8 ++++++++ ps.json | 8 ++++++++ pt.json | 8 ++++++++ pt_BR.json | 8 ++++++++ ro.json | 8 ++++++++ ru.json | 8 ++++++++ ru@petr1708.json | 8 ++++++++ scn.json | 8 ++++++++ sco.json | 8 ++++++++ si_LK.json | 8 ++++++++ sk.json | 8 ++++++++ sk_SK.json | 8 ++++++++ sl.json | 8 ++++++++ sl_SI.json | 8 ++++++++ sn.json | 8 ++++++++ so.json | 8 ++++++++ son.json | 8 ++++++++ sq.json | 8 ++++++++ sr.json | 8 ++++++++ sr@latin.json | 8 ++++++++ st.json | 8 ++++++++ su.json | 8 ++++++++ support-https.json | 8 ++++++++ sv.json | 8 ++++++++ sw.json | 8 ++++++++ szl.json | 8 ++++++++ ta.json | 8 ++++++++ te.json | 8 ++++++++ te_IN.json | 8 ++++++++ tg.json | 8 ++++++++ th.json | 8 ++++++++ ti.json | 8 ++++++++ tk.json | 8 ++++++++ tr.json | 8 ++++++++ tzm.json | 8 ++++++++ ug@Arab.json | 8 ++++++++ uk.json | 8 ++++++++ ur.json | 8 ++++++++ ur_PK.json | 8 ++++++++ uz.json | 8 ++++++++ ve.json | 8 ++++++++ vi.json | 8 ++++++++ wa.json | 8 ++++++++ wo.json | 8 ++++++++ zh_CN.json | 8 ++++++++ zh_HK.json | 8 ++++++++ zh_TW.json | 8 ++++++++ zu.json | 8 ++++++++ 155 files changed, 1240 insertions(+)
diff --git a/ach.json b/ach.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ach.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ady.json b/ady.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ady.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/af.json b/af.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/af.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ak.json b/ak.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ak.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/am.json b/am.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/am.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ar.json b/ar.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ar.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/arn.json b/arn.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/arn.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ast.json b/ast.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ast.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/az.json b/az.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/az.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ba.json b/ba.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ba.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/be.json b/be.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/be.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/bg.json b/bg.json new file mode 100644 index 000000000..a19cec0f6 --- /dev/null +++ b/bg.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "ÐПгаÑП ОзпПлзваЌ ТПÑ, ÐŒÐŸÐ³Ð°Ñ Ð»Ðž пПЎÑлÑÑваÑОÑе вÑе ПÑе Ўа вОЎÑÑ ÐžÐœÑПÑЌаÑОÑÑа, кПÑÑП ÑпПЎелÑÐŒ ÑÑÑ ÑайÑПве, каÑП пПÑÑебОÑелÑкП ОЌе, паÑПла ОлО ÐŽÑÑгО МеÑа. кПОÑП пПпÑлваЌ вÑв ÑПÑЌО?", + "description": "<p class="mb-3">Ð¢ÐŸÑ Ð¿ÑеЎпазва ÐŸÑ Ð²ÑзЌПжМПÑÑа пПЎÑлÑÑваÑОÑе Ўа ÐŒÐŸÐ³Ð°Ñ ÐŽÐ° МаÑÑÐ°Ñ ÑайÑПвеÑе, кПОÑП пПÑеÑаваÑе. ÐÑпÑекО ÑПва ОМÑПÑЌаÑОÑ, кПÑÑП пПпÑлваÑе в МекÑОпÑОÑаМа ÑПÑЌа пÑез ОМÑеÑМеÑ, ОзпПлзвайкО HTTP вÑе пак ЌПже ЎабÑЎе пÑеÑÑеÑМаÑа пÑО ÐžÐ·Ñ ÐŸÐŽÐœÐžÑ Ð¿ÑепÑаÑÐ°Ñ ÐŸÑ ÐŸÐ¿ÐµÑаÑПÑа ÐŒÑ ÐžÐ»Ðž вÑекОгП, кПйÑП МаблÑЎава ÑÑаÑОка ÐŒÐµÐ¶ÐŽÑ ÐžÐ·Ñ ÐŸÐŽÐœÐžÑ Ð¿ÑепÑаÑÐ°Ñ Ðž кÑÐ°Ð¹ÐœÐžÑ ÑебÑайÑ, кПйÑП пПÑеÑаваÑе. ÐкП ÑебÑайÑа ОзпПлзва HTTPS, ÑПгава ÑÑаÑОкÑÑ ÐœÐ°Ð¿ÑÑÐºÐ°Ñ ÐžÐ·Ñ ÐŸÐŽÐœÐžÑ Ð¿ÑепÑаÑÐ°Ñ Ñе бÑЎе кÑОпÑОÑаМ О ÐœÑЌа Ўа бÑЎе ЎПÑÑÑпеМ ЎП пПЎÑлÑÑваÑОÑе</p><div class="row"><div class="col-md-6"><div class="card"><img c lass="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">ÐкП ОзпПлзваÑе HTTPS, ÐаÑОÑÑ ÐžÐœÑеÑÐœÐµÑ Ð°ÐŽÑÐµÑ Ñе запПÑва Ñ "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">ÐОзÑалОзаÑОÑÑа пПказва каква ОМÑПÑЌаÑÐžÑ Ðµ ЎПÑÑÑпМа Ма пПЎÑлÑÑваÑОÑе Ñ ÐžÐ»Ðž без Ð¢ÐŸÑ Ð±ÑаÑзÑÑа О Ñ HTTPS кÑОпÑОÑаМе</h4></div></div></div></div>" + } +} diff --git a/bn.json b/bn.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/bn.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/bn_BD.json b/bn_BD.json new file mode 100644 index 000000000..6f9edde5a --- /dev/null +++ b/bn_BD.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "àŠ¯àŠàŠš àŠàŠ®àŠ¿ àŠàŠ° àŠ¬à§àŠ¯àŠ¬àŠ¹àŠŸàŠ° àŠàŠ°àŠàŠ¿, àŠ€àŠàŠš àŠàŠ®àŠ¿ àŠ¯à§ àŠ€àŠ¥à§àŠ¯ àŠàŠ¯àŠŒà§àŠ¬àŠžàŠŸàŠàŠà§àŠ° àŠžàŠŸàŠ¥à§ àŠ¶à§àŠ¯àŠŒàŠŸàŠ° àŠàŠ°àŠ¿, àŠ²àŠ-àŠàŠš àŠ€àŠ¥à§àŠ¯ àŠàŠ¬àŠ àŠàŠ¿àŠà§ àŠàŠ®àŠ¿ àŠ«àŠ°à§àŠ®-àŠ àŠàŠŸàŠàŠªÂ àŠàŠ°àŠ¿, àŠàŠ¡àŠŒàŠ¿àŠªàŠŸàŠ€àŠàŠ°àŠŸ àŠàŠàŠšàŠ àŠžà§ àŠ€àŠ¥à§àŠ¯ àŠŠà§àŠàŠ€à§Â àŠªàŠŸàŠ°à§?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/bn_IN.json b/bn_IN.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/bn_IN.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/bo.json b/bo.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/bo.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/br.json b/br.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/br.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/brx.json b/brx.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/brx.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/bs.json b/bs.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/bs.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ca.json b/ca.json new file mode 100644 index 000000000..7fcd40d6e --- /dev/null +++ b/ca.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "Quan utilitzo el Tor, poden esbrinar la informació que comparteixo amb els llocs web, com ara la informació d'inici de sessió i les coses que escric als formularis?", + "description": "<p class="mb-3">El Tor us protegeix la vostra navegació de mirades indiscretes als llocs web que visiteu. Tanmateix, la informació enviada sense xifrar a Internet mitjançant HTTP bà sic, encara es pot interceptar pels relés dels operadors de de sortida o qualsevol persona que observi el trà nsit entre el relé de sortida i el lloc web de destinació. Si el lloc que esteu visitant utilitza HTTPS, el trà nsit que deixeu al relé de sortida es xifrarà i no serà visible.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">Si utilitzeu HTTPS, aleshores l'URL del vostre lloc web començarà amb «https://%C3%82%C2%BB.</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">Aquesta visualització mostra quina informació és visible amb i sense el Tor i el xifrat HTTPS.</h4></div></div></div></div>" + } +} diff --git a/ceb.json b/ceb.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ceb.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/cs.json b/cs.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/cs.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/csb.json b/csb.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/csb.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/cv.json b/cv.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/cv.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/cy.json b/cy.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/cy.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/da.json b/da.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/da.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/de.json b/de.json new file mode 100644 index 000000000..c2b78efa7 --- /dev/null +++ b/de.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "WÀhrend ich Tor benutze, können Lauscher immer noch die Informationen sehen, die ich mit Webseiten teile, wie Login-Informationen und Dinge, die ich in Formulare eintippe?", + "description": "Tor stoppt Lauscher davor ÃŒber die Seiten die du besuchst zu lernen. Allerdings können Informationen, die unverschlÃŒsselt ÃŒber das Internet mit Hilfe von Plain-HTTP gesendet werden, weiterhin von den Betreibern der Exit-server oder jedem, der den Verkehr zwischen Ihrem Exit-server und Ihrer Ziel-seite beobachtet, abgefangen werden. Wenn die Seite, die Sie besuchen, HTTPS verwendet, dann wird der Verkehr, der Ihr Exit-server verlÀsst, verschlÃŒsselt und ist fÃŒr Lauscher nicht sichtbar. Wenn Sie HTTPS verwenden, beginnt Ihre Internetseiten-URL mit "https://". Diese Visualisierung zeigt, welche Informationen fÃŒr Lauscher mit und ohne Tor Browser und HTTPS-VerschlÃŒsselung sichtbar sind." + } +} diff --git a/dz.json b/dz.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/dz.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/el.json b/el.json new file mode 100644 index 000000000..590fc20aa --- /dev/null +++ b/el.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "ÎÏαΜ ÏÏηÏιΌοÏÎ¿Î¹Ï ÏοΜ Tor, ÎŒÏοÏοÏÎœ Μα Ï ÏοκλαÏοÏÎœ οι ÏληÏοÏοÏÎ¯ÎµÏ ÏÎ¿Ï ÎŒÎ¿Î¹ÏάζοΌαι Ïε ιÏÏÏÏοÏÎ¿Ï Ï, ÏÏÏÏ ÏÎ¹Ï ÏληÏοÏοÏÎ¯ÎµÏ ÏÏΜΎεÏÎ·Ï ÎºÎ±Î¹ Ïα ÏÏοιÏεία ÏÎ¿Ï ÏληκÏÏÎ¿Î»Î¿Î³Ï Ïε ÏÏÏΌεÏ;", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/en_GB.json b/en_GB.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/en_GB.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/eo.json b/eo.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/eo.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/es.json b/es.json new file mode 100644 index 000000000..6adfcab5a --- /dev/null +++ b/es.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "Cuando estoy usando Tor, ¿alguien a la escucha todavÃa puede ver la información que comparto con los sitios web, como la información de inicio de sesión y las cosas que escribo en los formularios?", + "description": "<p class="mb-3">Tor protege contra que alguien a la escucha conozca los sitios que visita. Sin embargo, la información enviada sin cifrar por Internet usando HTTP simple todavÃa puede ser interceptada por los operadores de los repetidores de salida o cualquiera que observe el tráfico entre su repetidor de salida y su sitio web de destino. Si el sitio que está visitando usa HTTPS, el tráfico que abandona su repetidor de salida estará cifrado, y no será visible para quien se encuentre a la escucha.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">Si está usando HTTPS, la URL de su sitio web comenzará con "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">Esta vi sualización muestra qué información es visible para alguien a la escucha con y sin el Navegador Tor y el cifrado HTTPS.</h4></div></div></div></div>" + } +} diff --git a/es_AR.json b/es_AR.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/es_AR.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/es_CL.json b/es_CL.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/es_CL.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/es_CO.json b/es_CO.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/es_CO.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/es_MX.json b/es_MX.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/es_MX.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/et.json b/et.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/et.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/eu.json b/eu.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/eu.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/fa.json b/fa.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/fa.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/fi.json b/fi.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/fi.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/fil.json b/fil.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/fil.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/fo.json b/fo.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/fo.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/fr.json b/fr.json new file mode 100644 index 000000000..4c1a33feb --- /dev/null +++ b/fr.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "Quand jâutilise Tor, les systÚmes dâécoute peuvent-ils encore voir les renseignements que je partage avec les sites Web, comme les renseignements de connexion et ce que je tape dans les formulairesâ?", + "description": "<p class="mb-3">Tor empêche aux systÚmes dâécoute de découvrir quels sites vous visitez. Cependant, les renseignements envoyés par Internet sans chiffrement en utilisant une simple connexion HTTP peuvent toujours être interceptés par les opérateurs de relais de sortie ou quiconque observe le trafic entre votre relais de sortie et votre site Web de destination. Si le site que vous visitez utilise HTTPS, le trafic quittant votre relais de sortie sera alors chiffré et invisible aux systÚmes dâécoute.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">Si vous utilisez HTTPS, lâURL de votre site Web commencera par « âhttps://%C3%82%C2%A0%C3%82%C2%BB.</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="car d-title">Cette représentation montre quels renseignements sont visibles aux systÚmes dâécoute avec et sans le navigateur Tor et le chiffrement HTTPS.</h4></div></div></div></div>" + } +} diff --git a/fr_CA.json b/fr_CA.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/fr_CA.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/fur.json b/fur.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/fur.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/fy.json b/fy.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/fy.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ga.json b/ga.json new file mode 100644 index 000000000..a6e966539 --- /dev/null +++ b/ga.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "Agus Brabhsálaà Tor in úsáid agam, an bhfuil cúléisteoirà in ann an fhaisnéis a sheolaim chuig suÃmh Ghréasáin a fheiceáil, mar shampla focail fhaire nó faisnéis a chuirim i bhfoirmeacha?", + "description": "<p class="mb-3">NÃl cúléisteoirà in ann na suÃmh a dtugann tú cuairt orthu a fheiceáil nuair a úsáideann tú Tor. Mar sin féin, nuair a sheolann tú faisnéis neamhchriptithe trasna an IdirlÃn thar HTTP, is féidir le hoibreoirà an athsheachadáin deiridh, nó le haon duine atá ag féachaint ar an trácht idir an athsheachadán deiridh agus an suÃomh Gréasáin, an trácht sin a fheiceáil. Má úsáideann an suÃomh HTTPS, beidh an trácht idir an athsheachadán deiridh agus an suÃomh criptithe, agus nà bheidh cúléisteoirà in ann é a fheiceáil.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">Má tá tú ag úsáid HTTPS, feicfidh tú "âhttps://" ag tús an URL.</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="http s"><div class="card-body"><h4 class="card-title">LéirÃonn an pictiúr seo an t-eolas is féidir le cúléisteoirà a fheiceáil le agus gan Brabhsálaà Tor agus criptiúchán HTTPS.</h4></div></div></div></div>" + } +} diff --git a/gd.json b/gd.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/gd.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/gl.json b/gl.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/gl.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/gu.json b/gu.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/gu.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/gu_IN.json b/gu_IN.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/gu_IN.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/gun.json b/gun.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/gun.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ha.json b/ha.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ha.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/he.json b/he.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/he.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/hi.json b/hi.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/hi.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/hr.json b/hr.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/hr.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/hr_HR.json b/hr_HR.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/hr_HR.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ht.json b/ht.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ht.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/hu.json b/hu.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/hu.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/hy.json b/hy.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/hy.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ia.json b/ia.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ia.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/id.json b/id.json new file mode 100644 index 000000000..b96fe6137 --- /dev/null +++ b/id.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "Saat saya menggunakan Tor, akankah pihak-pihak yang menguping melihat informasi yang saya bagikan di situs-situs, seperti informasi login dan hal-hal yang saya masukkan ke dalam formulir?", + "description": "<p class="mb-3">Tor melindungi Anda dari pihak-pihak yang ingin mengetahui situs yang Anda kunjungi. Namun, informasi tidak terenkripsi yang terkirim lewat Internet menggunakan HTTP polos, tetap dapat ditangkap oleh operator exit relay atau siapapun yang mengamati lalu-lintas antara exit relay dan situs tujuan. Jika situsnya menggunakan HTTPS, lalu-lintas keluar dari exit relay akan terenkripsi dan tidak terlihat oleh pihak ketiga. </p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title"> Jika Anda menggunakan HTTPS, URL situs Anda akan dimulai dengan \n"âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title"> Visualisasi ini menunjukkan informasi yang terlihat oleh para penguping , menggunakan dan tidak menggunakan Tor Browser dan enkripsi HTTPS. </h4></div></div></div></div>" + } +} diff --git a/is.json b/is.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/is.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/it.json b/it.json new file mode 100644 index 000000000..7a13c6d3f --- /dev/null +++ b/it.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "Quando uso Tor, può qualcuno intercettare le informazioni che condivido con i siti, come le informazioni di accesso e i dati inseriti nei moduli?", + "description": "<p class="mb-3">Tor protegge contro gli intercettatori dal sapere i siti che visiti. Comunque, le informazioni inviate su internet usando il protocollo HTTP possono essere intercettate da operatori di relay di uscita (exit node) o chiunque stia osservando il traffico tra il relay di uscita e il sito web di destinazione. Se il sito che stai visitando usa HTTPS, allora il traffico che lascia il relay di uscita sarà cifrato, e non sarà visibile da possibili intercettatori.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">Se stai usando HTTPS, l'URL del sito web inizierà con "https://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">Questa visualizzazione mostra quale informazione Ú visibile agli intercettatori con e senza il Browser Tor e la cifratura HTTPS.</h4></div></div></div></div>" + } +} diff --git a/ja.json b/ja.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ja.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/jv.json b/jv.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/jv.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ka.json b/ka.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ka.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/kk.json b/kk.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/kk.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/km.json b/km.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/km.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/kn.json b/kn.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/kn.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ko.json b/ko.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ko.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ko_KR.json b/ko_KR.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ko_KR.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ku.json b/ku.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ku.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ku_IQ.json b/ku_IQ.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ku_IQ.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/kw.json b/kw.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/kw.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ky.json b/ky.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ky.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/la.json b/la.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/la.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/lb.json b/lb.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/lb.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/lg.json b/lg.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/lg.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ln.json b/ln.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ln.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/lo.json b/lo.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/lo.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/lt.json b/lt.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/lt.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/lv.json b/lv.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/lv.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/mg.json b/mg.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/mg.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/mi.json b/mi.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/mi.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/mk.json b/mk.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/mk.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ml.json b/ml.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ml.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/mn.json b/mn.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/mn.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/mr.json b/mr.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/mr.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ms_MY.json b/ms_MY.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ms_MY.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/mt.json b/mt.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/mt.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/my.json b/my.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/my.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/nah.json b/nah.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/nah.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/nap.json b/nap.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/nap.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/nb.json b/nb.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/nb.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/nds.json b/nds.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/nds.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ne.json b/ne.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ne.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/nl.json b/nl.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/nl.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/nl_BE.json b/nl_BE.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/nl_BE.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/nn.json b/nn.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/nn.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/nso.json b/nso.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/nso.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/oc.json b/oc.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/oc.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/om.json b/om.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/om.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/or.json b/or.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/or.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/pa.json b/pa.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/pa.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/pap.json b/pap.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/pap.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/pl.json b/pl.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/pl.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/pms.json b/pms.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/pms.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ps.json b/ps.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ps.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/pt.json b/pt.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/pt.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/pt_BR.json b/pt_BR.json new file mode 100644 index 000000000..d1295b69e --- /dev/null +++ b/pt_BR.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "Quando eu uso Tor, alguém que me espie pode ver as informações que eu compartilho com websites, como aquelas de logins ou de formulários que eu preencho?", + "description": "<p class="mb-3">Tor impede que outras pessoas de saberem quais sites você consulta. Mesmo assim, informações envidas sem criptografia por sites que utilizam HTTP podem ser interceptadas por operados de relés de saÃda ou por qualquer pessoa que acompanhe o tráfego entre o seu relé de saÃda e o site que você consulta. Se o site que você estiver consultando utilizar HTTPS, o tráfego que sair do seu relé de saÃda será criptografado e, assim, invisÃvel a pessoas que espionem. </p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title"> se você estiver usando HTTPS, a URL do seu website começará com "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">Esta visualizaçà £o mostra quais informações são visÃveis à s pessoas que espionem como ou sem o Navegador Tor e criptografia HTTPS.</h4></div></div></div></div>" + } +} diff --git a/ro.json b/ro.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ro.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ru.json b/ru.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ru.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ru@petr1708.json b/ru@petr1708.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ru@petr1708.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/scn.json b/scn.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/scn.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/sco.json b/sco.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/sco.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/si_LK.json b/si_LK.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/si_LK.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/sk.json b/sk.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/sk.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/sk_SK.json b/sk_SK.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/sk_SK.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/sl.json b/sl.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/sl.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/sl_SI.json b/sl_SI.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/sl_SI.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/sn.json b/sn.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/sn.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/so.json b/so.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/so.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/son.json b/son.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/son.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/sq.json b/sq.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/sq.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/sr.json b/sr.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/sr.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/sr@latin.json b/sr@latin.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/sr@latin.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/st.json b/st.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/st.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/su.json b/su.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/su.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/support-https.json b/support-https.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/support-https.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/sv.json b/sv.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/sv.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/sw.json b/sw.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/sw.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/szl.json b/szl.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/szl.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ta.json b/ta.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ta.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/te.json b/te.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/te.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/te_IN.json b/te_IN.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/te_IN.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/tg.json b/tg.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/tg.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/th.json b/th.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/th.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ti.json b/ti.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ti.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/tk.json b/tk.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/tk.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/tr.json b/tr.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/tr.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/tzm.json b/tzm.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/tzm.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ug@Arab.json b/ug@Arab.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ug@Arab.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/uk.json b/uk.json new file mode 100644 index 000000000..b16b30765 --- /dev/null +++ b/uk.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "ÐПлО Ñ ÐºÐŸÑОÑÑÑÑÑÑ Tor, ÑО ЌПжÑÑÑ Ð¿ÑÐŽÑлÑÑ ÑваÑÑ Ð²Ñе-ÑакО баÑОÑО ÑÐœÑПÑЌаÑÑÑ, ÑÐºÐŸÑ Ñ ÐŽÑлÑÑÑ Ð· веб-ÑайÑаЌО, МапÑОклаЎ, ÑÐœÑПÑЌаÑÑÑ Ð¿ÑП Ð²Ñ ÑÐŽ Ñа ÑÐœÑПÑЌаÑÑÑ, ÑÐºÑ Ñ Ð²Ð²ÐŸÐ¶Ñ Ñ ÑПÑЌО?", + "description": "<p class="mb-3">Tor Ð·Ð°Ñ ÐžÑÐ°Ñ Ð¿ÑÐŽÑлÑÑ ÑваÑÑв вÑÐŽ вОвÑÐµÐœÐœÑ ÑайÑÑв, ÑÐºÑ Ð²Ðž вÑЎвÑÐŽÑÑÑе. ÐÑПÑе ÑÐœÑПÑЌаÑÑÑ, Ñка МаЎÑОлаÑÑÑÑÑ ÐœÐµÐ·Ð°ÑОÑÑÐŸÐ²Ð°ÐœÐŸÑ ÑеÑез ÐÐœÑеÑÐœÐµÑ Ð·Ð° ÐŽÐŸÐ¿ÐŸÐŒÐŸÐ³ÐŸÑ Ð·Ð²ÐžÑайМПгП HTTP, ЌПже пеÑÐµÑ ÐŸÐ¿Ð»ÑваÑОÑÑ ÐŸÐ¿ÐµÑаÑПÑаЌО пеÑеЎаваÑÑв Ð²ÐžÑ ÐŸÐŽÑ Ð°Ð±ÐŸ бÑÐŽÑ-кОЌ, Ñ ÑП ÑпПÑÑеÑÑÐ³Ð°Ñ Ð·Ð° ÑÑаÑÑкПЌ ÐŒÑж Ð²ÐžÑ ÑЎМОЌ пеÑеЎаваÑеЌ Ñа веб-ÑайÑПЌ пÑОзМаÑеММÑ. ЯкÑП веб-ÑайÑ, ÑкОй вО вÑЎвÑÐŽÑÑÑе, вОкПÑОÑÑПвÑÑ Ð¿ÑПÑПкПл HTTPS, ÑП ÑÑаÑÑк, ÑП залОÑÐ°Ñ Ð²ÐžÑ ÑЎМОй ÑеÑÑаМÑлÑÑПÑ, бÑЎе заÑОÑÑПваМОй, Ñ Ð²ÑÐœ Ме бÑЎе вОЎОЌОЌ ÐŽÐ»Ñ Ð¿ÑÐŽÑлÑÑ ÑваÑÑв.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src= "/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">ЯкÑП вО вОкПÑОÑÑПвÑÑÑе HTTPS, URL-аЎÑеÑа ваÑПгП веб-ÑайÑÑ Ð¿ÐŸÑОМаÑÑÑÑÑ Ð· "https://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">ÐŠÑ Ð²ÑзÑалÑзаÑÑÑ Ð¿ÐŸÐºÐ°Ð·ÑÑ, ÑÐºÑ ÑÐœÑПÑЌаÑÑÑ ÐŒÐŸÐ¶ÐœÐ° пПбаÑОÑО пÑÐŽÑлÑÑ ÑваÑаЌ з вОкПÑОÑÑаММÑÐŒ Ñ Ð±ÐµÐ· ÑОÑÑÑÐ²Ð°ÐœÐœÑ Ð±ÑаÑзеÑа Tor Ñ HTTPS.</h4></div></div></div></div>" + } +} diff --git a/ur.json b/ur.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ur.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ur_PK.json b/ur_PK.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ur_PK.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/uz.json b/uz.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/uz.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/ve.json b/ve.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/ve.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/vi.json b/vi.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/vi.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/wa.json b/wa.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/wa.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/wo.json b/wo.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/wo.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/zh_CN.json b/zh_CN.json new file mode 100644 index 000000000..33def34d3 --- /dev/null +++ b/zh_CN.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "åœæ䜿çšToræ¶ïŒçªå¬è èœå€è·åæå享ç»çœç«çä¿¡æ¯ïŒç»éä¿¡æ¯æè å ¶ä»ä»¥è¿ç§æ ŒåŒäŒ éçä¿¡æ¯ïŒåïŒ", + "description": "<p class="mb-3">Torä¿æ€æšçéç§ïŒå°äŒé»æ¢çªå¬è è·åæšè®¿é®çœç«ç讯æ¯ãäœæ¯ïŒäœ¿çšHTTPåè®®äŒ èŸçæªè¢«å å¯çä¿¡æ¯å¯èœäŸæ§äŒè¢«åºå£äžç»§çææ§è ïŒææ¯çè§åºå£äžç»§äžç®æ ç«ç¹æµéç人ææŠæªãåŠææšè®¿é®ççœç«äœ¿çšçæ¯HTTPSåè®®ïŒé£ä¹ä»åºå£äžç»§æµåºçæ°æ®å°äŒè¢«å å¯ ïŒçªå¬è æ æ³è§£æè¿äºæ°æ®</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title"> åŠææšæ£åšäœ¿çšHTTPSåè®®ïŒæšè®¿é®çœç«å°ç±"âhttps://%C3%A2%C2%80%C2%9D%C3%A5%C5%92%C2%80%C3%A5%C2%A7%C2%8B%C3%A3%C2%80%C...</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title"> è¿äžªåšç»å±ç€ºäºïŒåšäžäœ¿çšToræµè§åšä»¥åHTTPSå å¯çæ åµäžïŒæšçä¿¡æ¯æ¯åŠäœå¯¹çªå¬è å ¯è§çã</h4></div></div></div></div>" + } +} diff --git a/zh_HK.json b/zh_HK.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/zh_HK.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/zh_TW.json b/zh_TW.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/zh_TW.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +} diff --git a/zu.json b/zu.json new file mode 100644 index 000000000..625e41dd5 --- /dev/null +++ b/zu.json @@ -0,0 +1,8 @@ +{ + "https-1": { + "id": "#https-1", + "control": "https-1", + "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "âhttps://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" + } +}