[tor-commits] [translation/support-https] pulling translations from transifex

translation at torproject.org translation at torproject.org
Mon Apr 9 23:19:59 UTC 2018


commit e4abee34f6cc6872b53a257834704374ec0e9d7a
Author: Translation commit bot <translation at torproject.org>
Date:   Mon Apr 9 23:19:47 2018 +0000

    pulling translations from transifex
---
 ach.json           | 8 ++++++++
 ady.json           | 8 ++++++++
 af.json            | 8 ++++++++
 ak.json            | 8 ++++++++
 am.json            | 8 ++++++++
 ar.json            | 8 ++++++++
 arn.json           | 8 ++++++++
 ast.json           | 8 ++++++++
 az.json            | 8 ++++++++
 ba.json            | 8 ++++++++
 be.json            | 8 ++++++++
 bg.json            | 8 ++++++++
 bn.json            | 8 ++++++++
 bn_BD.json         | 8 ++++++++
 bn_IN.json         | 8 ++++++++
 bo.json            | 8 ++++++++
 br.json            | 8 ++++++++
 brx.json           | 8 ++++++++
 bs.json            | 8 ++++++++
 ca.json            | 8 ++++++++
 ceb.json           | 8 ++++++++
 cs.json            | 8 ++++++++
 csb.json           | 8 ++++++++
 cv.json            | 8 ++++++++
 cy.json            | 8 ++++++++
 da.json            | 8 ++++++++
 de.json            | 8 ++++++++
 dz.json            | 8 ++++++++
 el.json            | 8 ++++++++
 en_GB.json         | 8 ++++++++
 eo.json            | 8 ++++++++
 es.json            | 8 ++++++++
 es_AR.json         | 8 ++++++++
 es_CL.json         | 8 ++++++++
 es_CO.json         | 8 ++++++++
 es_MX.json         | 8 ++++++++
 et.json            | 8 ++++++++
 eu.json            | 8 ++++++++
 fa.json            | 8 ++++++++
 fi.json            | 8 ++++++++
 fil.json           | 8 ++++++++
 fo.json            | 8 ++++++++
 fr.json            | 8 ++++++++
 fr_CA.json         | 8 ++++++++
 fur.json           | 8 ++++++++
 fy.json            | 8 ++++++++
 ga.json            | 8 ++++++++
 gd.json            | 8 ++++++++
 gl.json            | 8 ++++++++
 gu.json            | 8 ++++++++
 gu_IN.json         | 8 ++++++++
 gun.json           | 8 ++++++++
 ha.json            | 8 ++++++++
 he.json            | 8 ++++++++
 hi.json            | 8 ++++++++
 hr.json            | 8 ++++++++
 hr_HR.json         | 8 ++++++++
 ht.json            | 8 ++++++++
 hu.json            | 8 ++++++++
 hy.json            | 8 ++++++++
 ia.json            | 8 ++++++++
 id.json            | 8 ++++++++
 is.json            | 8 ++++++++
 it.json            | 8 ++++++++
 ja.json            | 8 ++++++++
 jv.json            | 8 ++++++++
 ka.json            | 8 ++++++++
 kk.json            | 8 ++++++++
 km.json            | 8 ++++++++
 kn.json            | 8 ++++++++
 ko.json            | 8 ++++++++
 ko_KR.json         | 8 ++++++++
 ku.json            | 8 ++++++++
 ku_IQ.json         | 8 ++++++++
 kw.json            | 8 ++++++++
 ky.json            | 8 ++++++++
 la.json            | 8 ++++++++
 lb.json            | 8 ++++++++
 lg.json            | 8 ++++++++
 ln.json            | 8 ++++++++
 lo.json            | 8 ++++++++
 lt.json            | 8 ++++++++
 lv.json            | 8 ++++++++
 mg.json            | 8 ++++++++
 mi.json            | 8 ++++++++
 mk.json            | 8 ++++++++
 ml.json            | 8 ++++++++
 mn.json            | 8 ++++++++
 mr.json            | 8 ++++++++
 ms_MY.json         | 8 ++++++++
 mt.json            | 8 ++++++++
 my.json            | 8 ++++++++
 nah.json           | 8 ++++++++
 nap.json           | 8 ++++++++
 nb.json            | 8 ++++++++
 nds.json           | 8 ++++++++
 ne.json            | 8 ++++++++
 nl.json            | 8 ++++++++
 nl_BE.json         | 8 ++++++++
 nn.json            | 8 ++++++++
 nso.json           | 8 ++++++++
 oc.json            | 8 ++++++++
 om.json            | 8 ++++++++
 or.json            | 8 ++++++++
 pa.json            | 8 ++++++++
 pap.json           | 8 ++++++++
 pl.json            | 8 ++++++++
 pms.json           | 8 ++++++++
 ps.json            | 8 ++++++++
 pt.json            | 8 ++++++++
 pt_BR.json         | 8 ++++++++
 ro.json            | 8 ++++++++
 ru.json            | 8 ++++++++
 ru at petr1708.json   | 8 ++++++++
 scn.json           | 8 ++++++++
 sco.json           | 8 ++++++++
 si_LK.json         | 8 ++++++++
 sk.json            | 8 ++++++++
 sk_SK.json         | 8 ++++++++
 sl.json            | 8 ++++++++
 sl_SI.json         | 8 ++++++++
 sn.json            | 8 ++++++++
 so.json            | 8 ++++++++
 son.json           | 8 ++++++++
 sq.json            | 8 ++++++++
 sr.json            | 8 ++++++++
 sr at latin.json      | 8 ++++++++
 st.json            | 8 ++++++++
 su.json            | 8 ++++++++
 support-https.json | 8 ++++++++
 sv.json            | 8 ++++++++
 sw.json            | 8 ++++++++
 szl.json           | 8 ++++++++
 ta.json            | 8 ++++++++
 te.json            | 8 ++++++++
 te_IN.json         | 8 ++++++++
 tg.json            | 8 ++++++++
 th.json            | 8 ++++++++
 ti.json            | 8 ++++++++
 tk.json            | 8 ++++++++
 tr.json            | 8 ++++++++
 tzm.json           | 8 ++++++++
 ug at Arab.json       | 8 ++++++++
 uk.json            | 8 ++++++++
 ur.json            | 8 ++++++++
 ur_PK.json         | 8 ++++++++
 uz.json            | 8 ++++++++
 ve.json            | 8 ++++++++
 vi.json            | 8 ++++++++
 wa.json            | 8 ++++++++
 wo.json            | 8 ++++++++
 zh_CN.json         | 8 ++++++++
 zh_HK.json         | 8 ++++++++
 zh_TW.json         | 8 ++++++++
 zu.json            | 8 ++++++++
 155 files changed, 1240 insertions(+)

diff --git a/ach.json b/ach.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ach.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ady.json b/ady.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ady.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/af.json b/af.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/af.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ak.json b/ak.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ak.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/am.json b/am.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/am.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ar.json b/ar.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ar.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/arn.json b/arn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/arn.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ast.json b/ast.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ast.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/az.json b/az.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/az.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ba.json b/ba.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ba.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/be.json b/be.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/be.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/bg.json b/bg.json
new file mode 100644
index 000000000..a19cec0f6
--- /dev/null
+++ b/bg.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "Когато използвам Тор, могат ли подслушващите все още да видят информацията, която споделям със сайтове, като потребителско име, парола или други неща. които попълвам във форми?",
+	"description": "<p class=\"mb-3\">Тор предпазва от възможноста подслушващите да могат да научат сайтовете, които посещавате. Въпреки това информация, която попълвате в некриптирана форма през интернет, използвайки HTTP все пак може дабъде пресрешната при изходния препращач от оператора му или всекиго, който наблюдава трафика между изходния препращач и крайния уебсайт, който посещавате. Ако уебсайта използва HTTPS, тогава трафикът напускащ изходния препращач ще бъде криптиран и няма да бъде достъпен до подслушващите</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img c
 lass=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Ако използвате HTTPS, Вашият интернет адрес ще започва с \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Визуализацията показва каква информация е достъпна на подслушващите с или без Тор браузъра и с HTTPS криптиране</h4></div></div></div></div>"
+    }
+}
diff --git a/bn.json b/bn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/bn.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/bn_BD.json b/bn_BD.json
new file mode 100644
index 000000000..6f9edde5a
--- /dev/null
+++ b/bn_BD.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "যখন আমি টর ব্যবহার করছি, তখন আমি যে তথ্য ওয়েবসাইটের সাথে শেয়ার করি, লগ-ইন তথ্য এবং কিছু আমি ফর্ম-এ টাইপ করি, আড়িপাতকরা এখনও সে তথ্য দেখতে পারে?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/bn_IN.json b/bn_IN.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/bn_IN.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/bo.json b/bo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/bo.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/br.json b/br.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/br.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/brx.json b/brx.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/brx.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/bs.json b/bs.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/bs.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ca.json b/ca.json
new file mode 100644
index 000000000..7fcd40d6e
--- /dev/null
+++ b/ca.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "Quan utilitzo el Tor, poden esbrinar la informació que comparteixo amb els llocs web, com ara la informació d'inici de sessió i les coses que escric als formularis?",
+	"description": "<p class=\"mb-3\">El Tor us protegeix la vostra navegació de mirades indiscretes als llocs web que visiteu. Tanmateix, la informació enviada sense xifrar a Internet mitjançant HTTP bàsic, encara es pot interceptar pels relés dels operadors de de sortida o qualsevol persona que observi el trànsit entre el relé de sortida i el lloc web de destinació. Si el lloc que esteu visitant utilitza HTTPS, el trànsit que deixeu al relé de sortida es xifrarà i no serà visible.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Si utilitzeu HTTPS, aleshores l'URL del vostre lloc web començarà amb «https://».</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Aquesta visualització mostra 
 quina informació és visible amb i sense el Tor i el xifrat HTTPS.</h4></div></div></div></div>"
+    }
+}
diff --git a/ceb.json b/ceb.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ceb.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/cs.json b/cs.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/cs.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/csb.json b/csb.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/csb.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/cv.json b/cv.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/cv.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/cy.json b/cy.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/cy.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/da.json b/da.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/da.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/de.json b/de.json
new file mode 100644
index 000000000..c2b78efa7
--- /dev/null
+++ b/de.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "Während ich Tor benutze, können Lauscher immer noch die Informationen sehen, die ich mit Webseiten teile, wie Login-Informationen und Dinge, die ich in Formulare eintippe?",
+	"description": "Tor stoppt Lauscher davor über die Seiten die du besuchst zu lernen. Allerdings können Informationen, die unverschlüsselt über das Internet mit Hilfe von Plain-HTTP gesendet werden, weiterhin von den Betreibern der Exit-server oder jedem, der den Verkehr zwischen Ihrem Exit-server und Ihrer Ziel-seite beobachtet, abgefangen werden. Wenn die Seite, die Sie besuchen, HTTPS verwendet, dann wird der Verkehr, der Ihr Exit-server verlässt, verschlüsselt und ist für Lauscher nicht sichtbar. Wenn Sie HTTPS verwenden, beginnt Ihre Internetseiten-URL mit \"https://\". Diese Visualisierung zeigt, welche Informationen für Lauscher mit und ohne Tor Browser und HTTPS-Verschlüsselung sichtbar sind."
+    }
+}
diff --git a/dz.json b/dz.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/dz.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/el.json b/el.json
new file mode 100644
index 000000000..590fc20aa
--- /dev/null
+++ b/el.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "Όταν χρησιμοποιώ τον Tor, μπορούν να υποκλαπούν οι πληροφορίες που μοιράζομαι σε ιστότοπους, όπως τις πληροφορίες σύνδεσης και τα στοιχεία που πληκτρολογώ σε φόρμες;",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/en_GB.json b/en_GB.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/en_GB.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/eo.json b/eo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/eo.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/es.json b/es.json
new file mode 100644
index 000000000..6adfcab5a
--- /dev/null
+++ b/es.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "Cuando estoy usando Tor, ¿alguien a la escucha todavía puede ver la información que comparto con los sitios web, como la información de inicio de sesión y las cosas que escribo en los formularios?",
+	"description": "<p class=\"mb-3\">Tor protege contra que alguien a la escucha conozca los sitios que visita. Sin embargo, la información enviada sin cifrar por Internet usando HTTP simple todavía puede ser interceptada por los operadores de los repetidores de salida o cualquiera que observe el tráfico entre su repetidor de salida y su sitio web de destino. Si el sitio que está visitando usa HTTPS, el tráfico que abandona su repetidor de salida estará cifrado, y no será visible para quien se encuentre a la escucha.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Si está usando HTTPS, la URL de su sitio web comenzará con \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Esta vi
 sualización muestra qué información es visible para alguien a la escucha con y sin el Navegador Tor y el cifrado HTTPS.</h4></div></div></div></div>"
+    }
+}
diff --git a/es_AR.json b/es_AR.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/es_AR.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/es_CL.json b/es_CL.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/es_CL.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/es_CO.json b/es_CO.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/es_CO.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/es_MX.json b/es_MX.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/es_MX.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/et.json b/et.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/et.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/eu.json b/eu.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/eu.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/fa.json b/fa.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fa.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/fi.json b/fi.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fi.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/fil.json b/fil.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fil.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/fo.json b/fo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fo.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/fr.json b/fr.json
new file mode 100644
index 000000000..4c1a33feb
--- /dev/null
+++ b/fr.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "Quand j’utilise Tor, les systèmes d’écoute peuvent-ils encore voir les renseignements que je partage avec les sites Web, comme les renseignements de connexion et ce que je tape dans les formulaires ?",
+	"description": "<p class=\"mb-3\">Tor empêche aux systèmes d’écoute de découvrir quels sites vous visitez. Cependant, les renseignements envoyés par Internet sans chiffrement en utilisant une simple connexion HTTP peuvent toujours être interceptés par les opérateurs de relais de sortie ou quiconque observe le trafic entre votre relais de sortie et votre site Web de destination. Si le site que vous visitez utilise HTTPS, le trafic quittant votre relais de sortie sera alors chiffré et invisible aux systèmes d’écoute.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Si vous utilisez HTTPS, l’URL de votre site Web commencera par « ​https:// ».</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"car
 d-title\">Cette représentation montre quels renseignements sont visibles aux systèmes d’écoute avec et sans le navigateur Tor et le chiffrement HTTPS.</h4></div></div></div></div>"
+    }
+}
diff --git a/fr_CA.json b/fr_CA.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fr_CA.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/fur.json b/fur.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fur.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/fy.json b/fy.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fy.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ga.json b/ga.json
new file mode 100644
index 000000000..a6e966539
--- /dev/null
+++ b/ga.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "Agus Brabhsálaí Tor in úsáid agam, an bhfuil cúléisteoirí in ann an fhaisnéis a sheolaim chuig suímh Ghréasáin a fheiceáil, mar shampla focail fhaire nó faisnéis a chuirim i bhfoirmeacha?",
+	"description": "<p class=\"mb-3\">Níl cúléisteoirí in ann na suímh a dtugann tú cuairt orthu a fheiceáil nuair a úsáideann tú Tor. Mar sin féin, nuair a sheolann tú faisnéis neamhchriptithe trasna an Idirlín thar HTTP, is féidir le hoibreoirí an athsheachadáin deiridh, nó le haon duine atá ag féachaint ar an trácht idir an athsheachadán deiridh agus an suíomh Gréasáin, an trácht sin a fheiceáil. Má úsáideann an suíomh HTTPS, beidh an trácht idir an athsheachadán deiridh agus an suíomh criptithe, agus ní bheidh cúléisteoirí in ann é a fheiceáil.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Má tá tú ag úsáid HTTPS, feicfidh tú \"​https://\" ag tús an URL.</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"http
 s\"><div class=\"card-body\"><h4 class=\"card-title\">Léiríonn an pictiúr seo an t-eolas is féidir le cúléisteoirí a fheiceáil le agus gan Brabhsálaí Tor agus criptiúchán HTTPS.</h4></div></div></div></div>"
+    }
+}
diff --git a/gd.json b/gd.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gd.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/gl.json b/gl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gl.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/gu.json b/gu.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gu.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/gu_IN.json b/gu_IN.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gu_IN.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/gun.json b/gun.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gun.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ha.json b/ha.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ha.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/he.json b/he.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/he.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/hi.json b/hi.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hi.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/hr.json b/hr.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hr.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/hr_HR.json b/hr_HR.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hr_HR.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ht.json b/ht.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ht.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/hu.json b/hu.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hu.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/hy.json b/hy.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hy.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ia.json b/ia.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ia.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/id.json b/id.json
new file mode 100644
index 000000000..b96fe6137
--- /dev/null
+++ b/id.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "Saat saya menggunakan Tor, akankah pihak-pihak yang menguping melihat informasi yang saya bagikan di situs-situs, seperti informasi login dan hal-hal yang saya masukkan ke dalam formulir?",
+	"description": "<p class=\"mb-3\">Tor  melindungi Anda dari pihak-pihak yang ingin mengetahui situs yang Anda kunjungi. Namun, informasi tidak terenkripsi yang terkirim lewat Internet menggunakan HTTP polos, tetap dapat ditangkap oleh operator exit relay atau siapapun yang mengamati lalu-lintas antara exit relay dan situs tujuan. Jika situsnya menggunakan HTTPS, lalu-lintas keluar dari exit relay akan terenkripsi dan tidak terlihat oleh pihak ketiga. </p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> Jika Anda menggunakan HTTPS, URL situs Anda akan dimulai dengan \n\"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> Visualisasi ini menunjukkan informasi yang terlihat oleh para penguping
 , menggunakan dan tidak menggunakan Tor Browser dan enkripsi HTTPS. </h4></div></div></div></div>"
+    }
+}
diff --git a/is.json b/is.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/is.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/it.json b/it.json
new file mode 100644
index 000000000..7a13c6d3f
--- /dev/null
+++ b/it.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "Quando uso Tor, può qualcuno intercettare le informazioni che condivido con i siti, come le informazioni di accesso e i dati inseriti nei moduli?",
+	"description": "<p class=\"mb-3\">Tor protegge contro gli intercettatori dal sapere i siti che visiti. Comunque, le informazioni inviate su internet usando il protocollo HTTP possono essere intercettate da operatori di relay di uscita (exit node) o chiunque stia osservando il traffico tra il relay di uscita e il sito web di destinazione. Se il sito che stai visitando usa HTTPS, allora il traffico che lascia il relay di uscita sarà cifrato, e non sarà visibile da possibili intercettatori.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Se stai usando HTTPS, l'URL del sito web inizierà con \"https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Questa visualizzazione mostra quale informazione
  è visibile agli intercettatori con e senza il Browser Tor e la cifratura HTTPS.</h4></div></div></div></div>"
+    }
+}
diff --git a/ja.json b/ja.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ja.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/jv.json b/jv.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/jv.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ka.json b/ka.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ka.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/kk.json b/kk.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/kk.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/km.json b/km.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/km.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/kn.json b/kn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/kn.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ko.json b/ko.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ko.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ko_KR.json b/ko_KR.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ko_KR.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ku.json b/ku.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ku.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ku_IQ.json b/ku_IQ.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ku_IQ.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/kw.json b/kw.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/kw.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ky.json b/ky.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ky.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/la.json b/la.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/la.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/lb.json b/lb.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lb.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/lg.json b/lg.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lg.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ln.json b/ln.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ln.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/lo.json b/lo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lo.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/lt.json b/lt.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lt.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/lv.json b/lv.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lv.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/mg.json b/mg.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mg.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/mi.json b/mi.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mi.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/mk.json b/mk.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mk.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ml.json b/ml.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ml.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/mn.json b/mn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mn.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/mr.json b/mr.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mr.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ms_MY.json b/ms_MY.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ms_MY.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/mt.json b/mt.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mt.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/my.json b/my.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/my.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/nah.json b/nah.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nah.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/nap.json b/nap.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nap.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/nb.json b/nb.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nb.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/nds.json b/nds.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nds.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ne.json b/ne.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ne.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/nl.json b/nl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nl.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/nl_BE.json b/nl_BE.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nl_BE.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/nn.json b/nn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nn.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/nso.json b/nso.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nso.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/oc.json b/oc.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/oc.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/om.json b/om.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/om.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/or.json b/or.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/or.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/pa.json b/pa.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pa.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/pap.json b/pap.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pap.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/pl.json b/pl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pl.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/pms.json b/pms.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pms.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ps.json b/ps.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ps.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/pt.json b/pt.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pt.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/pt_BR.json b/pt_BR.json
new file mode 100644
index 000000000..d1295b69e
--- /dev/null
+++ b/pt_BR.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "Quando eu uso Tor, alguém que me espie pode ver as informações que eu compartilho com websites, como aquelas de logins ou de formulários que eu preencho?",
+	"description": "<p class=\"mb-3\">Tor impede que outras pessoas de saberem quais sites você consulta. Mesmo assim, informações envidas sem criptografia por sites que utilizam HTTP podem ser interceptadas por operados de relés de saída ou por qualquer pessoa que acompanhe o tráfego entre o seu relé de saída e o site que você consulta. Se o site que você estiver consultando utilizar HTTPS, o tráfego que sair do seu relé de saída será criptografado e, assim, invisível a pessoas que espionem. </p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> se você estiver usando HTTPS, a URL do seu website começará com \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Esta visualizaçÃ
 £o mostra quais informações são visíveis às pessoas que espionem como ou sem o Navegador Tor e criptografia HTTPS.</h4></div></div></div></div>"
+    }
+}
diff --git a/ro.json b/ro.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ro.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ru.json b/ru.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ru.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ru at petr1708.json b/ru at petr1708.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ru at petr1708.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/scn.json b/scn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/scn.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/sco.json b/sco.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sco.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/si_LK.json b/si_LK.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/si_LK.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/sk.json b/sk.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sk.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/sk_SK.json b/sk_SK.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sk_SK.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/sl.json b/sl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sl.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/sl_SI.json b/sl_SI.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sl_SI.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/sn.json b/sn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sn.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/so.json b/so.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/so.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/son.json b/son.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/son.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/sq.json b/sq.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sq.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/sr.json b/sr.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sr.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/sr at latin.json b/sr at latin.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sr at latin.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/st.json b/st.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/st.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/su.json b/su.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/su.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/support-https.json b/support-https.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/support-https.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/sv.json b/sv.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sv.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/sw.json b/sw.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sw.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/szl.json b/szl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/szl.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ta.json b/ta.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ta.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/te.json b/te.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/te.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/te_IN.json b/te_IN.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/te_IN.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/tg.json b/tg.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/tg.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/th.json b/th.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/th.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ti.json b/ti.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ti.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/tk.json b/tk.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/tk.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/tr.json b/tr.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/tr.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/tzm.json b/tzm.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/tzm.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ug at Arab.json b/ug at Arab.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ug at Arab.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/uk.json b/uk.json
new file mode 100644
index 000000000..b16b30765
--- /dev/null
+++ b/uk.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "Коли я користуюся Tor, чи можуть підслухувачі все-таки бачити інформацію, якою я ділюся з веб-сайтами, наприклад, інформацію про вхід та інформацію, яку я ввожу у форми?",
+	"description": "<p class=\"mb-3\">Tor захищає підслухувачів від вивчення сайтів, які ви відвідуєте. Проте інформація, яка надсилається незашифрованою через Інтернет за допомогою звичайного HTTP, може перехоплюватися операторами передавачів виходу або будь-ким, хто спостерігає за трафіком між вихідним передавачем та веб-сайтом призначення. Якщо веб-сайт, який ви відвідуєте, використовує протокол HTTPS, то трафік, що залишає вихідний ретранслятор, буде зашифрований, і він не буде видимим для підслухувачів.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=
 \"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Якщо ви використовуєте HTTPS, URL-адреса вашого веб-сайту починається з \"https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Ця візуалізація показує, яку інформацію можна побачити підслухувачам з використанням і без шифрування браузера Tor і HTTPS.</h4></div></div></div></div>"
+    }
+}
diff --git a/ur.json b/ur.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ur.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ur_PK.json b/ur_PK.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ur_PK.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/uz.json b/uz.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/uz.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/ve.json b/ve.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ve.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/vi.json b/vi.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/vi.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/wa.json b/wa.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/wa.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/wo.json b/wo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/wo.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/zh_CN.json b/zh_CN.json
new file mode 100644
index 000000000..33def34d3
--- /dev/null
+++ b/zh_CN.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "当我使用Tor时,窃听者能够获取我分享给网站的信息(登陆信息或者其他以这种格式传递的信息)吗?",
+	"description": "<p class=\"mb-3\">Tor保护您的隐私!将会阻止窃听者获取您访问网站的讯息。但是,使用HTTP协议传输的未被加密的信息可能依旧会被出口中继的掌控者,或是监视出口中继与目标站点流量的人所拦截。如果您访问的网站使用的是HTTPS协议,那么从出口中继流出的数据将会被加密 ,窃听者无法解析这些数据</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> 如果您正在使用HTTPS协议,您访问网站将由\"​https://”开始。</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> 这个动画展示了,在不使用Tor浏览器以及HTTPS加密的情况下,您的信息是如何对窃听者å
 ¯è§çš„。</h4></div></div></div></div>"
+    }
+}
diff --git a/zh_HK.json b/zh_HK.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/zh_HK.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/zh_TW.json b/zh_TW.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/zh_TW.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}
diff --git a/zu.json b/zu.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/zu.json
@@ -0,0 +1,8 @@
+{
+    "https-1": {
+	"id": "#https-1",
+	"control": "https-1",
+	"title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+	"description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"​https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"
+    }
+}



More information about the tor-commits mailing list