[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [translation/tor_outreach_md] pulling translations from transifex



commit c2cc755d1adf468957a40a86197c1bc121ee6739
Author: Translation commit bot <translation@xxxxxxxxxxxxxx>
Date:   Sat Mar 16 07:49:04 2019 +0000

    pulling translations from transifex
---
 ach.po                   | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 af.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 am.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ar.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ast.po                   | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 az.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ba.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 be.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 bg.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 bn.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 bo.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 br.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 bs.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ca.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ceb.po                   | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 cs.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 cy.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 da.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 de.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 dz.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 el.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 en_GB.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 eo.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 es.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 es_AR.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 es_CL.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 es_CO.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 es_ES.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 es_MX.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 et.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 eu.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 fa.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 fa_AF.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 fi.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 fil.po                   | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 fo.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 fr.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 fy.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ga.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 gd.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 gl.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 gu.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 he.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 hi.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 hr.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 hu.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 hy.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 id.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 is.po                    | 161 ++++++++++++++++++++++++++++++++++++++++++++++
 it.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ja.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 jv.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ka.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 kk.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 km.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 kn.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ko.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ku_IQ.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ky.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 la.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 lb.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 lo.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 lt.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 lv.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 mk.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ml.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 mn.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 mr.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ms_MY.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 mt.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 my.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 nb.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 nds.po                   | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ne.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 nl.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 nn.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 oc.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 or.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 pa.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 pl.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 pms.po                   | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ps.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 pt_BR.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 pt_PT.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ro.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ru.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 sco.po                   | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 si.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 sk.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 sl.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 sn.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 so.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 sq.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 sr.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 sv.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 sw.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 szl.po                   | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ta.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 te.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 tg.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 th.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 tk.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 tl_PH.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 tor-outreach2019-2020.md | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 tr.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ug@xxxxxxx               | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 uk.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 ur.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 uz.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 vi.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 vls.po                   | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 yo.po                    | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 zh_CN.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 zh_TW.po                 | 162 +++++++++++++++++++++++++++++++++++++++++++++++
 114 files changed, 18467 insertions(+)

diff --git a/ach.po b/ach.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ach.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/af.po b/af.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/af.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/am.po b/am.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/am.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ar.po b/ar.po
new file mode 100644
index 000000000..1f392900a
--- /dev/null
+++ b/ar.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Ù?ا Ù?Ù? تÙ?رØ?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ast.po b/ast.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ast.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/az.po b/az.po
new file mode 100644
index 000000000..74575398f
--- /dev/null
+++ b/az.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Tor nÉ?dir?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ba.po b/ba.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ba.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/be.po b/be.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/be.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/bg.po b/bg.po
new file mode 100644
index 000000000..41bd1f4d7
--- /dev/null
+++ b/bg.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Ð?акво е Tor ?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/bn.po b/bn.po
new file mode 100644
index 000000000..3b96d6221
--- /dev/null
+++ b/bn.po
@@ -0,0 +1,162 @@
+# �র প�রসার �পাদান 2019-2020
+
+# 1. ��পন�য়তার �ন�য �র 
+
+### ��পন�য়তা ���ি মান�ষ�র �ধি�ার
+
+�মাদ�র �ন���র মত, �ল�শা তার ব�শিরভা� সময় �নলা�ন� ব�যয় �র�ন--বন�ধ�দ�র সাথ� য��ায��, স�শ�যাল মিডিয়ায় প�স�� �রা �ব� �য়�ব ব�রা�� �রা ।
+
+�িন�ত� �দান��, তিনি ল��ষ�য �র���ন য� তার ���র �ন�সন�ধান� সম�পর��িত বি���াপন �নলা�ন� তার পি�� নিয়��� ।
+
+�� ��ব ���রমণাত�ম� মতান�যায়� য� তিনি �নলা�ন বি���াপন� �ি�� �ব�ষণা �র�ন �ব� �ানত� পার�ন য� ��া শ�ধ� বি���াপনদাতাদ�র তার ��র�যা�ি� �িন�ত� তার ���সপি, বিশ�ল�ষণ ��ম�পানি, সামা�ি� মিডিয়া প�ল�যা�ফর�ম, �ব� �র�.
+
+�ল�শা তার তথ�য স���রহ �র� না �মন সফ��য়�যার ����� প�ত� �ব� ব�যবহার �রত� �ান, তা�� ��র�যা� �র� না �ব� �ন�যান�য পরিষ�বা��লি�� তার সম�পর��� ��পন�য় �ি�� বলব� না ।
+
+স� ���ি স�থান�য় হা�ারস�প�স  � ���ি প�রা�ভ�সি ��র�নি� যায় �ব� **�র ব�রা��ার** সম�পর��� �ানত� পার�, ��মাত�র �য়�ব ব�রা��ার যা তা�� ব�নাম� ব�রা�� �রত� �ন�মতি দ�য় ।
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+ফ�রন�দা ব�রা�িল� প�র�নন �ধি�ার�র �পর নার�দ�র সম�মিলিত মন�য�� প�রদান �র�, য��ান� �র�ভপাত �ব�ধ 
+
+ফ�রন�দা �ব� তার সহ�র�ম�রা ���ি �য়�বসা�� ত�রি �র���ন, যার মধ�য� রয়��� �র�ভপাত স�বিধা, �ন�ম নিয়ন�ত�রণ �ব� মান�ষ�র প�র�নন স���রান�ত �া�য়া তথ�য।
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+নি��দ�র র��ষা �রার �ন�য, ফ�রনন�দ  �ব� তার সহ�র�ম�রা �র **onion services** ব�যবহার �র� �য়�বসা���ি ত�রি �র��� । Onion Services শ�ধ�মাত�র তাদ�র সার�ভার �পার��র হিসাব� �বিষ���ত হ�য়া থ��� র��ষা �রা হয় না, �িন�ত� তারা �র ব�রা��ার ব�যবহার �র� তাদ�র �য়�বসা��� দর�শ�দ�র র��ষা �রত� সহায়তা �র�.
+
+�সল�, ফ�রন�দা তার সব �য়�ব ব�রা��ি�য়�র �ন�য **�র ব�রা��ার�ি** ব�যবহার �র� ��বল নিরাপদ দি�� থা�ত�।
+
+তিনি ���ি �র-�ালিত ��যাপ ব�যবহার �র�ন **OnionShare** �ন�য �র�ম�দ�র�� নিরাপদ� � ব�য��তি�ত ভাব� ফা�ল পাঠাত� । 
+
+### ফ�রন�দার মত� প�র�নন �ধি�ার �র�ম�রা ম�লি� স�বাধ�নতার �ন�য লড়া� �র��, �র �র তাদ�র প�রতির�ধ ��ষমতা বাড়াত� সাহায�য �র�� ।
+
+---
+
+# 3. মানবাধি�ার�র �ন�য �র
+
+### Water is life 
+
+��লানি ���ি ����� ��রাম� বসবাস �র� যার মধ�য� দি�� বিস�ত�ত নদ� �ল�।
+
+�� নদ� তার প�র�বপ�র�ষদ�র সম� থ��� তার সম�প�রদায়�র �ন�য পানি সরবরাহ �র��� । 
+
+�িন�ত� বর�তমান�, ��লান�র নদ� ����ল� ত�ল�র �ন�য শ��তিশাল� বহ��াতি� ��ম�পানি��ল� ড�রিলি�-�র মাধ�যম� হ�ম�ির ম��� পড়��� ।
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+�� সমস�ত সফ���য়�যার �র ব�যবহার �র� ��লানির ��পন�য়তা র��ষা� সাহায�য �রার �ন�য ।
+
+### ��লানি মত মানবাধি�ার �র�ম�রা তাদ�র সম�প�রদায়�র মধ�য� ন�যায়বি�ার�র �ন�য লড়া� �র��, �ব� �র তাদ�র প�রতির�ধ ��ষমতা�� শ��তিশাল� �র�।
+
+---
+
+# 4. �ন��ি-স�ন�সরশ�প�র �ন�য �র
+
+### প�রা��র না স�ত� নির�মাণ
+
+�িন তার পরিবার থ��� দ�র� ���ি দ�শ� প�রথমবার�র মত� ভ�রমণ �র�িল�ন।
+
+���ি হ���ল� প���ান�র পর, তিনি তার ল�যাপ�প ��ল�ন।
+
+তিনি �ত�া� �বসন�ন �িল�ন য�, য�ন বার�তা "�ান��শন শ�ষ হয়� ���� " প�রথম� তার �য়�ব ব�রা��ার� দ��া �িয়��িল, তিনি ভ�ব��িল�ন ��ি তার নি��র ভ�ল�র �ারণ� হয়��� ।
+
+�িন�ত� বার বার ��ষ��া �রার পর, তিনি ব��ত� প�র��িল�ন য� তার �ম�ল প�রদান�ার�, ���ি নি�� �য়�বসা��, �ব� �ন�� ��যাপ�লি��শন �ন�পলব�ধ �িল।
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+��লানি সবথ��� স�রা সস�তা ভিপি�ন ��ন�া ব��ত� �ধা �ন��া ��ষ��া �র� ।
+
+তিনি ���ি�� ব��� ন�ন �ব� �� ম�হ�র�ত�র �ন�য ��ি �া� �রত� লা�ল, �িন�ত� পা�� মিনি��র পর� স�য���ি �ফলা�ন হয়� ��ল �ব� ভিপি�ন �র স�য���ত হ� না।
+
+��লানি �ন�যান�য �পশন ����� প�ত� প�ত� থা�� �ব� �র ব�রা��ার সম�পর��� শি�� �ব� �িভাব� ��ি স�ন�সরশিপ �র�প �রত� পার�।
+
+প�র���রাম ডা�নল�ড �রার �ন�য তিনি ���ি �ফিসিয়াল �য়�বসা�� মিরর�� ����� প�য়���ন ।
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. শ�য়ার��ত শা�াসমঠা
+
+## �র �ি �িনিস ?
+
+�র ম���ত সফ��য়�যার �ব� ���ি ��লা ন���য়ার�� যা �নলা�ন� ��র�যা�ি�, ন�রদারি �ব� স�ন�সরশিপ থ��� র��ষা �রত� সাহায�য �র� ।
+�র �র �ন�য ত�রি �রা হয় 501(C)3 �ম�রি�া ভিত�তি� �লাভ�ন� ' �র প�র����� ' । 
+
+�র ব�যবহার �রার সব��য়� সহ� �পায় হল �র ব�রা��ার ।
+�পনি য�ন �র ব�রা��ার ব�যবহার �র�ন, ত�ন ��� দ��ত� পায় না �পনি �ি �য়�বসা�� দ���ন বা �পনি বিশ�ব�র ��থা থ��� �স���ন। 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/bo.po b/bo.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/bo.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/br.po b/br.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/br.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/bs.po b/bs.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/bs.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ca.po b/ca.po
new file mode 100644
index 000000000..3715997b5
--- /dev/null
+++ b/ca.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Què és Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ceb.po b/ceb.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ceb.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/cs.po b/cs.po
new file mode 100644
index 000000000..8c73a9e81
--- /dev/null
+++ b/cs.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Co je Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/cy.po b/cy.po
new file mode 100644
index 000000000..8a84a75c1
--- /dev/null
+++ b/cy.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Beth yw Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/da.po b/da.po
new file mode 100644
index 000000000..ef02163ed
--- /dev/null
+++ b/da.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Hvad er Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/de.po b/de.po
new file mode 100644
index 000000000..6c469e5b6
--- /dev/null
+++ b/de.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FÃ?R PRIVATSPHÃ?RE 
+
+### Datenschutz ist ein Menschenrecht
+
+Wie viele von uns verbringt Aleisha die meiste Zeit mit Online-Kontakten mit Freunden, Postings in sozialen Medien und dem Surfen im Internet.
+
+Aber in letzter Zeit hat sie bemerkt, dass Anzeigen, die sich auf ihre früheren Recherchen beziehen, sie online verfolgen.
+
+Dies fühlt sich so aufdringlich an, dass sie einige Recherchen über Online-Anzeigen durchführt und erfährt, dass es nicht nur Werbetreibende sind, die sie verfolgen, sondern auch ihr ISP, Analytikunternehmen, Social Media Plattformen und mehr.
+
+Aleisha beschlie�t, Software zu finden und zu verwenden, die ihre Daten nicht sammelt, sie nicht verfolgt und anderen Diensten nichts Privates über sie erzählt.
+
+Sie besucht ein Privattraining in einem lokalen Hackerspace und lernt **Tor Browser** kennen, den einzigen Webbrowser, der es ihr ermöglicht, anonym zu surfen.
+
+---
+
+# 2.TOR FÃ?R FEMINISTINNEN 
+
+### Die Zukunft ist cyberfeministisch.
+
+Fernanda leitet ein Frauenkollektiv, das sich auf Reproduktionsrechte in Brasilien konzentriert, wo Abtreibung illegal ist.
+
+Fernanda und ihre Kollegen erstellten eine Website mit Informationen über Abtreibungszugang, Geburtenkontrolle und andere Ressourcen für Menschen, die reproduktive Informationen suchen.
+
+Wenn diese Website mit ihnen verlinkt wäre, könnten sie verhaftet werden - oder schlimmer noch.
+
+Um sich selbst zu schützen, haben Fernanda und ihre Kollegen die Website mit den Tor **onion-Diensten** erstellt. Onion-Dienste schützen sie nicht nur davor, als Betreiber des Servers entdeckt zu werden, sondern helfen auch, Besucher ihrer Website zu schützen, indem sie verlangen, dass sie Tor-Browser verwenden. 
+
+Tatsächlich verwendet Fernanda **Tor Browser** für alle ihre Webbrowser, nur um auf der sicheren Seite zu sein.
+
+Sie verwendet auch eine Tor-powered App namens **OnionShare**, um Dateien sicher und privat an andere Aktivisten zu senden.
+
+### Aktivisten für Reproduktionsrechte wie Fernanda kämpfen für die Grundfreiheiten, und Tor hilft, ihren Widerstand zu stärken.
+
+---
+
+# 3. TOR FÃ?R MENSCHENRECHTE
+
+### Wasser ist Leben 
+
+Jelani lebt in einem kleinen Dorf, durch das ein breiter Fluss flieÃ?t.
+
+Dieser Fluss versorgt seine Gemeinde seit den Tagen seiner Vorfahren mit Wasser.
+
+Aber heute ist Jelani's Fluss von mächtigen multinationalen Unternehmen bedroht, die in der Region nach �l bohren.
+
+Private Sicherheitsfirmen, die von diesen Unternehmen bezahlt werden, nutzen leistungsstarke �berwachungsmechanismen, um die Online-Aktivitäten von Jelani und seinen Nachbarn im Dorf zu überwachen, die sich für den Schutz ihres heiligen Flusses einsetzen.
+
+Jelani verwendet **Tor Browser**, um zu verhindern, dass diese Unternehmen zusehen, wie er Websites zum internationalen Schutz der Menschenrechte und zur Rechtshilfe besucht und Blogbeiträge über die Widerstandsbewegung in seinem Dorf schreibt.
+
+Er verwendet auch **OnionShare** und **SecureDrop**, um Dokumente sicher an Journalisten zu senden, die helfen, diese Menschenrechtsverletzungen aufzudecken.
+
+Alle diese Programme verwenden Tor, um die Privatsphäre von Jelani zu schützen.
+
+### Menschenrechtsaktivisten wie Jelani kämpfen für Gerechtigkeit in ihren Gemeinden, und Tor hilft, ihren Widerstand zu stärken.
+
+---
+
+# 4. TOR FÃ?R ANTI-ZENSUR
+
+### Brücken bauen statt Mauern
+
+Jean reiste zum ersten Mal in ein Land, das weit von seiner Familie entfernt war.
+
+Als er in einem Hotel ankam, öffnete er seinen Laptop.
+
+Er war so erschöpft, dass er, als die Meldung "Connection has timed out" zum ersten Mal in seinem Webbrowser erschien, dachte, es sei auf seinen eigenen Fehler zurückzuführen.
+
+Aber nachdem er es immer wieder versucht hatte, erkannte er, dass sein E-Mail-Provider, eine Nachrichten-Website und viele Apps nicht verfügbar waren.
+
+Er hatte gehört, dass dieses Land das Internet zensiert und sich gefragt, ob das passiert.
+Wie konnte er seine Familie von hinter dieser undurchdringlichen Mauer aus kontaktieren?
+Nachdem er einige Websuchen durchgeführt hatte, fand er ein Forum und las über VPNs, private Dienste, die es Ihnen ermöglichen, sich mit einem anderen unzensierten Netzwerk zu verbinden.
+
+Jean verbrachte eine halbe Stunde damit, herauszufinden, welches preisgünstige VPN das Beste ist.
+
+Er wählte eines aus, und für einen Moment schien es zu funktionieren, aber nach fünf Minuten ging die Verbindung offline, und das VPN wollte sich nicht mehr verbinden.
+
+Jean las weiter, um andere Optionen zu finden, und lernte Tor Browser kennen und wie er die Zensur umgehen kann.
+
+Er fand einen offiziellen Website-Mirror, um das Programm herunterzuladen.
+
+Als er **Tor Browser** öffnete, folgte er den Anweisungen für zensierte Benutzer und verband sich mit einer Brücke, die es ihm ermöglichte, wieder auf das Internet zuzugreifen.
+
+Mit Tor Browser kann Jean frei und privat surfen und seine Familie kontaktieren.
+
+### Zensierte Benutzer auf der ganzen Welt verlassen sich auf Tor Browser für einen kostenlosen, stabilen und unzensierten Zugang zum Internet.
+
+---
+
+# 5. Gemeinsame Bereiche
+
+## Was ist Tor?
+
+Tor ist kostenlose Software und ein offenes Netzwerk, das dich vor Verfolgung, �berwachung und Zensur online schützt.
+Tor wird kostenlos von einem 501(c)3 U.S.-amerikanischen gemeinnützigen Verein namens Tor Project erstellt.
+
+Der einfachste Weg, Tor zu benutzen, ist der Tor-Browser.
+Wenn du Tor-Browser verwendest, kann niemand sehen, welche Websites du besuchst oder von wo in der Welt du kommst. 
+
+Andere Anwendungen, wie SecureDrop und OnionShare, verwenden Tor, um ihre Benutzer vor �berwachung und Zensur zu schützen.
+
+
+## 6. Wie funktioniert Tor?
+
+Amal will Bekeles Website privat besuchen, also öffnet sie den Tor-Browser.
+
+Der Tor-Browser wählt einen zufälligen Schaltkreis aus drei Relays aus, d.h. Computern auf der ganzen Welt, die konfiguriert sind, um den Verkehr über das Tor-Netzwerk zu leiten.
+
+Tor Browser verschlüsselt dann dreimal ihre Website-Anfrage und sendet sie an das erste Tor-Relay in ihrer Schaltung.
+
+Das erste Relay entfernt die erste Verschlüsselungsebene, erfährt aber nicht, dass das Ziel die Website von Bekele ist.
+
+Das erste Relay erfährt nur den nächsten Ort in der Schaltung, nämlich das zweite Relay.
+
+Das zweite Relay entfernt eine weitere Verschlüsselungsebene und leitet die Webseitenanforderung an das dritte Relay weiter.
+
+Das dritte Relay entfernt die letzte Verschlüsselungsebene und leitet die Webseitenanfrage an ihr Ziel, Bekeles Website, weiter, aber es wei� nicht, dass die Anfrage von Amal kommt.
+
+Bekele weiÃ? nicht, dass die Website-Anfrage von Amal kam, es sei denn, sie sagt es ihm.
+
+## 7. Wer benutzt Tor?
+
+Menschen auf der ganzen Welt nutzen Tor, um ihre Privatsphäre zu schützen und frei auf das Internet zuzugreifen.
+
+Tor hilft Journalisten, Menschenrechtsaktivisten, Opfern häuslicher Gewalt, akademischen Forschern und allen, die Verfolgung, Zensur oder �berwachung erleben.
+
+## 6. Warum Tor vertrauen?
+
+Tor ist auf Privatsphäre ausgelegt. Wir wissen nicht, wer unsere Benutzer sind, und wir führen keine Protokolle über die Benutzeraktivität.
+
+Tor-Relay-Betreiber können die wahre Identität von Tor-Benutzern nicht preisgeben.
+
+Kontinuierliche Peer-Reviews des Quellcodes von akademischen und Open-Source-Communities stellen sicher, dass es in Tor keine Hintertüren gibt, und unser Sozialvertrag verspricht, dass wir nie hinter die Kulissen von Tor gehen werden.
+
+## 7. Der Tor-Community beitreten
+
+Tor wird durch eine Vielzahl von Benutzern, Entwicklern, Relaybetreibern und Anwälten aus der ganzen Welt ermöglicht.
+
+Wir brauchen deine Hilfe, um Tor benutzerfreundlicher und sicherer für alle Menschen zu machen.
+
+Du kannst dich freiwillig bei Tor melden, indem du Code schreibst, einen Relay betreibst, Dokumentation erstellst, Benutzerunterstützung anbietest oder Leuten in deiner Community von Tor erzählst.
+
+Die Tor-Community unterliegt einem Verhaltenskodex, und wir beschreiben unsere Versprechen an die Community in unserem Gesellschaftsvertrag.
+
+Erfahren Sie mehr über Tor, indem Sie unsere Website, unser Wiki besuchen, uns im IRC finden, einer unserer Mailinglisten beitreten oder sich für Tor News anmelden unter newsletter.torproject.org.
+
+
+## 8. Tor herunterladen
+
+Tor für Desktop
+torproject.org/download
+
+TOR AUF DEM HANDY
+### Android
+Tor-Browser für Android ist bei GooglePlay erhältlich.
+
+### iOS
+Onion Browser, entwickelt von M. Tigas, ist der einzige Browser, den wir für iOS empfehlen.
+
diff --git a/dz.po b/dz.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/dz.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/el.po b/el.po
new file mode 100644
index 000000000..626504111
--- /dev/null
+++ b/el.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Τι είναι Ï?ο Tor;
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/en_GB.po b/en_GB.po
new file mode 100644
index 000000000..25e431b89
--- /dev/null
+++ b/en_GB.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda ve çalıÅ?ma arkadaÅ?ları cinsel aktivite üzerine bilgi arayan insanlar için kürtaj geçerliliÄ?i, doÄ?um kontrolü ve diÄ?er kaynaklar hakkında bir websitesi kurdular. 
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/eo.po b/eo.po
new file mode 100644
index 000000000..b3f6c3841
--- /dev/null
+++ b/eo.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Kio estas Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/es.po b/es.po
new file mode 100644
index 000000000..26d77cd9b
--- /dev/null
+++ b/es.po
@@ -0,0 +1,162 @@
+# Material de divulgación de Tor 2019-2020
+
+# 1. TOR PARA LA PRIVACIDAD
+
+### La privacidad es un derecho humano.
+
+Como muchos de nosotros, Aleisha pasa la mayor parte de su tiempo en línea: conectada con los amigos, publicando en redes sociales y navegando por la web.
+
+Pero últimamente, ha notado que los anuncios relacionados con sus búsquedas anteriores la siguen doquiera que navegue.
+
+Esto resulta tan invasivo que investiga sobre anuncios en la red y aprende que no solo los anunciantes la rastrean, sino también su ISP, las compañías de análisis, las plataformas de redes sociales y más.
+
+Aleisha decide que quiere encontrar y usar software que no recopile sus datos, no la rastree y no informe a otros servicios nada privado sobre ella.
+
+Asiste a un curso sobre privacidad en un espacio de hackers local y aprende sobre ** el Tor Browser **, el único navegador web que le permite navegar de forma anónima.
+
+---
+
+# 2.TOR PARA LAS FEMINISTAS 
+
+### El futuro es ciberfeminista
+
+Fernanda dirige un colectivo de mujeres centrado en los derechos reproductivos en Brasil, donde el aborto es ilegal.
+
+Fernanda y sus compañeras crearon un sitio web con información sobre el acceso al aborto, el control de la natalidad y otros recursos para las personas que buscan información reproductiva.
+
+Si se vinculara este sitio web a ellas, las podrían arrestar, o peor.
+
+Para protegerse, Fernanda y sus colegas crearon el sitio web utilizando los servicios Tor ** onion **. Los servicios de Onion no solo las protegen de ser descubiertas como operadoras del servidor, sino que también ayudan a proteger a los visitantes de su sitio web al requerir que usen el Tor Browser.
+
+De hecho, Fernanda utiliza ** el Tor Browser ** para toda su navegación en la web solo para estar segura.
+
+Ella también usa una aplicación de Tor llamada ** OnionShare ** para enviar archivos a otras activistas de forma segura y privada.
+
+### Las activistas por los derechos reproductivos como Fernanda luchan por libertades fundamentales, y Tor ayuda a fortalecer su resistencia.
+
+---
+
+# 3. TOR POR LOS DERECHOS HUMANOS
+
+### El agua es vida
+
+Jelani vive en un pequeño pueblo atravesado por un ancho río.
+
+Este río ha proporcionado agua a su comunidad desde los más remotos tiempos.
+
+Pero ahora, el río Jelani se ve amenazado por poderosas compañías multinacionales que perforan buscando petróleo en la región.
+
+Las empresas de seguridad privadas, pagadas por estas compañías, utilizan poderosos mecanismos de vigilancia para monitorear las actividades en línea de Jelani y sus vecinos en la aldea, que se están organizando para proteger su río sagrado.
+
+Jelani usa ** el Tor Browser ** para evitar que estas compañías lo vean mientras visita sitios web de protección de derechos humanos y asistencia legal internacionales y escribe en blogs sobre el movimiento de resistencia en su aldea.
+
+También usa ** OnionShare ** y ** SecureDrop ** para enviar documentos de manera segura a periodistas que están ayudando a hacer público estas violaciones de derechos humanos.
+
+Tor usa todo este software para ayudar a proteger la privacidad de Jelani.
+
+### Los activistas por los derechos humanos como Jelani luchan por la justicia en sus comunidades, y Tor ayuda a fortalecer su resistencia.
+
+---
+
+# 4. TOR LUCHA CONTRA LA CENSURA
+
+### Construye puentes, no muros
+
+Jean viaja, por primera vez, a un país lejos de su familia.
+
+Después de llegar al hotel, abre el portátil 
+
+Estaba tan agotado que la primera vez que apareció en su navegador el mensaje "La conexión se ha agotado", pensó que era un error suyo.
+
+Tras intentarlo una y otra vez, se dio cuenta de que su proveedor de correo electrónico, un sitio web de noticias y muchas aplicaciones no estaban disponibles.
+
+Había oído que en este país se censuraba a internet y se preguntaba si era eso lo que sucedía.
+¿Cómo podría ponerse en contacto con su familia con ese muro impenetrable?
+Después de hacer algunas búsquedas en la red, encontró un foro y leyó sobre VPN, servicios privados que te permiten conectarte a otra red sin censura.
+
+Jean se pasó media hora tratando de averiguar qué VPN barata sería mejor.
+
+Eligió uno y en un principio parecía que funcionaba, pero después de cinco minutos, la conexión se desconectó y la VPN ya no se conectó.
+
+Jean siguió leyendo buscando otras opciones y aprendió sobre el Tor Browser y sobre cómo puede eludir la censura.
+
+Encontró un mirror oficial para bajarse el programa.
+
+Cuando abrió ** el Tor Browser **, siguió las indicaciones para usuarios censurados y se conectó a un puente que le permitió acceder a Internet nuevamente. 
+
+Con Tor, Jean puede navegar libre y privadamente y contactar con su familia.
+
+### Los usuarios censurados de todo el mundo confían en el Tor Browser para conseguir una forma libre, estable y sin censura de acceder a Internet.
+
+---
+
+# 5. Secciones compartidas
+
+## ¿Qué es Tor?
+
+Tor es software libre y una red abierta que te ayuda a protegerte contra el seguimiento, la vigilancia y la censura en línea.
+Tor es creada de forma libre por una organización sin ánimo de lucro 501 (c) 3 con sede en los Estados Unidos llamada el Proyecto Tor.
+
+La forma más fácil de usar Tor es el Tor Browser.
+Cuando usas el Tor Browser, nadie puede ver qué sitios web visitas o de qué parte del mundo vienes
+
+Otras aplicaciones, como SecureDrop y OnionShare, usan Tor para proteger a sus usuarios contra la vigilancia y la censura.
+
+
+## 6. ¿Como funciona Tor?
+
+Amal quiere visitar la web de Bekele en privado, así que abre el Tor Browser.
+
+El Tor Browser selecciona un circuito aleatorio de tres relés, que son ordenadores de todo el mundo configurados para enrutar el tráfico a través de la red Tor.
+
+El Tor Browser a continuación encripta la solicitud del sitio web tres veces y la envía al primer relé Tor del circuito.
+
+El primer relé elimina la primera capa de encriptación pero no se entera de que el destino es la web Bekele.
+
+El primer relé solo sabe la siguiente ubicación en el circuito, que es el segundo relé.
+
+El segundo relé elimina otra capa de cifrado y envía la solicitud de página web al tercer relé.
+
+El tercer relé elimina la última capa de cifrado y envía la solicitud de la web a su destino, el sitio web Bekele, pero no sabe que la solicitud proviene de Amal.
+
+Bekele no sabe que la solicitud proviene de Amal a menos que se lo diga ella.
+
+## 7. ¿Quién usa Tor? 
+
+Personas de todo el mundo usan Tor para proteger su privacidad y acceder a la web libremente.
+
+Tor ayuda a proteger a periodistas, defensores de los derechos humanos, víctimas de violencia doméstica, investigadores académicos y cualquier persona que sufra el rastreo, la censura o la vigilancia.
+
+## 6. ¿Por qué confiar en Tor?
+
+Tor está diseñado para la privacidad. No sabemos quiénes son nuestros usuarios y no mantenemos registros de la actividad de los usuarios.
+
+Los operadores de retransmisión de Tor no pueden revelar la verdadera identidad de los usuarios de Tor.
+
+La revisión continua del código fuente de Tor por parte de las comunidades académicas y de código abierto garantiza que no haya puertas traseras en Tor, y nuestro contrato social promete que nunca lo haremos.
+
+## 7. Ingresa en la comunidad Tor
+
+Tor es posible gracias a un conjunto diverso de usuarios, desarrolladores, operadores de retransmisión y defensores de todo el mundo.
+
+Necesitamos tu ayuda para hacer que Tor sea más sencillo y seguro para las personas de todo el mundo.
+
+Puede ser voluntario de Tor escribiendo código, ejecutando un relée, creando documentación, ofreciendo soporte al usuario o difundiendo entre las personas de tu comunidad qué es Tor.
+
+La comunidad de Tor se rige por un código de conducta, y mostramos nuestro compromiso con la comunidad en nuestro contrato social.
+
+Consigue más información sobre Tor visitando nuestro sitio web, nuestro wiki, encontrándonos en IRC, uniéndote a una de nuestras listas de correo o inscribiéndote en Tor News en newsletter.torproject.org.
+
+
+## 8. Bajar Tor
+
+Tor para escritorio
+torproject.org/download
+
+TOR EN EL MÃ?VIL
+### Android 
+El Tor Browser para Android está disponible en GooglePlay.
+
+### iOS
+El navegador Onion, desarrollado por M. Tigas, es el único navegador que recomendamos para iOS.
+
diff --git a/es_AR.po b/es_AR.po
new file mode 100644
index 000000000..d3591c652
--- /dev/null
+++ b/es_AR.po
@@ -0,0 +1,162 @@
+# Material de Difusión Tor 2019-2020
+
+# 1. TOR PARA LA PRIVACIDAD
+
+### La privacidad es un derecho humano
+
+Como muchos de nosotros, Aleisha pasa la mayor parte de su tiempo en línea - conectándose con amigos, publicando en redes sociales, y navegando la web.
+
+Pero últimamente, ha notado que las publicidades relacionadas con sus búsquedas previas la están siguiendo en línea.
+
+Esto lo siente tan invasivo, que está haciendo alguna investigación acerca de publicidades en línea, y descubre que no sólo son los publicitarios quiénes la están rastreando, sino también su ISP, compañías de análisis de datos, plataformas de redes sociales, y más.
+
+Aleisha decide que quiere encontrar y usar software que no recopila sus datos, no la rastrea, y no le dice a otros servicios cualquier cosa privada acerca de ella.
+
+Va a un entrenamiento en privacidad a un espacio de hackeo local y aprende acerca del **Tor Browser**, el único navegador web que le permite navegar anónimamente.
+
+---
+
+# 2. TOR PARA FEMINISTAS
+
+### El futuro es cyberfeminista
+
+Fernanda dirige una colectividad de mujeres enfocada en derechos reproductivos en Brasil, donde el aborto es ilegal.
+
+Fernanda y sus colegas construyen un sitio web con información acerca de acceso al aborto, control de natalidad, y otros recursos para personas buscando información reproductiva.
+
+Si este sitio web fuera vinculado a ellas, podrían ser arrestadas -- o peor.
+
+Para protegerse a sí mismas, Fernanda y sus colegas crearon el sitio web usando **servicios onion** de Tor. Los servicios onion no sólo las protegen de ser descubiertas como las operadoras del servidor, sino que también ayudan a proteger a los visitantes de su sitio web al requerir que usen el Tor Browser.
+
+De hecho, Fernanda usa el **Tor Browser** para todas sus exploraciones en la web, sólo para estar en lo seguro.
+
+También usa una aplicación basada en Tor llamada **OnionShare** para enviar archivos a otras activistas en forma segura y privada.
+
+### Las activistas de derechos reproductivos como Fernanda están luchando por libertades fundamentales, y Tor las ayuda a potenciar su resistencia.
+
+---
+
+# 3. TOR POR LOS DERECHOS HUMANOS
+
+### El agua es vida
+
+Jelani vive en una pequeña villa a través de la cual corre un ancho río.
+
+Este río ha provisto agua a su comunidad desde los días de sus ancestros.
+
+Pero hoy, el río de Jelani está amenazado por poderosas compañías multinacionales perforando en busca de petróleo en la región.
+
+Firmas de seguridad privadas, pagadas por éstas compañías, usan poderosos mecanismos de vigilancia para monitorear las actividades en línea de Jelani y sus vecinos en la villa, quienes se están organizando para proteger su río sagrado.
+
+Jelani usa el **Tor Browser** para evitar que éstas compañías lo vigilen mientras visita sitios web internacionales para protección de los derechos humanos y asistencia legal, y escribe un blog acerca del movimiento de resistencia en su villa.
+
+También usa **OnionShare** y **SecureDrop** para enviar documentos en forma segura a periodistas que están ayudando a exponer estas violaciones a los derechos humanos.
+
+Todo este software usa Tor para ayudar a proteger la privacidad de Jelani.
+
+### Activistas de derechos humanos como como Jelani están peleando por la justicia en sus comunidades, y Tor ayuda a potenciar su resistencia.
+
+---
+
+# 4. TOR PARA ANTI-CENSURA
+
+### Construir puentes, no muros
+
+Jean estaba viajando por primera vez a un país lejos de su familia.
+
+Luego de llegar a un hotel, abrió su laptop.
+
+Estaba tan cansado que cuando el mensaje "La conexión ha expirado" apareció por primera vez en su navegador, pensó que era debido a su propio error.
+
+Pero luego de tratar una y otra vez, se dió cuenta que su proveedor de correo electrónico, un sitio web de noticias, y muchas aplicaciones no estaban disponibles.
+
+Había escuchado que este país censura Internet, y se preguntó si eso es lo que estaba pasando.
+¿Cómo podría contactar a su familia desde atrás de este muro impenetrable?
+Luego de hacer algunas búsquedas web, encontró un foro y leyó acerca de RPVs, servicios privados que te permiten conectar a otra red no censurada.
+
+Jean tardó media hora tratando de descubrir cuál de las RPV baratas era mejor.
+
+Eligió una y por un momento pareció funcionar, pero luego de cinco minutos la conexión se interrumpió y la RPV no volvió a conectar.
+
+Jean siguió leyendo para encontrar otras opciones y aprendió acerca del Tor Browser y cómo puede eludir la censura.
+
+Encontró un espejo de un sitio web oficial para descargar el programa.
+
+Cuando abrió el **Tor Browser**, siguió las solicitudes para usuarios censurados y se conectó a un puente que le permitió  acceder a Internet nuevamente.
+
+Con el Tor Browser, Jean puede navegar libre y privadamente, y contactar a su familia.
+
+### Usuarios censurados a través de todo el mundo confían en el Tor Browser por una manera libre, estable y no censurada de acceder a Internet.
+
+---
+
+# 5. Secciones Compartidas
+
+## ¿Qué es Tor?
+
+Tor es software libre y una red abierta que ayuda a protegerte de rastreo, vigilancia y censura en línea.
+Tor fue creado gratis por El Proyecto Tor, una organización sin fines de lucro basada en EE.UU., definida bajo 501(c)3.
+
+La manera más fácil de usar Tor es el Tor Browser.
+Cuando lo usás, nadie puede ver qué sitios web visitás, o de dónde en el mundo estás viniendo.
+
+Otras aplicaciones, como SecureDrop y OnionShare, usan Tor para proteger a sus usuarios en contra de la vigilancia y la censura.
+
+
+## 6. ¿Cómo funciona Tor?
+
+Amal quiere visitar el sitio web de Bekele en forma privada, de manera que abre el Tor Browser.
+
+El Tor Browser selecciona un circuito aleatorio de tres relevos, los cuales son computadoras alrededor del mundo configuradas para enrutar tráfico sobre la red de Tor.
+
+Luego, el Tor Browser encripta su solicitud del sitio web tres veces y la envía al primer relevo Tor en su circuito.
+
+El primer relevo remueve la primera capa de encriptación, pero no sabe que el destino es el sitio web de Bekele.
+
+El primer relevo sabe solamente la siguiente ubicación en el circuito, que es el segundo relevo.
+
+El segundo relevo remueve otra capa de encriptación y reenvía la solicitud de la página web al tercer relevo.
+
+El tercer relevo remueve la última capa de encriptación y reenvía la solicitud de la página web a su destino, el sitio web de Bekele, pero no sabe que la solicitud vino de Amal.
+
+Bekele no sabe que la solicitud del sitio web vino de Amal, a menos que ella se lo diga.
+
+## 7. ¿Quién usa Tor?
+
+Personas alrededor de todo el mundo usan Tor para proteger su privacidad y acceder a la web libremente.
+
+Tor ayuda a proteger periodistas, defensores de los derechos humanos, víctimas de violencia doméstica, investigadores académicos, y cualquiera que esté experimentando rastreo, censura o vigilancia.
+
+## 6. ¿Por qué confiar en Tor?
+
+Tor está diseñado para privacidad. No sabemos quiénes son nuestros usuarios, y no mantenemos registros de sus actividades.
+
+Los operadores de relevos Tor no pueden revelar la verdadera identidad de los usuarios de Tor.
+
+La continua revisión por pares del código fuente de Tor, tanto de comunidades de fuente abierta como académicas, asegura que no hay puertas traseras, y nuestro contrato social promete que nunca crearemos una.
+
+## 7. Unite a la comunidad Tor
+
+Tor está hecho posible por un diverso conjunto de usuarios, desarrolladores, operadores de relevos y portavoces alrededor del mundo.
+
+Necesitamos tu ayuda para hacer Tor más utilizable y seguro para personas en todos lados.
+
+Podés hacerte voluntario para Tor escribiendo código, ejecutando un relevo, creando documentación, ofreciendo soporte de usuario, o contándole a las personas en tu comunidad acerca de Tor.
+
+La comunidad de Tor está gobernada por un código de conducta, y delineamos nuestro conjunto de promesas a la comunidad en nuestro contrato social.
+
+Aprendé más acerca de Tor visitando nuestro sitio web, nuestra wiki, encontrándonos en IRC, uniéndote a una de nuestras listas de correo, o suscribiéndote a Noticias de Tor en newsletter.torproject.org.
+
+
+## 8. Descargá Tor
+
+Tor para PC de escritorio
+torproject.org/download
+
+TOR EN MÃ?VILES
+### Android 
+El Tor Browser para Android está disponible en GooglePlay.
+
+### iOS
+Onion Browser, desarrollado por M. Tigas, es el único navegador que recomendamos para iOS.
+
diff --git a/es_CL.po b/es_CL.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/es_CL.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/es_CO.po b/es_CO.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/es_CO.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/es_ES.po b/es_ES.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/es_ES.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/es_MX.po b/es_MX.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/es_MX.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/et.po b/et.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/et.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/eu.po b/eu.po
new file mode 100644
index 000000000..b8d703a56
--- /dev/null
+++ b/eu.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Zer da Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/fa.po b/fa.po
new file mode 100644
index 000000000..d83eef99e
--- /dev/null
+++ b/fa.po
@@ -0,0 +1,162 @@
+# تÙ?ر تÙ?سعÙ? Û?اÙ?تÙ? Ù?ترÛ?اÙ? 1397 - 1398
+
+# 1. تÙ?ر براÛ? Ù?حرÙ?اÙ?Ú¯Û?
+
+### حرÛ?Ù? خصÙ?صÛ? Û?Ú© Ø­Ù? اÙ?ساÙ?Û? است
+
+Ù?اÙ?Ù?د بسÛ?ارÛ? از Ù?اØ? Aleisha بÛ?شتر Ù?Ù?ت Ø®Ù?د را بÙ? صÙ?رت Ø¢Ù?Ù?اÛ?Ù? سپرÛ? Ù?Û?â??Ú©Ù?د - - برÙ?رارÛ? ارتباط با دÙ?ستاÙ?Ø? ارساÙ? Ù?ب ساÛ?تâ??Ù?اÛ? ارتباط جÙ?عÛ?Ø? Ù? Ù?رÙ?ر Ù?ب.
+
+اÙ?ا اخÛ?را Ù?تÙ?جÙ? شدÙ?â??است Ú©Ù? تبÙ?Û?غات Ù?ربÙ?Ø· بÙ? جستجÙ?Ù?اÛ? گذشتÙ? اÙ?Ø? اÙ? را بÙ? صÙ?رت Ø¢Ù?Ù?اÛ?Ù? دÙ?باÙ? Ù?Û?â??Ú©Ù?Ù?د.
+
+اÛ?Ù? بÙ? Ù?درÛ? تÙ?اجÙ?Û? است Ú©Ù? برخÛ? از تحÙ?Û?Ù?ات را بر رÙ?Û? تبÙ?Û?غات Ø¢Ù?Ù?اÛ?Ù? اÙ?جاÙ? Ù?Û?â??دÙ?د Ù? Û?اد Ù?Û?â??Ú¯Û?رد Ú©Ù? Ù?Ù? تÙ?Ù?ا تبÙ?Û?غ Ú©Ù?Ù?دگاÙ? اÙ? بÙ?Ú©Ù? ISPØ? شرکتâ??Ù?اÛ? تجزÛ?Ù? Ù? تحÙ?Û?Ù?Ø? سکÙ?Ù?اÛ? رساÙ?Ù? اجتÙ?اعÛ? Ù? Ú?Û?زÙ?اÛ? دÛ?گر را Ù¾Û?â??Ú¯Û?رÛ? Ù?Û?â??Ú©Ù?Ù?د.
+
+Aleisha تصÙ?Û?Ù? Ù?Û?â??Ú¯Û?رد Ú©Ù? بÙ? دÙ?باÙ? Ù¾Û?دا کردÙ? Ù? استÙ?ادÙ? از Ù?رÙ?â??اÙ?زارÛ? است Ú©Ù? دادÙ?â??Ù?اÛ? اÙ? را جÙ?عâ??Ø¢Ù?رÛ? Ù?Ù?Û?â??Ú©Ù?دØ? اÙ? را ردÛ?ابÛ? Ù?Ù?Û?â??Ú©Ù?دØ? Ù? Ù?Û?Ú? Ú?Û?ز خصÙ?صÛ? در Ù?Ù?رد اÙ? بÙ? دÛ?گراÙ? Ù?Ù?Û?â??Ú¯Ù?Û?د.
+
+اÙ? بÙ? Û?Ú© تÙ?رÛ?Ù? خصÙ?صÛ? در Û?Ú© Ù?کر Ù?Ø­Ù?Û? Ù?Û?â??رÙ?د Ù? در Ù?Ù?رد Ù?رÙ?رگر Ù?ب Ú?Û?زÛ? Û?اد Ù?Û?â??Ú¯Û?ردØ? تÙ?Ù?ا Ù?رÙ?رگر Ù?ب Ú©Ù? بÙ? اÙ? اجازÙ? Ù?Û?â??دÙ?د بدÙ?Ù? Ù?اÙ? Ù?ستعار Ù?رÙ?ر Ú©Ù?د.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Ù?رÙ?اÙ?دا Û?Ú© گرÙ?Ù? از زÙ?اÙ? را بر رÙ?Û? Ø­Ù?Ù?Ù? بارÙ?رÛ? در برزÛ?Ù? ادارÙ? Ù?Û?â??Ú©Ù?د Ú©Ù? در Ø¢Ù? سÙ?Ø·â??جÙ?Û?Ù? غÛ?ر Ù?اÙ?Ù?Ù?Û? است.
+
+Ù?رÙ?اÙ?دا Ù? Ù?Ù?کاراÙ?Ø´ Û?Ú© Ù?ب ساÛ?ت با اطÙ?اعاتÛ? دربارÙ? سÙ?Ø·â??جÙ?Û?Ù?Ø? Ú©Ù?ترÙ? تÙ?Ù?د Ù? ساÛ?ر Ù?Ù?ابع براÛ? اÙ?رادÛ? Ú©Ù? بÙ? دÙ?باÙ? اطÙ?اعات تÙ?Ù?Û?د Ù?Ø«Ù?Û? Ù?ستÙ?دØ? ساختÙ?د.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Ù?عاÙ?Û?Ù? Ø­Ù?Ù?Ù? بارÙ?رÛ? Ù?اÙ?Ù?د Ù?رÙ?اÙ?داØ? براÛ? آزادÛ?â??Ù?اÛ? اساسÛ? Ù?بارزÙ? Ù?Û?â??Ú©Ù?Ù?د Ù? تÙ?ر بÙ? Ù?درت Ù?Ù?اÙ?Ù?ت Ø¢Ù?â??Ù?ا Ú©Ù?Ú© Ù?Û?â??Ú©Ù?د.
+
+---
+
+# 3. تÙ?ر براÛ? Ø­Ù?Ù?Ù? بشر
+
+### Water is life 
+
+Jelani در رÙ?ستاÛ?Û? Ú©Ù?Ú?Ú©Û? زÙ?دگÛ? Ù?Û?â??Ú©Ù?د Ú©Ù? رÙ?دخاÙ?Ù? Ù?سÛ?عÛ? از Ø¢Ù? عبÙ?ر Ù?Û?â??Ú©Ù?د.
+
+اÛ?Ù? رÙ?دخاÙ?Ù? از زÙ?اÙ? اجدادش بÙ? جاÙ?عÙ? Ø®Ù?د آب دادÙ?â??است.
+
+اÙ?ا اÙ?رÙ?زØ? رÙ?دخاÙ?Ù? Jelani تÙ?سط شرکتâ??Ù?اÛ? Ú?Ù?د Ù?Ù?Û?تÛ? Ù?درتÙ?Ù?د در حاÙ? Ø­Ù?ارÛ? Ù?Ù?ت در Ù?Ù?Ø·Ù?Ù? Ù?Ù?رد تÙ?دÛ?د Ù?رار گرÙ?تÙ?â??است.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## تÙ?ر Ú?Û?ستØ?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/fa_AF.po b/fa_AF.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/fa_AF.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/fi.po b/fi.po
new file mode 100644
index 000000000..ca4142d26
--- /dev/null
+++ b/fi.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Mikä Tor on?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/fil.po b/fil.po
new file mode 100644
index 000000000..cbe6cfbf8
--- /dev/null
+++ b/fil.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Ano ang Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/fo.po b/fo.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/fo.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/fr.po b/fr.po
new file mode 100644
index 000000000..030efa012
--- /dev/null
+++ b/fr.po
@@ -0,0 +1,162 @@
+# Documents de sensibilisation à Tor 2019-2020
+
+# 1. TOR POUR LE RESPECT DE LA VIE PRIVÃ?E
+
+### La vie privée est un droit de la personne
+
+Comme beaucoup dâ??entre nous, Aleisha passe la plupart de son temps en ligne, à communiquer avec des amis, à publier sur les médias sociaux et à parcourir le Web.
+
+Mais dernièrement, elle a remarqué que des publicités liées à ses recherches précédentes la suivent partout en ligne.
+
+Elle trouve cela si envahissant quâ??elle fait des recherches sur les publicités en ligne et apprend que ce nâ??est pas seulement les annonceurs qui la suivent à la trace, mais aussi son FAI, les entreprises dâ??analyse, les plateformes de médias sociaux et dâ??autres.
+
+Aleisha décide quâ??elle veut trouver et utiliser des logiciels qui ne recueillent pas ses données, ne la suivent pas à la trace et ne révèlent rien de confidentiel à son sujet à dâ??autres services.
+
+Elle suit dans un laboratoire numérique ouvert local une formation sur la protection de la vie privée et découvre le **navigateur Tor Browser**, le seul navigateur Web qui lui permet de naviguer de façon anonyme.
+
+---
+
+# 2. TOR POUR LES FÃ?MINISTES
+
+### Lâ??avenir est cyberféministe
+
+Fernanda dirige un collectif de femmes axé sur les droits liés à la procréation au Brésil, où lâ??avortement est illégal.
+
+Fernanda et ses collègues ont créé un site Web qui offre des renseignements sur lâ??accès à lâ??avortement, la régulation des naissances et dâ??autres ressources pour les personnes à la recherche de renseignements sur la procréation.
+
+Si lâ??on pouvait remonter la trace de ce site Web jusquâ??à elles, elles pourraient être arrêtées ou pire encore.
+
+Pour se protéger, Fernanda et ses collègues ont créé le site Web en utilisant les **services onion** de Tor. Non seulement les services onion empêchent quâ??elles soient découvertes comme opératrices du serveur, mais ils aident également à protéger les visiteurs de leur site Web en exigeant quâ??ils utilisent le navigateur Tor Browser.
+
+En fait, Fernanda utilise le **navigateur Tor Browser** pour toute sa navigation sur le Web, simplement par mesure de sécurité.
+
+Elle utilise également une application propulsée par Tor appelée **OnionShare** pour envoyer des fichiers à dâ??autres activistes en toute sécurité et en toute confidentialité.
+
+### Les défenseures des droits liés à la procréation, comme Fernanda, luttent pour les libertés fondamentales et Tor aide à propulser leur résistance.
+
+---
+
+# 3. TOR POUR LES DROITS DE LA PERSONNE
+
+### Lâ??eau, câ??est la vie
+
+Jelani vit dans un petit village traversé par une large rivière.
+
+Cette rivière fournit de lâ??eau à sa communauté depuis lâ??époque de ses ancêtres.
+
+Mais aujourdâ??hui, la rivière de Jelani est menacée par de puissantes multinationales qui forent des puits de pétrole dans la région.
+
+Les entreprises de sécurité privées, financées par ces entreprises, utilisent de puissants mécanismes pour surveiller les activités en ligne de Jelani et de ses voisins dans le village qui sâ??organisent pour protéger leur rivière sacrée.
+
+Jelani utilise le **navigateur Tor Browser** pour empêcher ces entreprises de le surveiller alors quâ??il visite des sites Web sur la protection internationale des droits de la personne et sur lâ??aide juridique, et rédige des articles de blogue sur le mouvement de résistance dans son village.
+
+Il utilise également **OnionShare** et **SecureDrop** pour envoyer en toute sécurité des documents aux journalistes qui contribuent à exposer ces violations des droits de la personne.
+
+Tous ces logiciels utilisent Tor pour protéger la vie privée et les renseignements personnels de Jelani.
+
+### Des défenseurs des droits de la personne comme Jelani luttent pour la justice dans leurs communautés et Tor aide à propulser leur résistance.
+
+---
+
+# 4. TOR POUR Lâ??ANTICENSURE
+
+### Bâtir des ponts plutôt que de dresser des murs
+
+Jean voyageait pour la première fois dans un pays loin de sa famille.
+
+Une fois arrivé à lâ??hôtel, il a ouvert son ordinateur portable.
+
+Il était tellement épuisé que lorsque le message « La connexion est expirée » est apparu pour la première fois sur son navigateur Web, il a pensé quâ??il avait fait une erreur.
+
+Mais après avoir essayé encore et encore, il sâ??est rendu compte quâ??il ne pouvait plus accéder à son fournisseur de services de courriel ni à un site Web de nouvelles ni à beaucoup dâ??applis.
+
+Il avait entendu dire que ce pays censure Internet et se demanda si câ??était le cas.
+Comment pouvait-il contacter sa famille derrière ce mur impénétrableâ???
+Après avoir fait quelques recherches sur le Web, il a trouvé un forum et a découvert les RPV, des services privés et confidentiels qui vous permettent de vous connecter à un autre réseau non censuré.
+
+Jean passa une demi-heure à essayer de déterminer quel RPV bon marché était le meilleur.
+
+Il en choisit un et pendant un moment il sembla fonctionner, mais après cinq minutes, la connexion tomba hors ligne et le RPV ne se connectait plus.
+
+Jean continua à lire pour trouver dâ??autres options et découvrit le navigateur Tor Browser et la façon dont il contourne la censure.
+
+Il trouva un miroir officiel du site Web pour télécharger le programme.
+
+Quand il ouvrit le **navigateur Tor Browser**, il suivit les indications pour les utilisateurs censurés et se connecta à un pont qui lui permit à nouveau dâ??accéder à Internet.
+
+Avec le navigateur Tor Browser, Jean peut naviguer librement, en toute confidentialité, et contacter sa famille.
+
+### Dans le monde entier, des utilisateurs censurés comptent sur le navigateur Tor Browser pour une façon gratuite, stable et non censurée dâ??accéder à Internet.
+
+---
+
+# 5. Sections partagées
+
+## Quâ??est-ce que Torâ???
+
+Tor est un logiciel gratuit et un réseau ouvert qui aident à vous protéger contre le suivi à trace, la surveillance et la censure en ligne.
+Tor est créé gratuitement par un organisme à but non lucratif 501(c)3 situé aux �tats-Unis appelée Le Projet Tor.
+
+La façon la plus simple dâ??utiliser Tor est avec le navigateur Tor Browser.
+Quand vous utilisez le navigateur Tor Browser, personne ne peut savoir quels sites Web vous visitez ni dâ??où, dans le monde, vous venez. 
+
+Dâ??autres applications telles que SecureDrop et OnionShare utilisent Tor pour protéger leurs utilisateurs contre la surveillance et la censure.
+
+
+## 6. Comment Tor fonctionne-t-ilâ???
+
+Amal veut visiter le site Web de Bekele en toute confidentialité, alors elle ouvre le navigateur Tor Browser.
+
+Le navigateur Tor Browser sélectionne un circuit aléatoire de trois relais, qui sont des ordinateurs partout dans le monde configurés pour acheminer le trafic sur le réseau Tor.
+
+Le navigateur Tor Browser chiffre alors la requête de son site Web trois fois et lâ??envoie au premier relais Tor dans son circuit.
+
+Le premier relais supprime la première couche de chiffrement, mais nâ??apprend pas que la destination est le site Web de Bekele.
+
+Le premier relais nâ??apprend que le prochain emplacement du circuit, qui est le deuxième relais.
+
+Le deuxième relais supprime une autre couche de chiffrement et achemine la requête de page Web au troisième relais.
+
+Le troisième relais supprime la dernière couche de chiffrement et achemine la demande de page Web à sa destination, le site Web de Bekele, mais il ne sait pas que la demande provient dâ??Amal.
+
+Bekele ne sait pas que la requête de site Web provenait dâ??Amal, sauf si elle le lui dit.
+
+## 7. Qui utilise Torâ???
+
+Dans le monde entier, des personnes utilisent Tor pour protéger leur vie privée et leurs renseignements personnels, mais aussi accéder librement au Web.
+
+Tor aide à protéger les journalistes, les défenseurs des droits de la personne, les victimes de violence familiale, les chercheurs universitaires et toute personne confrontée au pistage, à la censure ou à la surveillance.
+
+## 6. Pourquoi faire confiance à Torâ???
+
+Tor est conçu pour la confidentialité. Nous ne savons pas qui nos utilisateurs sont ni ne gardons de journaux de lâ??activité des utilisateurs.
+
+Les opérateurs de relais Tor ne peuvent pas divulguer la véritable identité des utilisateurs de Tor.
+
+Lâ??examen collégial continu du code source de Tor par les communautés universitaires et par celles des logiciels à code source ouvert garantit quâ??il nâ??y a pas de portes dérobées dans Tor. De plus, notre contrat social implique que nous nâ??introduiront jamais de portes dérobées dans Tor.
+
+## 7. Se joindre à la communauté de Tor
+
+Tor est rendu possible grâce à un ensemble varié dâ??utilisateurs, de développeurs, dâ??opérateurs de relais et de défenseurs du droit à la vie privée partout dans le monde.
+
+Nous avons besoin de votre aide pour rendre Tor plus facile à utiliser et plus sûr, pour tous, partout.
+
+Vous pouvez faire du bénévolat auprès de Tor en écrivant du code, en exploitant un relais, en rédigeant de la documentation, en offrant de lâ??assistance aux utilisateurs ou encore en parlant de Tor aux gens de votre communauté.
+
+La communauté de Tor est régie par un code de conduite et nous énonçons lâ??ensemble de nos promesses à la communauté dans notre contrat social.
+
+Apprenez-en davantage au sujet de Tor en visitant notre site Web, notre wiki, en nous trouvant sur IRC, en vous joignant à lâ??une de nos listes de diffusion, ou encore en vous inscrivant aux nouvelles de Tor sur newsletter.torproject.org.
+
+
+## 8. Télécharger Tor
+
+Tor pour ordinateur
+torproject.org/download
+
+TOR SUR APPAREIL MOBILE
+### Android
+Le navigateur Tor Browser pour Android est proposée sur Google Play.
+
+### iOS
+Le Navigateur Onion, développé par M. Tigas, est le seul navigateur que nous recommandons pour iOS.
+
diff --git a/fy.po b/fy.po
new file mode 100644
index 000000000..b0d86b14f
--- /dev/null
+++ b/fy.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Wat is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ga.po b/ga.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ga.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/gd.po b/gd.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/gd.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/gl.po b/gl.po
new file mode 100644
index 000000000..acd850a8c
--- /dev/null
+++ b/gl.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Que é Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/gu.po b/gu.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/gu.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/he.po b/he.po
new file mode 100644
index 000000000..82c41b344
--- /dev/null
+++ b/he.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR ×?×?×¢×? פר×?×?×?ת 
+
+### פר×?×?×?ת ×?×?×? ×?×?×?ת ×?×?×?
+
+×?×?×? ר×?×?×? ×?×?×?תנ×?, ×?×?×?ש×?×? ×?×?×?×? ×?ת ×?ר×?×?ת ×?×?× ×? ×?רשת--×?ת×?×?רת ×¢×? ×?×?ר×?×?, ×?×?צרת רש×?×?×?ת ×?×?×?×?×? ×?×?רת×?ת ×?×?×?×?שת ×?רשת.
+
+×?×?×? ×?×?×?ר×?× ×? ×?×?×? ש×?×? ×?×? שפרס×?×?×?ת ×?קש×?ר×?ת ×?×?×?פ×?ש×?×? ×?×?×?ר×?× ×?×? ש×?×? ×¢×?ק×?×?ת ×?×?ר×?×? ×?ר×?×?×? ×?רשת.
+
+×?×? ×?×? ×?×? פ×?×?שנ×? ×?×? ש×?×?×? ×¢×?ש×? קצת ×?×?קר ×?×?×?× ×?רנ×? ×¢×? פרס×?×?×?ת ×?ק×?×?× ×?ת ×?×?×?×?×? ש×?×?×? ×?×? רק ×?פרס×?×?×? ×¢×?ק×?×?×? ×?×?ר×?×?, ×?×?×? ×?×? ספק ×?×?×?× ×?רנ×? ש×?×?, ×?×?ר×?ת × ×?ת×?×?, ×?ס×?×?ת רשת ×?×?רת×?ת, ×?×¢×?×?.
+
+×?×?×?ש×?×? ×?×?×?×?×?×? ש×?×?×? ר×?צ×? ×?×?צ×?×? ×?×?×?שת×?ש ×?ת×?×?× ×? ש×?×?× ×? ×?×?ספת ×?ת ×?נת×?× ×?×? ש×?×?, ×?×?× ×? ×¢×?ק×?ת ×?×?ר×?×?, ×?×?×?× ×? ×?ספרת ×?ש×?ר×?ת×?×? ×?×?ר×?×? ש×?×? ×?×?ר פר×?×? ×¢×?×?×?.
+
+×?×?×? ×?×?×?×?ת ×?×? ×?×?×?×?×? פר×?×?×?ת ×?×?ר×?×? פצ×?× ×?×? ×?ק×?×?×? ×?×?×?×?×?ת ×¢×? **×?פ×?פ×? Tor**, ×?פ×?פ×? ×?רשת ×?×?×?×?×? ×?שר ×?ת×?ר ×?×? ×?×?×?×?ש ×?×?×?פ×? ×?×?×?×?× ×?.
+
+---
+
+# 2.TOR ×?×?×¢×? פ×?×?× ×?ס×?×?×? 
+
+### ×?עת×?×? ×?×?×? ס×?×?×?ר־פ×?×?× ×?ס×?
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR ×?×?×¢×? ×?×?×?×?×?ת ×?×?×?
+
+### ×?×?×? ×?×? ×?×?×?×?
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR ×?×?×¢×? × ×?×?־צנ×?×?ר×?
+
+### ×?× ×? ×?שר×?×? ×?×? ×?×?×?×?ת
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. ק×?×¢×?×? ×?ש×?תפ×?×?
+
+## ×?×?×? Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. ×?×?×? Tor ×¢×?×?×??
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. ×?×? ×?שת×?ש ×?-Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. ×?×?×? ×?×?×?×?×? ×?-Tor?
+
+Tor ת×?×?× ×? ×?×?×¢×? פר×?×?×?ת. ×?× ×?× ×? ×?×? ×?×?×?×¢×?×? ×?×? ×?×?שת×?ש×?×? ש×?× ×?, ×?×?× ×?× ×? ×?×? ש×?×?ר×?×? ×?×?×?× ×?×? ש×? פע×?×?×?ת ×?שת×?ש×?×?.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. ×?צ×?רף ×?×? ק×?×?×?ת Tor
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. ×?×?ר×? ×?ת Tor
+
+Tor ×¢×?×?ר ש×?×?×?×? ×¢×?×?×?×?
+torproject.org/download
+
+TOR ×?× ×?×?×?
+### Android 
+×?פ×?פ×? Tor ×¢×?×?ר Android ×?×?×?×? ×?×? Google Play.
+
+### iOS
+×?פ×?פ×? ×?צ×?, ×?×?פ×?ת×? ×¢"×? M. Tigas, ×?×?×? ×?×?פ×?פ×? ×?×?×?×?×? ש×?× ×?× ×? ×?×?×?×?צ×?×? ×¢×?×?ר iOS.
+
diff --git a/hi.po b/hi.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/hi.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/hr.po b/hr.po
new file mode 100644
index 000000000..e211de7b8
--- /dev/null
+++ b/hr.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Å to je Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/hu.po b/hu.po
new file mode 100644
index 000000000..99bbf8ad0
--- /dev/null
+++ b/hu.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Mi a Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/hy.po b/hy.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/hy.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/id.po b/id.po
new file mode 100644
index 000000000..1d0b72e30
--- /dev/null
+++ b/id.po
@@ -0,0 +1,162 @@
+# Materi Penjangkauan Tor 2019-2020
+
+# 1. TOR UNTUK PRiVASI
+
+### Privasi adalah hak asasi manusia
+
+Seperti kebanyakan kita, Aleisha menghabiskan sebagian besar waktunya berhubungan secara daring dengan teman-teman, berbagi di media sosial, dan menjelajahi web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Apa itu Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/is.po b/is.po
new file mode 100644
index 000000000..25fdb4718
--- /dev/null
+++ b/is.po
@@ -0,0 +1,161 @@
+# Tor kynningarefni 2019-2020
+
+# 1. TOR FYRIR GAGNALEYND 
+
+### Friðhelgi persónuupplýsinga er mannréttindi
+
+Líkt og mörg okkar, eyðir Aleisha miklu af tímanum sínum á netinu -að hafa samband við vini, pósta á samfélagsmiðla og við vafur á vefnum.
+
+En upp á síðkastið hefur hún tekið eftir að auglýsingar sem tengjast málum sem hún hefur áður leitað að á netinu eru farnar að fylgja henni út um allt á netinu.
+
+�etta finnst henni vægast sagt uppáþrengjandi, þannig að hún leggst í dálitla rannsóknarvinnu á netinu og kemst fljótt að því að það eru ekki bara auglýsendur sem eru að fylgjast með henni, heldur einnig netþjónustufyrirtækið hennar, ýmis greiningafyrirtæki, samfélagsmiðlafyritæki og fleiri.
+
+Aleisha ákveður að hún vilji reyna að finna og nota hugbúnað sem ekki safnar gögnum um hana, fylgist ekki með henni, og sem gefi ekki öðrum þjónustum upp neinar persónulegar upplýsingar um hana.
+
+Hún fer á námskeið um gagnaleynd í hakkaravinnustofu (hackerspace) í hverfinu sínu og lærir þar um **Tor-vafrann** - eina vefvafrann sem gerir henni hleift að vafra nafnlaust um netið.
+
+---
+
+# 2. TOR FYRIR FEMÃ?NISTA 
+
+### Framtíðin er fyrir netvædda femínista
+
+Fernanda rekur kvennasamtök sem vinna að réttindum til frjósemisheilbrigði í Brasilíu, þar sem fóstureyðingar eru ólöglegar.
+
+Fernanda og samstarfskonur hennar útbjuggu vefsvæði með upplýsingum um aðgang að fóstureyðingum, getnaðarvörnum og öðrum upplýsingum varðandi barneignir.
+
+Ef þetta vefsvæði væri rakið til þeirra gætu þær átt á hættu að vera handteknar - eða þaðan af verra.
+
+Til að verja sig, útbjuggu Fernanda og samstarfskonur hennar vefsvæðið með Tor **onion-þjónustum**. Onion-þjónustur koma ekki aðeins í veg fyrir að upp komist að þær séu rekstraraðilar vefsvæðisins, heldur hjálpar einnig til við að vernda þá sem heimsækja vefinn, því hann er einungis hægt að skoða með Tor-vafranum. 
+
+Reyndar notar Fernanda **Tor-vafrann** í allt sitt vafur á veraldarvefnum, bara til að hafa öryggið sín megin.
+
+Hún notar einnig Tor-virkjað forrit sem kallast **OnionShare** til að senda skrár til annarra aðgerðasinna, á öruggan hátt og í friði fyrir hnýsni. 
+
+### Aðgerðasinnar eins og Fernanda sem vinna að réttindum til frjósemisheilbrigði eru að berjast fyrir grunn-mannréttindum og frelsi, og Tor styður því við baráttu þeirra.
+
+---
+
+# 3. TOR FYRIR MANNRÃ?TTINDI
+
+### Vatn er lífið 
+
+Jelani býr í litlu þorpi á bakka stórs fljóts.
+
+�etta fljót hefur séð samfélaginu fyrir vatni svo lengi sem elstu menn muna.
+
+En núna er fljótinu hans Jelani ógnað af valdamiklum fjölþjóðafyrirtækjum sem eru byrjuð að bora eftir olíu í nágrenninu.
+
+Einkarekin öryggisfyrirtæki, starfandi á vegum þessara fyrirtækja, nota öfluga eftirlitstækni til að fylgjast með netumferð Jelani og nágranna hans í þorpinu, sem eru smátt og smátt að skipuleggja sig til að reyna að verja mikilvæga fljótið þeirra.
+
+Jelani nýtir sér **Tor-vafrann** til að komast hjá því að þessi fyrirtæki fylgist með því þegar hann heimsækir vefsvæði mannréttindasamtaka og lögfræðiaðstoðar eða skrifar bloggfærslur um andófshreyfinguna í þorpinu hans.
+
+Hann notfærir sér líka **OnionShare** og **SecureDrop** til að geta sent skjöl á öruggan hátt til blaðamanna sem eru að hjálpa við að fletta ofan af þeim brotum á mannréttingum sem í gangi eru.
+
+Allur þessi hugbúnaður notar Tor til að vernda friðhelgi Jelanis. 
+
+### Aðgerðasinnar í mannréttindamálum eins og Jelani eru að berjast fyrir réttlátu samfélagi, og Tor styður því við baráttu þeirra.
+
+---
+
+# 4. TOR GEGN RITSKOÃ?UN
+
+### Byggjum brýr - ekki veggi
+
+Jean var að ferðast í fyrsta skipti til lands langt frá heimahögunum.
+
+�egar hann kom á hótelið var eitt af því fyrsta sem hann gerði að opna fartölvuna sína.
+
+Hann var það þreyttur að fyrst þegar hann fékk skilaboðin "Tengingin rann út á tíma", þá datt honum í hug að villan stafaði af einhverri vitleysu sem hann hefði sjálfur gert.
+
+En eftir að hafa reynt aftur nokkrum sinnum, þá rann upp fyrir honum að tölvupóstþjónustan hans, fréttavefurinn sem hann var vanur að skoða, ásamt mörgum forritum, virkuðu ekki og voru ekki aðgengileg.
+
+Hann hafði heyrt að internetið væri ritskoðað í þessu landi og velti fyrir sér hvort það væri ástæðan. Hvernig ætti hann að fara að því að hafa samband við fjölskyldu og vini í gegnum þennan ókleifa múr?
+Honum tókst samt að framkvæma nokkrar vefleitir of fann spjallsvæði þar sem hann gat fræðst um VPN; einkaþjónustur sem gera kleift að tengjast beint við netkerfi, án ritskoðunar eða annarra hafta.
+
+Jean eyddi hálftíma í að finna út hvaða ódýra VPN-þjónusta væri best.
+
+Han valdi sér eina og í smástund virtist allt vera í lagi, en eftir fimm mínútur rofnaði tengingin og VPN-þjónustan hætti að virka.
+
+Jean hélt áfram að kanna málið og datt loks niður á Tor-vafrann of sá hvernig hann gæti komist í kringum ritskoðun.
+
+Hann fann opinberan vefspegil þar sem hann gat sótt upprunalega útgáfu forritsins.
+
+�egar hann opnaði **Tor-vafrann**, gat hann fylgt leiðbeiningum fyrir ritskoðaða notendur og tengdist við svokallaða brú sem gerði honum kleift að fá aftur ótakmarkaðan aðgang að intenetinu.
+
+Með Tor-vafranum getur Jean vafrað frjálst og í friði fyrir hnýsni og komist í samband við fjölskylduna sína. 
+
+### Notendur út um víða veröld sem búa við ritskoðun reiða sig á Tor-vafrann sem ókeypis, stöðuga og óritskoðaða leið inn á internetið.
+
+---
+
+# 5. Sameiginlegir hlutar
+
+## Hvað er Tor?
+
+Tor er frjáls hugbúnaður og opið netkerfi sem hjálpar þér að verjast eftirliti, skráningu og ritskoðun á netinu.
+Tor er í boði án kvaða frá Tor-verkefninu sem er bandarísk US 501(c)(3) sjálfboðaliðasamtök án gróðamarkmiða. 
+
+Einfaldasta leiðin til að nota Tor er með Tor-vafranum.
+�egar þú notar Tor-vafrann getur enginn séð hvaða vefsvæði þú ert að skoða eða hvar í heiminum þú ert. 
+
+�nnur forrit, eins og SecureDrop og OnionShare, nota Tor til að verja notendur sína gegn eftirliti og ritskoðun.
+
+
+## 6. Hvernig virkar Tor?
+
+Amal vill heimsækja vefsvæði Bekele án afskipta annarra, þannig að hún ræsir Tor-vafrann.
+
+Tor-vafrinn velur af handahófi rás með þremur endurvörpum, sem eru tölvur víðs vegar um heiminn sem settar eru upp til að beina umferð um Tor-netkerfið.
+
+Tor-vafrinn dulritar síðan í þrígang beiðnir hennar um vefsíður og sendir þær upplýsingar til fyrsta endurvarpans í rásinni hennar.
+
+Fyrsti endurvarpinn fjarlægir fyrsta dulritunarlagið en fær ekki að vita að áfangastaðurinn er vefþjónninn sem hýsir vefsvæði Bekele.
+
+Fyrsti endurvarpinn fær einungis að vita næstu staðsetningu í rásinni, sem er þá endurvarpi númer tvö.
+
+Annar endurvarpinn fjarlægir næsta dulritunarlag og áframsendir beiðnina á þriðja endurvarpann.
+
+�riðji endurvarpinn fjarlægir síðsta dulritunarlagið og áframsendir vefsíðubeiðnina á áfangastaðinn, en veit ekki að beiðnin kemur frá Amal.
+
+Bekele veit ekki að beiðnin um vefsíðuna kemur frá Amal nema ef hún segir honum frá því sjálf.
+
+## 7. Hverjir nota Tor?
+
+Fólk út um víða veröld notar Tor til að verja persónuupplýsingar sínar og til að geta skoðað vefinn án hafta.
+
+Tor aðstoðar við að vernda blaðamenn, verjendur mannréttinda, fórnarlömb heimilisofbeldis, akademíska vísindamenn og alla þá sem gætu orðið fyrir eftirliti, skráningu og ritskoðun. 
+
+## 6. Af hverju treysta Tor?
+
+Tor er hannað fyrir gagnaleynd. Við vitum ekki hverjir notendur okkar eru, og við höldum ekki neinar skrár yfir virkni notenda.
+
+�eir sem reka Tor-endurvarpa geta ekki séð raunveruleg auðkenni Tor-notenda.
+
+Sífelld yfirferð jafningja á grunnkóða Tor, sem fram fer í akademískum og frjálsum samfélögum, tryggir að það séu engar bakdyr í Tor, auk þess sem samfélagssáttmálinn okkar lofar að aldrei muni verða neinar bakdyr í Tor. 
+
+## 7. Taktu þátt í Tor-samfélaginu
+
+Tor er gert mögulegt með fjölbreyttri blöndu af notendum, forriturum, endurvörpurum og ráðgjöfum úr hinum ýmsu heimshornum.
+
+Við þörfnumst hjálpar þinnar við að gera Tor ennþá notendavænni og öruggari fyrir fólk allsstaðar í heiminum.
+
+�ú getur boðið fram krafta þína hjá Tor með því að skrifa kóða, reka endurvarpa, útbúa leiðbeiningar, bjóða stuðning við notendur, eða með því að segja fólki sem þú hittir frá Tor.
+
+Samfélaginu sem stendur að Tor er stýrt með siðareglum, og í samfélagssáttmálanum okkar útlistum við þau loforð sem við ætlum aðö standa við gagnvart samfélaginu. 
+
+Lærðu meira um Tor með því að skoða vefsvæðið okkar, wiki-upplýsingasíðurnar, með því að finna okkur á IRC, gerast áskrifandi að einhverjum póstlistanum okkar, eða með því að skrá þig fyrir Tor-fréttabréfinu á at newsletter.torproject.org.
+
+
+## 8. Sæktu Tor-vafrann
+
+Tor fyrir tölvur
+torproject.org/download
+
+TOR Ã? SNJALLTÃ?KJUM
+### Android 
+Tor-vafri fyrir Android er tiltækur á GooglePlay.
+
+### iOS
+Onion-vafrinn, þróaður af M. Tigas, er eini vafrinn sem við getum mælt með fyrir iOS.
+
diff --git a/it.po b/it.po
new file mode 100644
index 000000000..216d722a9
--- /dev/null
+++ b/it.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Cos'è Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ja.po b/ja.po
new file mode 100644
index 000000000..0cb403965
--- /dev/null
+++ b/ja.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Torã?£ã?¦ä½?ã?§ã??ã???
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/jv.po b/jv.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/jv.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ka.po b/ka.po
new file mode 100644
index 000000000..38e4bcc21
--- /dev/null
+++ b/ka.po
@@ -0,0 +1,162 @@
+# Tor-á??á?¡ á??á??á?¡á??á??á??á??á?? á?ªá??á??á??á??á??á? á??á??á??á?¡ á??á?¡á??á??á??á?¦á??á??á??á??á?? 2019-2020
+
+# 1. TOR á??á??á? á??á??á?£á??á??á??á??á?¡á??á??á??á?¡
+
+### á??á??á? á??á??á?£á??á??á??á?? á??á??á??á??á??á??á??á??á?¡ á?«á??á? á??á??á??á??á?? á?£á?¤á??á??á??á??á??
+
+á?§á??á??á??á?? á?©á??á??á??á??á??á??á??á?¡ á??á?¡á??á??á??á?¡á??á??, á??á??á??á?¨á??á?ª á??á??á?? á??á? á??á?¡ á??á?¢á??á? á??á??á?¡ á??á??á?¢á??á? á??á??á?¢á?¨á?? â?? á??á??á??á??á??á? á??á??á??á??á?? á?£á? á??á??á??á? á??á??á??á??á?¡á??á??á??á?¡, á?¡á??á?ªá??á??á??á?£á?  á?¥á?¡á??á??á?¨á?? á?¬á??á? á??á?¡á??á??á??á?¡ á??á?? á??á??á??á? á??á??á??á??á?¡ á??á??á?¡á??á??á??á?®á?£á??á??á??á??á??á??.
+
+á??á?£á??á?ªá?? á??á??á??á?? á??á? á??á?¡ á?¨á??á??á??á?¨á??á??, á? á??á?? á? á??á??á??á??á??á??á??á??, á??á??á?¢á??á? á??á??á?¢á?¨á?? á??á??á?¡ á??á??á??á?  á??á??á?«á??á??á??á?£á?? á??á??á? á??á??á??á??á?? á??á??á??á??á?ªá??á??á??á??á?¡ á?£á??á??á??á?¨á??á? á??á??á??á??.
+
+á??á?¡ á?¨á??á??á? á?«á??á??á??á?? á??á??á??á??á??á??á?? á??á??á??á??á?¦á??á??á??á??á??á??á??á??á??á?? á??á?¦á??á??á?©á??á??á??, á? á??á?? á??á??á??á??á?¬á?§á??á??á?¢á?? á??á??á??á??á??á??á??á?? á??á??á?¢á??á? á??á??á?¢á?¨á?? á? á??á??á??á??á??á??á??á??á?¡ á?¨á??á?¡á??á?®á??á?? á??á??á?¤á??á? á??á??á?ªá??á?? á??á?? á??á?¦á??á??á??á?©á??á??á??, á? á??á?? á??á? á??á??á?®á??á??á??á?? á?¡á??á? á??á??á??á??á??á?? á??á??á??á??á??á??á??á??á??á?? á??á??á??á??á??á??á??á??á?? á??á??á??á??á?¡, á??á? á??á??á??á?? á??á??á?¢á??á? á??á??á?¢á??á?¡ á??á??á??á?¬á??á??á??á??á??á??á??á?ª, á??á??á??á??á??á??á??á? á?? á??á? á??á??á??á??á??á??á?ªá??á??á??á??, á?¡á??á?ªá??á??á??á?£á? á?? á?¥á?¡á??á??á??á??á?? á??á?? á?£á??á??á? á??á??á?? á?¡á?®á??á??.
+
+á??á??á??á?¨á??á?? á??á??á??á??á?¬á?§á??á??á?¢á?? á??á??á??á??á??á?®á?? á??á? á??á??á? á??á??á??, á? á??á??á??á??á??á?ª á??á?  á?¨á??á??á??á? á??á??á??á??á??á?? á??á??á?¡á??á?? á??á??á?¤á??á? á??á??á?ªá??á??á?¡, á??á?  á??á??á??á??á??á??á??á??á??á??á?? á??á??á??á??á?¡ á??á??á?¡ á??á??á?¥á??á??á??á??á??á??á??á?¡ á??á?? á??á??á? á??á?? á??á??á??á??á?ªá??á??á??á??á?¡ á??á??á?¡ á?¨á??á?¡á??á?®á??á??, á??á?  á??á??á?£á??á??á??á? á??á??á??á?? á?¡á?®á??á?? á??á??á??á?¡á??á?®á?£á? á??á??á??á??á?¡.
+
+á??á??á?? á?£á??á??á?? á?¨á??á??á?¡á?¬á??á??á??á?? á?¡á??á??á??á??á?®á?? á?£á?¡á??á?¤á? á??á?®á??á??á??á??á?¡ á??á??á??á??á??á??á??á? á??á??á?? á?¡á??á??á?ªá??á??á??á??á?¡á?¢á??á??á??á?¡á??á??á?? á??á?? á?¨á??á??á?¢á?§á?? **Tor-á??á? á??á?£á??á??á? á??á?¡** á?¨á??á?¡á??á?®á??á??, á??á? á??á??á??á??á? á??á?? á??á? á??á?£á??á??á? á??á?¡, á? á??á??á??á??á?¡ á??á??á?¨á??á??á??á??á??á??á??á?ª, á?¨á??á??á?«á??á??á??á?? á??á??á?¢á??á? á??á??á?¢á??á?¡ á??á??á??á??á?§á??á??á??á??á?? á??á??á??á??á??á??á??á?¡ á??á??á?£á??á?®á??á??á??á??.
+
+---
+
+# 2.TOR á?¥á??á??á??á?? á?£á?¤á??á??á??á??á??á??á?¡ á??á??á??á?ªá??á??á??á??á??á??á??á??á?¡
+
+### á??á??á??á??á??á??á??á?? á??á? á??á?¡ á?¥á??á??á??á?? á?£á?¤á??á??á??á??á??á??á?¡ á??á??á?ªá??á?? á??á??á?¢á??á? á??á??á?¢á??á??
+
+á?¤á??á? á??á??á??á??á?? á?©á??á? á??á?£á??á??á?? á?¥á??á??á??á?? á??á? á??á??á??á??á?¨á??, á? á??á??á??á??á??á??á?ª á??á??á? á?«á??á??á??á?? á? á??á??á? á??á??á?£á?¥á?ªá??á?£á??á?? á?£á?¤á??á??á??á??á??á??á?¡á??á??á??á?¡ á??á? á??á??á??á??á??á??á?¨á??, á?¡á??á??á??á?ª á??á??á??á? á?¢á?? á??á??á??á??á??á??á?? á??á??á? á?«á??á??á?£á??á??á??.
+
+á?¤á??á? á??á??á??á??á?? á??á?? á??á??á?¡á?? á??á??á??á??á??á??á??á? á?«á??á??á??á??á?? á?¥á??á??á??á??á?? á??á??á??á??á??á??á? á??á?¡, á?¡á??á??á??á?ª á??á?¥á??á??á??á?? á??á??á??á??á?ªá??á??á??á??á?? á??á??á??á? á?¢á??á?¡ á?®á??á??á??á??á?¡á??á?¬á??á??á??á??á??á??á??á?¡ á?¨á??á?¡á??á?®á??á??, á?¨á??á??á??á??á??á??á??á?¡ á??á??á??á?¢á? á??á??á??á?? á??á?? á?¡á?®á??á?? á?¡á??á?¡á??á? á??á??á??á??á?? á??á??á?¡á??á??á??á??á??, á? á??á??á??á??á??á??á?ª á??á??á??á??á??á??á??á??á??á??á?? á? á??á??á? á??á??á?£á?¥á?ªá??á??á??á?? á??á??á?¤á??á? á??á??á?ªá??á??á?¡ á??á??á?«á??á??á??á??á??á??á?¡.
+
+á??á??á??á? á??á??, á??á?£ á?¡á??á??á?¢á?? á??á??á??á??á??á?? á??á?¥á??á??á??á?? á??á??á??á??á??á?¨á??á? á??á??á?£á??á??á??, á?¨á??á??á?«á??á??á??á?? á??á??á??á??á??á?¢á??á??á? á??á?? â?? á??á?? á? á??á??á?? á?£á??á? á??á?¡á?? á??á??á??á??á? á??á??á??.
+
+á?£á?¡á??á?¤á? á??á?®á??á??á??á??á?¡ á??á??á??á??á??á??, á?¤á??á? á??á??á??á??á??á?? á??á?? á??á??á?¡á??á?? á??á??á??á??á??á??á??á? á?«á??á??á??á??á??á??, á?¡á??á??á?¢á?? á?¨á??á?¥á??á??á??á?¡ Tor-á??á?¡ **onion-á??á??á??á?¡á??á?®á?£á? á??á??á??á?¡** á?¡á??á?¨á?£á??á??á??á??á??á??. Onion-á??á??á??á?¡á??á?®á?£á? á??á??á??á??á??, á??á? á?? á??á?®á??á??á??á?? á??á?ªá??á??á?¡ á??á??á?? á??á?¦á??á??á?©á??á??á??á?¡á??á??á??, á??á? á??á??á??á?? á?£á??á? á?£á??á??á??á??á?§á??á?¤á?¡ á?¡á??á??á?¢á??á?¡ á??á??á??á?®á??á??á??á??á??á??á?¡ á?£á?¡á??á?¤á? á??á?®á??á??á??á??á?¡á??á?ª, Tor-á??á? á??á?£á??á??á? á??á?¡ á??á??á??á??á?§á??á??á??á??á??á?¡ á??á??á??á?®á??á??á??á??á??. 
+
+á?¡á??á??á? á??á?? á?¯á??á??á?¨á??, á?¤á??á? á??á??á??á??á?? á??á?§á??á??á??á??á?¡ **Tor-á??á? á??á?£á??á??á? á?¡** á?§á??á??á??á?? á??á??á?¡á?? á??á??á?¥á??á??á??á??á??á??á?¡á??á??á??á?¡ á??á??á?¢á??á? á??á??á?¢á?¨á??, á?£á?¡á??á?¤á? á??á?®á??á??á??á??á?¡ á?£á??á? á?£á??á??á??á??á?¡á??á?§á??á?¤á??á??.
+
+á??á??á??, á??á?¡á??á??á?? á??á?§á??á??á??á??á?¡ Tor-á??á?? á??á??á??á?£á?¨á??á??á?? á??á? á??á??á? á??á??á??á?¡á??á?ª á?¡á??á?®á??á??á?¬á??á??á??á??á??á?? **OnionShare** á?¤á??á??á??á??á??á??á?¡ á??á??á?ªá?£á??á??á?? á??á?? á?£á?¡á??á?¤á? á??á?®á??á?? á??á??á??á??á??á? á??á??á??á?¡á??á??á??á?¡, á??á??á??á??á??á??á??á? á?«á??á??á??á??á?¡ á?¨á??á? á??á?¡.
+
+### á? á??á??á? á??á??á?£á?¥á?ªá??á??á?¡ á?£á?¤á??á??á??á??á??á?? á??á??á??á?ªá??á??á??á??á??á??, á? á??á??á??á? á??á?ªá??á?? á?¤á??á? á??á??á??á??á??, á??á??á? á?«á??á??á??á?? á?«á??á? á??á??á??á??á?? á??á??á??á??á?¡á?£á?¤á??á??á??á??á?¡á??á??á??á?¡, Tor á??á?? á??á?®á??á??á? á??á??á?? á?¬á??á??á??á??á?¦á??á??á??á??á??á??á??á??á??á?¡ á??á??á?«á??á??á??á??á?¨á??.
+
+---
+
+# 3. TOR á??á??á??á??á??á??á??á??á?¡ á?£á?¤á??á??á??á??á??á??á?¡á??á??á??á?¡
+
+### á?¬á?§á??á??á?? á?¡á??á?ªá??á?ªá?®á??á??á??
+
+á?¯á??á??á??á??á?? á??á??á?¢á??á? á?? á?¡á??á?¤á??á??á?¨á?? á?ªá?®á??á??á? á??á??á?¡, á? á??á??á??á??á?¡á??á?ª á?¤á??á? á??á?? á??á??á??á??á??á? á?? á??á??á??á??á?¡.
+
+á??á??á??á??á??á? á?? á?¡á??á?¡á??á??á??á?? á?¬á?§á??á??á?? á??á??á??á? á??á??á??á??á?¡ á??á??á?¡ á??á??á?¡á??á?®á??á??á??á??á?¡, á?¬á??á??á??á??á? á??á??á??á?¡ á??á? á??á??á??á??á??.
+
+á??á??á??á? á??á?? á??á?¦á??á?¡, á?¯á??á??á??á??á??á?¡ á??á??á??á??á??á? á??á?¡ á?¡á??á?¤á? á??á?®á?? á??á??á?£á?¥á? á??á??á??, á? á??á??á??á??á?? á??á?«á??á??á??á? á?? á?¡á??á??á? á??á??á?¨á??á? á??á?¡á?? á??á??á??á??á??á??á??á??á??á?? á? á??á??á??á??á??á?¨á?? á??á??á??á??á??á??á??á?¡ á?­á??á??á?£á? á?¦á??á??á??á??á?¡ á??á?¨á??á??á??á??á??á??.
+
+á??á?? á??á??á??á??á??á??á??á??á??á??á?¡ á??á??á??á?  á?¤á??á??á??á??á?¡á??á??á??á?? á??á??á? á?«á?? á??á??á?ªá??á??á?¡ á?¤á??á? á??á??á??á??, á? á??á?? á??á??á??á?ªá? á??á?? á??á??á??á??á??á??á?? á??á??á??á??á?? á?¯á??á??á??á??á??á?¡á?? á??á?? á??á??á?¡á?? á??á??á??á??á??á??á??á??á??á?¡ á??á??á?¥á??á??á??á??á??á??á??á?¡ á??á??á?¢á??á? á??á??á?¢á?¨á??, á? á??á??á??á??á??á??á?ª á??á??á??á??á??á??á??á?? á??á??á??á?ªá??á??á?? á??á??á??á?? á??á??á??á??á??á? á??á?¡ á?®á??á??á?¨á??á?£á?®á??á??á??á??á??á??.
+
+á?¯á??á??á??á??á?? á??á?§á??á??á??á??á?¡ **Tor-á??á? á??á?£á??á??á? á?¡** á??á?? á??á??á??á??á??á??á??á??á??á??á?¡ á??á??á??á??á??á??á??á??á??á?¡ á??á?¦á?¡á??á??á??á??á??á??á??, á??á??á??á??á??á??á??á??á?¡ á?£á?¤á??á??á??á??á??á?? á??á??á??á?ªá??á??á??á?? á?¡á??á??á? á??á??á?¨á??á? á??á?¡á?? á??á? á??á??á??á??á??á??á?ªá??á??á??á??á?¡á?? á??á?? á?¡á??á??á??á? á??á??á??á??á? á??á?? á?¡á??á??á??á??á?®á??á?? á??á??á?®á??á??á? á??á??á??á?¡ á??á??á??á??á??á??á? á??á??á??á??á?¡ á??á??á??á??á?®á?£á??á??á??á??á?¡á??á?¡, á??á??á? á??á??á??á??, á??á??á?¡á?? á?¡á??á?¤á??á??á?¡ á?¬á??á??á??á??á?¦á??á??á??á??á??á??á??á?¡ á??á??á?«á? á??á??á??á??á?¡ á?¨á??á?¡á??á?®á??á?? á?¡á?¢á??á?¢á??á??á??á??á?¡ á??á??á??á??á?¥á??á??á?§á??á??á??á??á?¡á??á?¡. 
+
+á??á??á?? á??á?¡á??á??á?? á?¡á??á? á??á??á??á??á??á??á?¡ á??á??á??á?¡á??á?®á?£á? á??á??á??á??á??á?? **OnionShare** á??á?? **SecureDrop**, á??á??á?¡á??á??á??á??á??á?¡ á?£á?¡á??á?¤á? á??á?®á??á?? á??á??á?¡á??á?¬á??á??á??á??á??á??á?? á??á?£á? á??á??á??á??á?¡á?¢á??á??á??á?¡á?? á??á?? á??á?? á?®á??á??á?®á??á?¡á??á??á??á?¡, á? á??á??á??á??á??á??á?ª á??á?®á??á??á? á??á??á??á??á?? á?£á?¤á??á??á??á??á??á??á?¡ á??á??á? á?¦á??á??á??á??á??á?? á??á??á??á??á??á?¨á??á??á? á??á??á??á??á??á?¨á??.
+
+á?§á??á??á??á?? á??á?¡  á??á? á??á??á? á??á??á?? á??á?§á??á??á??á??á?¡ Tor-á?¡ á?¯á??á??á??á??á??á?¡ á??á??á? á??á??á?? á??á??á??á??á?ªá??á??á??á??á??á?¡ á??á??á?¡á??á?ªá??á??á??á??.
+
+### á??á??á??á??á??á??á??á??á?? á?£á?¤á??á??á??á??á??á??á?¡ á??á??á?ªá??á??á?¡á??á??á??á?¡ á??á??á??á? á?«á??á??á??á??á??, á? á??á??á??á? á??á?ªá??á?? á?¯á??á??á??á??á??, á??á?¦á?¬á??á??á??á?? á??á??á??á??á??á??á?? á?¡á??á??á??á??á??á??á??á??á??á??á?¨á?? á?¡á??á??á??á? á??á??á??á??á??á??á??á??á?¡á??á??á??á?¡, Tor á??á?? á?£á??á? á?£á??á??á??á??á?§á??á?¤á?¡ á??á??á?? á?¬á??á??á??á??á?¦á??á??á??á??á??á??á??á??á??á?¡ á??á??á?«á??á??á??á??á?¨á??.
+
+---
+
+# 4. TOR á?ªá??á??á??á?£á? á??á?¡ á?¬á??á??á??á??á?¦á??á??á??á??
+
+### á?®á??á??á??á??á??á?¡ á?¨á??á??á??á??á?? á??á??á?ªá??á??á??á?? á??á??á??á??á??á??á??á?¡á??
+
+á?¯á??á??á?? á??á??á? á??á??á??á??á?? á??á??á??á??á??á??á??á??á? á?? á?£á?ªá?®á??á??á??á?¨á?? á??á?¯á??á?®á??á?¡á??á??á?? á?¨á??á? á?¡.
+
+á?¡á??á?¡á?¢á?£á??á? á??á?¨á?? á??á??á??á??á??á??á??á??á??á??á?¡ á?¨á??á??á??á??á??, á??á??á?®á?¡á??á?? á??á??á??á??á?¡á?? á??á??á??á?¢á??á??á??.
+
+á??á??á?? á??á??á?¢á??á?? á??á??á?¦á??á??á??á?? á??á?§á?? á??á?? á? á??á?ªá?? á??á??á? á??á??á??á??á?? á??á??á?®á?? á?¨á??á?¢á?§á??á??á??á??á??á??á?? á??á? á??á?£á??á??á? á?¨á?? â??á??á??á??á?¨á??á? á??á?¡ á??á? á?? á??á??á??á??á?¬á?£á? á??â??, á??á?¤á??á?¥á? á?? á? á??á?? á?¡á??á??á?£á??á??á? á?? á?¨á??á?ªá??á??á??á??á?¡ á??á??á??á?? á??á?§á??.
+
+á??á?£á??á?ªá??, á??á??á??á??á??á??á??á?? á??á?ªá??á??á??á??á??á??á??á??á?¡ á?¨á??á??á??á??á?? á??á?¦á??á??á??á?©á??á??á??, á? á??á?? á??á??á?¡á?? á??á??á?¤á??á?¡á?¢á??á?¡ á??á??á??á?¡á??á?®á?£á? á?? á??á?? á??á?®á??á??á?? á??á??á??á??á??á??á?¡ á?¡á??á??á?¢á??á??á??, á??á??á??á?¡á??á??á?? á??á? á??á??á??á??á?? á?¡á?®á??á?? á??á? á??á??á? á??á??á?? á??á??á?£á?¬á??á??á??á??á??á??á?? á??á?§á??.
+
+á??á??á?¡ á??á??á??á??á??á??á??á?? á?°á?¥á??á??á??á??, á? á??á?? á??á?¡ á?¥á??á??á?§á??á??á?? á??á?¦á?£á??á??á??á?¡ á??á??á?¢á??á? á??á??á?¢á?¡ á??á?? á?¡á?£á? á??á?? á??á??á??á??á?¡á??á??á??á??á?? á??á??á??á??á??.
+á? á??á??á??á?  á?£á??á??á?? á??á??á??á??á??á?¨á??á? á??á??á??á??á?? á??á??á??á??á?¡á?? á??á?¯á??á?®á??á?¡ á?¬á??á??á? á??á??á?¡, á??á??á?£á? á?¦á??á??á??á??á??á?? á??á??á??á??á??á?¡ á??á??á?¦á??á???
+á??á??á?¢á??á? á??á??á?¢á?¨á?? á??á?ªá??á? á?? á??á??á??á??á??á??á??á??á?¡ á?¨á??á??á??á??á??, á??á??á??á??á?®á?? á??á? á??-á??á? á??á?? á?¤á??á? á?£á??á??, á?¡á??á??á??á?ª á?¬á??á??á??á??á??á?®á?? VPN-á??á??á??á?¡ á?¨á??á?¡á??á?®á??á??, á??á??á? á?«á?? á??á??á??á?¡á??á?®á?£á? á??á??á??á??á??á?¡, á? á??á??á??á??á??á??á?ª á?¡á??á?¨á?£á??á??á??á??á??á?¡ á??á?«á??á??á??á?? á?¡á?®á??á??, á?ªá??á??á??á?£á? á??á?¡á??á??á?? á??á??á??á??á?¡á?£á?¤á??á?? á?¥á?¡á??á??á??á??á?? á??á??á??á?¨á??á? á??á?¡.
+
+á?¯á??á??á??á?? á??á? á??á?? á?¡á??á??á??á?? á?ªá??á??á??á??á??á??á?? á??á??á??á??á??á? á??á??á??á??, á? á??á??á??á??á?? á??á??á?¤á?? VPN á??á?§á?? á?¡á??á?£á??á??á??á??á?¡á??.
+
+á? á??á??á??á? á?ª á??á?¥á??á??, á?¨á??á??á? á?©á??á?? á??á? á??-á??á? á??á?? á? á??á??á??á??á??á??á?ª á??á??á?£á?¨á??á??á??, á??á??á??á? á??á?? á?®á?£á??á?? á?¬á?£á??á??á?¡ á?¨á??á??á??á??á?? á??á??á??á?¨á??á? á?? á??á??á?¬á?§á??á?? á??á?? VPN á??á??á?®á??á?? á??á??á?£á?¬á??á??á??á??á??á??á??.
+
+á?¯á??á??á??á?? á??á??á??á??á??á? á?«á?? á??á??á??á?®á??á?? á?¡á?®á??á?? á?¡á??á?¨á?£á??á??á??á??á??á??á??á?¡ á??á??á?¡á??á??á??á?®á??á?? á??á?? á??á??á??á??á?? Tor-á??á? á??á?£á??á??á? á??á?¡ á?¨á??á?¡á??á?®á??á??, á??á?£ á? á??á??á??á?  á?¨á??á?£á?«á??á??á?? á??á??á?¡, á?ªá??á??á??á?£á? á??á?¡á??á??á??á?¡ á??á??á??á? á??á??á?¡ á??á??á??á??.
+
+á??á??á?? á??á??á??á?«á??á?? á??á??á?£á??á??á?¡ á??á?¤á??á?ªá??á??á??á?£á? á?? á??á?¡á??á??á??á?? á??á? á??á??á? á??á??á??á?¡ á?©á??á??á??á?¡á??á?¢á??á??á? á??á??á??.
+
+á? á??á?ªá?? á??á??á?£á?¨á??á?? **Tor-á??á? á??á?£á??á??á? á??**, á??á??á?°á?§á??á?? á?ªá??á??á??á?£á? á??á?¡ á?¥á??á??á?¨ á??á?§á??á?¤á?? á??á??á??á?®á??á??á? á??á??á??á??á??á??á?¡á??á??á??á?¡ á??á??á??á??á?£á??á??á??á??á?? á??á??á??á??á?£á? á?¡ á??á?? á??á??á?£á??á??á??á?¨á??á? á??á?? á??á??á??á??á??á?ªá??á?? á?®á??á??á?¡, á? á??á??á??á??á?¡ á??á??á?¨á??á??á??á??á??á??á??á?ª á??á??á??á??á??á?? á??á??á?¢á??á? á??á??á?¢á?¨á??.
+
+Tor-á??á? á??á?£á??á??á? á??á??, á?¯á??á??á?¡ á?¨á??á?£á?«á??á??á?? á?£á?¤á??á?¡á??á??, á??á??á??á??á?¡á?£á?¤á??á??á?? á??á?? á??á??á? á??á??á?? á??á??á??á??á?ªá??á??á??á??á??á?¡ á??á??á?£á??á??á?¦á??á??á??á??á??á??á??á?? á??á??á?£á??á??á??á?¨á??á? á??á??á?¡ á??á?¯á??á?®á??á?¡ á?¬á??á??á? á??á??á?¡. 
+
+### á??á??á??á?®á??á??á? á??á??á??á??á??á?? á? á??á??á??á??á??á??á?ª á?ªá??á??á??á?£á? á??á?¡ á?¥á??á??á?¨ á??á? á??á??á?? á??á??á??á?? á??á?¡á??á?¤á??á??á??á?¨á??, á??á??á??á??á??á??á??á?? Tor-á??á? á??á?£á??á??á? á?¡, á??á??á??á??á??á??á??á?? á??á? á??á?¡ á?£á?¤á??á?¡á??, á??á??á??á? á??á??á??, á??á??á?®á?¡á??á??á??á?? á?¡á??á?¨á?£á??á??á??á??á??, á??á??á?¢á??á? á??á??á?¢á??á??á?? á??á??á??á??á?¡á?£á?¤á??á??á?? á?¬á??á??á??á??á??á?¡.
+
+---
+
+# 5. á??á??á??á??á??á?? á?¡á??á??á??á??á?®á??á??á??
+
+## á? á?? á??á? á??á?¡ Tor?
+
+Tor á?£á?¤á??á?¡á?? á??á? á??á??á? á??á??á?? á??á?? á?¦á??á?? á?¥á?¡á??á??á??á??, á? á??á??á??á??á??á?ª á??á??á?®á??á??á? á??á??á??á?? á??á??á??á??á?§á?£á? á??á?¡ á??á??á??á??á??á?¡á??á??á??, á??á??á??á??á??á?®á??á??á??á??á??á??á??á??á?¡á??á??á?? á??á?? á?ªá??á??á??á?£á? á??á?¡á??á??á?? á??á??á??á??á?¡ á??á??á?ªá??á??á?¨á??.
+Tor á?¨á??á?¥á??á??á??á??á??á?? á??.á?¨.á?¨.-á?¡ 501(c)3 á??á??á??á??á??á??á?¡ á?¨á??á?¡á??á??á??á??á??á?¡á??á??, á??á??á?¤á?£á?«á??á??á??á?£á??á?? á? á??á??á??á? á?ª á??á? á??á??á??á??á??á??á??á??á??á??á?? á??á? á??á??á??á??á??á??á?ªá??á?? á?¡á??á?®á??á??á?¬á??á??á??á??á??á?? Tor Project.
+
+á?£á??á??á? á?¢á??á??á??á?¡á?? á??á??á?? Tor-á??á?¡ á??á??á??á??á?¡á??á?§á??á??á??á??á??á??á?? á??á? á??á?¡ Tor-á??á? á??á?£á??á??á? á??.
+á? á??á?ªá?? á?¡á??á? á??á??á??á??á??á??á?? Tor-á??á? á??á?£á??á??á? á??á??, á??á??á? á??á??á??á?? á?¨á??á?«á??á??á??á?¡ á??á??á??á??á??á?¡, á??á?£ á? á??á??á??á?? á?¡á??á??á?¢á?¡ á??á?¬á??á??á??á??á?? á??á?? á??á?¡á??á?¤á??á??á??á?¡ á? á??á??á??á?? á??á?®á??á? á??á?¨á?? á??á??á?§á??á?¤á??á??á??á??.
+
+á?¡á?®á??á?? á??á? á??á??á? á??á??á??á??á??, á? á??á??á??á? á??á?ªá??á?? SecureDrop á??á?? OnionShare á??á?§á??á??á??á??á?¡ Tor-á?¡ á??á??á??á??á??á??á??á?? á??á??á??á?®á??á??á? á??á??á??á??á??á??á?¡ á??á??á??á??á??á??á??á??á??á??á?¡á?? á??á?? á?ªá??á??á??á?£á? á??á?¡á??á??á?? á??á??á?¡á??á?ªá??á??á??á??.
+
+
+## 6. á? á??á??á??á?  á??á?£á?¨á??á??á??á?¡ Tor?
+
+á??á??á??á??á?¡ á?¡á?£á? á?¡ á??á?¬á??á??á??á?¡ á??á??á??á??á??á??á?¡ á??á??á??á?¡á??á??á?¢á?¡ á??á??á??á??á??á??á??á?¡ á??á??á?£á??á?®á??á??á??á??, á??á?¡á?? á? á??á?? á?®á?¡á??á??á?¡ Tor-á??á? á??á?£á??á??á? á?¡.
+
+Tor-á??á? á??á?£á??á??á? á?? á?¥á??á??á??á?¡ á?¬á? á??á??á?¡ á?¡á??á??á?? á?¨á??á??á??á?®á??á??á??á??á??á?? á??á??á??á??á??á?ªá??á??á??á??, á? á??á??á??á??á??á??á?ª á?¬á??á? á??á??á??á??á??á??á??á?¡ á??á??á??á??á??á?£á?¢á??á? á??á??á?¡ á??á?¡á??á?¤á??á??á??á?¡ á?¡á?®á??á??á??á??á?¡á?®á??á?? á?¬á??á? á?¢á??á??á??á??á??á??, á??á??á??á??á? á??á?£á??á?¡ Tor-á?¥á?¡á??á??á??á?? á??á??á??á??á?ªá??á??á??á??á??á?¡ á??á??á??á??á?¡á??á?ªá??á??á??á??.
+
+Tor-á??á? á??á?£á??á??á? á?? á?¨á??á?¡á??á??á??á??á??á?¡á??á?? á??á??á?¨á??á?¤á? á??á??á?¡ á??á??á?¡ á??á??á??á?®á??á??á??á??á?¡ á?¡á??á??á?¯á??á?  á??á?? á??á??á?£á??á??á??á??á??á??á?¡ á??á??á? á??á??á?? Tor-á??á??á??á??á??á?ªá??á??á?¡ á??á??á?¡ á?¬á? á??á??á?¨á??.
+
+á??á??á? á??á??á??á?? á??á??á??á??á??á?ªá??á??á?? á??á??á??á?ªá??á??á??á??á?¡ á??á??á?¨á??á?¤á??á? á??á?¡ á??á??á? á??á??á?? á?¨á? á??á?¡, á??á??á??á? á??á?? á??á??á?  á??á??á??á??á??á??á?¡, á? á??á?? á??á??á??á??á?¨á??á?£á??á??á??á??á?¡ á?¬á??á? á?¢á??á??á?? á??á? á??á?¡ á??á??á??á??á??á??á?¡ á??á??á??á?¡á??á??á?¢á??.
+
+á??á??á? á??á??á?? á??á??á??á??á??á?ªá??á??á?¡ á??á?ªá??á??á??á??á??á??á?? á??á?®á??á??á??á?? á??á??á??á??á??á??á??á?? á?¬á??á? á?¢á??á??á?? á?¬á? á??á??á?¨á??, á? á??á??á??á??á?¡á??á?ª á?¬á??á? á??á??á??á??á??á??á??á?¡ á??á??á??á? á?? á??á??á??á??á??á?ªá??á??á??.
+
+á??á??á??á? á?? á??á??á??á??á??á?ªá??á??á?? á??á??á??á?ªá??á??á??á??á?¡ á??á??á?¨á??á?¤á??á? á??á?¡ á?¨á??á??á??á??á?? á?¨á? á??á?¡ á??á?? á??á??á??á??á?£á??á??á??á??á??á??á?¡ á??á??á??á??á??á??á? á??á??á?¡ á??á??á??á?®á??á??á??á??á?¡ á??á??á?¡á??á??á?? á??á??á??á??á??á?ªá??á??á?¡.
+
+á??á??á?¡á??á??á?? á??á??á??á??á??á?ªá??á??á?? á??á?? á??á??á??á?ªá??á??á??á??á?¡ á??á??á?¨á??á?¤á??á? á??á?¡ á??á??á??á?? á?¨á? á??á?¡ á??á?? á??á??á??á??á??á??á? á??á??á?¡ á??á??á??á?®á??á??á??á??á?¡ á??á??á??á??á??á??á??á??á??á??á??á?¡ á??á??á??á??á?¨á??á?£á??á??á??á??á?¡ á??á??á??á??á??á??á?¡, á??á??á?£ á??á??á??á??á??á??á?¡ á??á??á??á?¡á??á??á?¢á??á??, á??á?£á??á?ªá?? á??á??á?¡ á??á?  á??á?ªá??á??á??á??á??á??á??, á? á??á?? á??á??á??á?®á??á??á??á?? á??á??á??á??á??á??á?? á??á??á??á??á??á?¡ á??á??á??á??á??á?£á?¢á??á? á??á??á??á??.
+
+á?¨á??á?¡á??á??á??á??á??á?¡á??á??, á??á??á??á??á??á??á?¡ á??á?  á??á?ªá??á??á??á??á??á??á?? á? á??á?? á??á??á??á?¡á??á??á?¢á??á?¡ á??á??á??á?®á??á??á??á?? á??á??á??á??á??á?¡á??á??á?? á??á??á??á??á??á??á??, á?¡á??á??á??á?? á??á??á??á??á?? á??á??á??á??á?? á??á?  á??á?ªá??á??á??á??á??á?¡ á??á??á??á?¡.
+
+## 7. á??á??á?? á??á?§á??á??á??á??á?¡ Tor-á?¡? 
+
+á?®á??á??á?®á?? á??á??á??á??á?? á??á?¡á??á?¤á??á??á??á??á??á?? á??á?§á??á??á??á??á?¡ Tor-á?¡ á?¡á??á??á?£á??á??á? á?? á??á??á? á??á??á?? á??á??á??á??á?ªá??á??á??á??á??á?¡ á?£á?¡á??á?¤á? á??á?®á??á??á??á??á?¡á??á??á??á?¡ á??á?? á??á??á?¢á??á? á??á??á?¢á??á??á?? á??á??á??á??á?¡á?£á?¤á??á??á?? á?¬á??á??á??á??á??á?¡á??á??á??á?¡.
+
+Tor á??á?®á??á??á? á??á??á?? á??á?£á? á??á??á??á??á?¡á?¢á??á??á?¡, á??á??á??á??á??á??á??á??á?¡ á?£á?¤á??á??á??á??á??á?? á??á??á??á?ªá??á??á??á??á??á?¡, á??á?¯á??á?®á?£á? á?? á?«á??á??á??á??á??á??á??á?¡ á??á?¡á?®á??á??á? á??á??á??á??á?¡, á??á??á??á??á??á??á??á? á??á??á?¡ á??á?? á??á??á??á??á?¡á??á??á??á?  á??á??á??á??á??á??á??á?¡, á? á??á??á??á??á?¡á??á?ª á?¡á?£á? á?¡ á??á??á??á?? á??á??á? á??á??á??á?¡ á??á??á??á??á??á?¡ á??á??á??á??á??á??á??á?¡, á??á??á??á??á??á?®á??á??á??á??á??á??á??á?¡ á??á?? á?ªá??á??á??á?£á? á??á?¡.
+
+## 6. á? á??á?¢á??á?? á?£á??á??á?? á??á??á??á??á?? Tor-á?¡?
+
+Tor á??á??á??á??á?£á??á??á??á??á??á??á?? á??á??á? á??á??á?? á??á??á??á??á?ªá??á??á??á??á??á?¡ á??á??á?¡á??á?ªá??á??á??á??. á?©á??á??á?? á??á?  á??á??á?ªá??á?? á??á??á?? á??á? á??á??á?? á?©á??á??á??á?? á??á??á??á?®á??á??á? á??á??á??á??á??á?? á??á?? á??á?  á??á?¦á??á? á??á?ªá?®á??á??á?? á??á??á??á?? á??á??á?¥á??á??á??á??á??á??á??á??á?¡ á?¨á??á?¡á??á?®á??á?? á??á? á??á??á??á??á?  á??á??á?¤á??á? á??á??á?ªá??á??á?¡.
+
+Tor-á??á??á??á??á??á?ªá??á??á??á?¡ á??á?¤á??á??á??á??á??á??á??á?¡ á??á?  á?¨á??á?£á?«á??á??á??á?? Tor-á??á?¡ á??á??á??á?®á??á??á? á??á??á??á??á??á??á?¡ á??á??á??á??á??á??á??á?? á??á??á??á??á??á??á??á?¡ á??á??á??á??á??á??á??.
+
+á??á?£á??á??á??á??á?? á??á??á??á??á??á? á??á??á??á?? Tor-á??á?¡ á??á??á? á??á??á??á?¬á?§á??á? á?? á??á??á??á??á?? á??á??á??á??á??á??á??á?£á? á?? á?¡á??á??á??á??á??á??á??á??á??á??á??á??á?¡á?? á??á?? á?¦á??á?? á?¬á?§á??á? á??á?¡ á??á? á??á??á??á??á??á??á?¡ á??á??á??á? , á??á??á??á?¡á?¢á?£á? á??á??á?¡ á? á??á?? á??á? á??á??á??á??á? á?? á?¤á??á? á?£á??á?? á?®á??á? á??á??á??á??á?? Tor-á?¨á?? á??á?  á??á? á?¡á??á??á??á??á?¡ á??á?? á?©á??á??á??á?? á?¡á??á?ªá??á??á??á?£á? á?? á??á??á?¡á?£á?®á??á?¡á??á??á??á??á??á??á??á??á?? á??á??á??á?¡á??á??á?¦á??á? á?£á??á??á?? á??á??á? á??á??á??, á? á??á?? Tor-á?¨á?? á??á? á??á?¡á??á? á??á?¡ á??á??á? á?¡á??á??á??á??á?¡ á??á?¡á??á??á??á?¡á?? á? á??á??.
+
+## 7. á?¨á??á??á??á?£á??á? á??á??á??á?? Tor-á??á?¡ á??á? á??á??á??á??á?¡
+
+Tor á?¨á??á?¥á??á??á??á??á??á?? á??á? á??á??á??á??á??, á??á? á??á??á??á??á??á??á??á?¡á??á??á?? á??á??á??á?¡á?®á??á??á??á??á??á?£á??á?? á??á??á??á?®á??á??á? á??á??á??á??á?¡, á?¨á??á??á??á?£á?¨á??á??á??á??á??á??á?¡á??, á??á??á??á??á??á?ªá??á??á??á??á??á?¡ á??á??á??á? á??á??á??á??á??á??á??á?¡á?? á??á?? á??á?®á??á? á??á??á??á?­á??á? á??á??á??á?¡ á??á??á??á? , á??á??á??á??á?? á??á?¡á??á?¤á??á??á??á??á??á??.
+
+á?©á??á??á?? á??á??á??á?¡á??á?­á??á? á??á??á??á?? á??á?¥á??á??á??á?? á??á??á?®á??á??á? á??á??á??, á? á??á?? Tor á??á??á??á?®á??á??á??á?? á?£á?¤á? á?? á??á??á?¢á??á?? á?¡á??á?¡á??á? á??á??á??á??á?? á??á?? á??á??á?ªá?£á??á??, á?§á??á??á??á??á?¡á??á??á??á?¡ á??á?? á?§á??á??á??á??á??á??.
+
+á?¨á??á??á??á?«á??á??á??á?? á??á??á??á??á?¬á??á??á??á??á??á?? á??á??á??á?¦á??á?? Tor-á??á? á??á??á?¥á?¢á?¨á?? á??á??á??á??á?¡ á?¬á??á? á??á??, á??á??á??á??á??á?ªá??á??á??á?¡ á??á??á?¨á??á??á??á??á??, á??á??á?¡á??á??á??á??á??á?¡ á?¨á??á??á??á??á??á??á??, á??á??á??á?®á??á??á? á??á??á??á??á??á??á?¡á??á??á??á?¡ á??á?®á??á? á??á??á?­á??á? á??á?¡ á??á?¦á??á??á?©á??á??á??á?? á??á?? á??á??á?¢á?? á??á??á??á??á??á??á??á??á?¡á??á??á??á?¡ á??á?¥á??á??á??á?¡ á??á? á??á??á??á??á??, Tor-á??á?¡ á?¨á??á?¡á??á?®á??á?? á??á??á?¤á??á? á??á??á?ªá??á??á?¡ á??á??á?¬á??á??á??á??á??á??.
+
+Tor-á??á?¡ á??á? á??á??á??á?? á??á??á??á? á??á??á??á?? á?¬á??á?¡á??á??á??á??á?? á??á?? á?©á??á??á??á??, á??á??á? á??á??á??á??á??á?¡ á??á? á??á??á?£á??á?? á?¡á??á??á??á??á??á??á??á??á??á??á?¡ á??á??á??á??á? á?? á??á??á?¬á??á? á??á??á?? á??á??á??á?¥á??á?¡ á?©á??á??á??á?¡ á?¨á??á??á??á??á?®á??á??á??á??á?¨á??.
+
+á??á?®á??á??á??á?? á??á? á?ªá??á??á?? Tor-á??á?¡ á?¨á??á?¡á??á?®á??á??, á?©á??á??á??á?¡ á??á??á??á?¡á??á??á?¢á??á??, á??á??á??á??á?¨á??, á??á??á??á??á?«á??á??á??á??á?? IRC-á?¡á??á?¡á??á?£á??á? á??á?¨á??, á?¨á??á??á??á??á??á??á??á? á??á??á??á?? á??á??á?¤á??á?¡á?¢á??á?¡ á?¯á??á?£á?¤á?¨á?? á??á?? á??á??á??á??á??á?¬á??á? á??á?? Tor-á??á?¡ á?¡á??á??á?®á??á??á??á??á?? á??á??á?¡á??á??á??á? á??á??á?? newsletter.torproject.org.
+
+
+## 8. á?©á??á??á??á?¢á??á??á? á??á??á?? Tor
+
+Tor á??á??á??á??á??á?£á?¢á??á? á??á?¡á??á??á??á?¡
+torproject.org/download
+
+TOR á??á??á??á??á??á?£á? á??á??
+### Android 
+Tor-á??á? á??á?£á??á??á? á?? Android-á??á?¡á??á??á??á?¡ á?®á??á??á??á??á?¡á??á?¬á??á??á??á??á??á?? GooglePlay-á??á??á??.
+
+### iOS
+Onion Browser, á?¨á??á?¥á??á??á??á??á?? M. Tigas-á??á?¡ á??á??á??á? , á??á? á??á??á??á??á? á??á?? á??á? á??á?£á??á??á? á??á?? á? á??á??á??á??á?¡á??á?ª á??á??á? á?©á??á??á?? iOS-á??á?¡á??á??á??á?¡.
+
diff --git a/kk.po b/kk.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/kk.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/km.po b/km.po
new file mode 100644
index 000000000..433f21e60
--- /dev/null
+++ b/km.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## á??á?¾ Tor á??á?¶â??á?¢á??á??á?¸?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/kn.po b/kn.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/kn.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ko.po b/ko.po
new file mode 100644
index 000000000..f28cf4b1e
--- /dev/null
+++ b/ko.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## í? ë¥´ê°? 무ì??ì?¸ê°?ì???
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ku_IQ.po b/ku_IQ.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ku_IQ.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ky.po b/ky.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ky.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/la.po b/la.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/la.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/lb.po b/lb.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/lb.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/lo.po b/lo.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/lo.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/lt.po b/lt.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/lt.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/lv.po b/lv.po
new file mode 100644
index 000000000..c39229faa
--- /dev/null
+++ b/lv.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Kas ir Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/mk.po b/mk.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/mk.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ml.po b/ml.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ml.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/mn.po b/mn.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/mn.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/mr.po b/mr.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/mr.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ms_MY.po b/ms_MY.po
new file mode 100644
index 000000000..c5ffc766e
--- /dev/null
+++ b/ms_MY.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Apakah Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/mt.po b/mt.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/mt.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/my.po b/my.po
new file mode 100644
index 000000000..a93970c61
--- /dev/null
+++ b/my.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Tor á??á?­á?¯á??á??á?ºá??á?¾á?¬ á?¡á??á??á?ºá??á??á?ºá?¸?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/nb.po b/nb.po
new file mode 100644
index 000000000..322690959
--- /dev/null
+++ b/nb.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Hva er Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/nds.po b/nds.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/nds.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ne.po b/ne.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ne.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/nl.po b/nl.po
new file mode 100644
index 000000000..bb03f5a92
--- /dev/null
+++ b/nl.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+tagged
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+tagged
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+tagged
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+tagged
+
+# 5. Shared Sections
+
+## Wat is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/nn.po b/nn.po
new file mode 100644
index 000000000..e3395c80b
--- /dev/null
+++ b/nn.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PERSONVERN
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Kva er Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. Korleis verkar Tor?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Kven brukar Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Last ned Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/oc.po b/oc.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/oc.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/or.po b/or.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/or.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/pa.po b/pa.po
new file mode 100644
index 000000000..a58524e48
--- /dev/null
+++ b/pa.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## ��ਰ �� ਹ�?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/pl.po b/pl.po
new file mode 100644
index 000000000..2fa67d93a
--- /dev/null
+++ b/pl.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Prawo do prywatnoÅ?ci jest prawem czÅ?owieka. 
+
+Tak jak wielu z nas, Aleisha wiÄ?kszoÅ?Ä? czasu spÄ?dzanego online poÅ?wiÄ?ca na kontakty ze znajomymi, postowanie w mediach spoÅ?ecznoÅ?ciowych i przeglÄ?danie sieci.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Czym jest Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/pms.po b/pms.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/pms.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ps.po b/ps.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ps.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/pt_BR.po b/pt_BR.po
new file mode 100644
index 000000000..6eebb134d
--- /dev/null
+++ b/pt_BR.po
@@ -0,0 +1,162 @@
+# Tor: Material de Divulgação 2019-2020
+
+# 1. TOR PARA PRIVACIDADE
+
+### Privacidade é um direito humano.
+
+Tal como muitos de nós, Aleisha passa grande parte de seu tempo online -- conectando-se a amigos, publicando nas mídias sociais e navegando na web.
+
+Mas, recentemente, ela observou que anúncios publicitários relacionados às suas pesquisas anteriores têm-na perseguido por toda parte em sua vida online.
+
+Ele se sente tão invadida que, ao fazer uma pesquisa online sobre anúncios na internet, descobre que não somente os anunciantes a perseguem, mas também o seu provedor de serviços de internet, as empresas de web analytics, as plataformas de mídias sociais, e muito mais.
+
+Aleisha então decide que deseja encontrar e usar um software que não colete seus dados, não a persiga e não compartilhe com outros serviços nenhum dado privado a seu respeito.
+
+Ela comparece a um treinamento de privacidade em um hackerspace em sua cidade e descobre o "Tor Browser", o único navegador web que a permite navegar anonimamente.
+
+---
+
+# 2.TOR PARA FEMINISTAS
+
+### O futuro é ciberfeminista
+
+Fernanda dirige um coletivo de mulheres sobre direitos reprodutivos no Brasil, país onde o aborto é ilegal.
+
+Fernanda e suas colegas criaram um website com informações sobre acesso a aborto, controle de natalidade e outros recursos para pessoas em busca informação reprodutiva.
+
+Se este site estivesse ligado a eles, eles poderiam ser presos - ou pior.
+
+Para proteger-se, Fernanda e suas colegas criaram seu website usando os **Serviços Onion** do Tor não somente para proteger-se de ser descobertas como as operadoras do servidor, mas também para ajudar a proteger os visitantes de seu website ao tornar obrigatório o uso do Navegador Tor.
+
+De fato, Fernanda usa o **Navegador Tor** para toda sua navegação web, só para garantir sua segurança.
+
+Ela também usa um aplicativo empoderado pelo Tor chamado **OnionShare** para enviar arquivos a outros ativistas com privacidade e segurança.
+
+### Ativistas dos direitos reprodutivos como Fernanda estão lutando por liberdades fundamentais, e o Tor ajuda a empoderar sua resistência.
+
+---
+
+# 3. TOR PARA OS DIREITOS HUMANOS
+
+### �gua é vida
+
+Jelani vive em uma pequena aldeia cortada por um rio caudaloso.
+
+Esse rio proveu água para sua comunidade desde os dias de seus ancestrais.
+
+Mas, hoje, o rio de Jelani está ameaçado por poderosas empresas multinacionais que perfuram sua região em busca de petróleo.
+
+Empresas particulares de segurança, pagas por essas empresas, usam poderosos mecanismos de vigilância para monitorar as atividades online de Jelani e seus vizinhos da aldeia que estão se organizando para proteger seu rio sagrado.
+
+Jelani usa o **Navegador Tor** para evitar que essas empresas observem suas visitas a websites internacionais de proteção aos direitos humanos e de auxílio jurídico e escreve artigos em blogs sobre o movimento de resistência em sua aldeia.
+
+Ela também usa o **OnionShare** e o **SecureDrop** para enviar em segurança documentos para jornalistas que estão ajudando a expor essas violações de direitos humanos.
+
+Todos esses softwares usam o Tor para ajudar a proteger a privacidade de Jelani.
+
+### Ativistas de direitos humanos como Jelani lutam por justiça em suas comunidades e o Tor ajuda a empoderar sua resistência.
+
+---
+
+# 4. TOR CONTRA A CENSURA
+
+### Construa pontes, não muros.
+
+Jean viajava pela primeira vez a um país distante de sua família.
+
+Na chegada ao hotel, ele abriu seu laptop.
+
+Ele se sentia tão exausto que quando a mensagem "Conexão expirada" apareceu pela primeira vez em seu navegador web, ele pensou que fosse devida a um erro dele próprio.
+
+Mas, após tentar de novo, e de novo, ele percebeu que seu provedor de email, um website de notícias e muitos aplicativos estavam indisponíveis.
+
+Ele ouvira dizer que esse país censurava a internet e se era isto que estava acontecendo.
+Como poderia contactar sua família por trás dessa muralha impenetrável?
+Após proceder a algumas pesquisas na web, ele encontrou um fórum onde leu sobre VPNs, serviços de privacidade que permitem que você se conecte a outras redes não censuradas.
+
+Jean gastou cerca de meia hora tentando descobrir qual das opções de VPN de baixo custo era a melhor.
+
+Ele escolheu uma que, por um momento, pareceu funcionar mas, após cinco minutos, a conexão caiu e ele não conseguiu mais conectar-se à VPN.
+
+Jean prosseguiu sua leitura em busca de outras opções e descobriu o Navegador Tor, e suas funcionalidades para contornar a censura.
+
+Ele descobriu um site-espelho oficial para fazer o download do programa.
+
+Quando ele abriu o **Navegador Tor** ele seguiu as instruções para usuários censurados e conectou-se a um ponte que possibilitou novamente seu acesso à internet.
+
+Com o Navegador Tor, Jean pode navegar livremente e com privacidade, entrando em contato com sua família.
+
+### Usuários censurados ao redor de todo o mundo confiam no Navegador Tor como um meio livre, estável e livre de censura para acessar a internet.
+
+---
+
+# 5. Seções compartilhadas
+
+## O que é Tor?
+
+Tor é um software livre e uma rede aberta que ajuda a proteger você contra rastreamento, vigilância e censura online.
+Tor é uma criação distribuída gratuitamente por uma organização sem fins lucrativos registrada nos Estados Unidos na categoria 501(c)3 chamada Projeto Tor.
+
+O meio mais fácil de utilizar o Tor é o Navegador Tor
+Quando você usa o Navegador Tor, ninguém pode ver quais websites você visita nem em que lugar do mundo você está.
+
+Outros aplicativos tais como SecureDrop ou OnionShare usam o Tor para proteger seus usuários contra vigilância e censura.
+
+
+## 6. Como funciona o Tor?
+
+Amal quer privacidade para visitar o site de Bekele e, assim, ela abre o Navegador Tor.
+
+O Navegador Tor seleciona um circuito aleatório de três retransmissores, os quais são computadores espalhados ao redor do mundo configurados para rotear todo o seu tráfego pela rede Tor.
+
+O Navegador Tor então criptografa sua solicitação ao website desejado três vezes e a envia ao primeiro retransmissor Tor de seu circuito.
+
+O primeiro retransmissor remove a primeira camada de criptografia mas não sabe que o website de destino é o de Bekele.
+
+O primeiro retransmissor sabe apenas a próxima localização do circuito, que é o segundo retransmissor.
+
+O segundo retransmissor remove outra camada de criptografia e encaminha a solicitação de página web ao terceiro retransmissor.
+
+O terceiro retransmissor remove a última camada de criptografia e encaminha a solicitação de página web ao seu destino, isto é, o website de Bekele, mas não sabe que a solicitação veio de Amal.
+
+Bekele não saberá que a solicitação a seu website veio de Amal, a menos que ela o informe disso.
+
+## 7. Quem usa o Tor?
+
+Pessoas ao redor do mundo usam o Tor para proteger sua privacidade e acessar a web livremente.
+
+Tor ajuda a proteger jornalistas, ativistas de direitos humanos, pesquisadores acadêmicos, bem como qualquer pessoa que experimente rastreamento, censura ou vigilância.
+
+## 6. Por que confiar no Tor?
+
+Tor foi desenvolvido com a privacidade como objetivo. Nós não sabemos quem são nossos usuários e não mantemos registros de atividades de usuários.
+
+Os operadores de retransmissores Tor não conseguem revelar a verdadeira identidade dos usuários do Tor.
+
+A contínua "revisão pelos pares" do código-fonte do Tor por comunidades acadêmicas e de código aberto assegura que não há "portas dos fundos" no Tor, e nosso contrato social promete que jamais criaremos esse tipo de coisa.
+
+## 7. Junte-se à comunidade Tor
+
+O Tor só é possível pela contribuição de um conjunto diversificado de usuários, desenvolvedores, operadores de retransmissores e defensores ao redor do mundo.
+
+Nós precisamos de sua ajuda para tornar o Tor mais usável e seguro para as pessoas em todos os lugares.
+
+Você pode voluntariar-se para ajudar o Tor escrevendo código, operando um retransmissor, criando documentação, oferecendo suporte ao usuário ou contando às pessoas em sua comunidade sobre o Tor.
+
+A comunidade Tor é governada por um código de conduta e nós delineamos nosso conjunto de promessas à comunidade em nosso contrato social.
+
+Saiba mais sobre o Tor visitando nosso website, nossa wiki, localizando-nos no IRC, unindo-se a uma de nossas listas de e-mail ou assinando as "Notícias Tor" no endereço newsletter.torproject.org.
+
+
+## 8. Baixando o Tor
+
+Tor para Desktop
+torproject.org/download
+
+TOR PARA DISPOSITIVOS MÃ?VEIS
+### Android
+O Navegador Tor para Android está disponível no GooglePlay.
+
+### iOS
+O Navegador Onion, desenvolvido por M. Tigas, é o único navegador que recomendamos para iOS.
+
diff --git a/pt_PT.po b/pt_PT.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/pt_PT.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ro.po b/ro.po
new file mode 100644
index 000000000..7e66d3b91
--- /dev/null
+++ b/ro.po
@@ -0,0 +1,162 @@
+# Material de mobilizare 2019-2020
+
+# 1. TOR PENTRU CONFIDENÈ?IALITATE
+
+### ConfidenÈ?ialitatea este un drept uman
+
+Ca mulÈ?i dintre noi, Aleisha îÈ?i petrece cea mai mare parte a timpului online - conectându-se cu prietenii, postând pe social media È?i navigând pe web.
+
+Dar, în ultima vreme, a observat cÄ? reclamele legate de cÄ?utÄ?rile ei anterioare o urmÄ?resc online.
+
+Aceasta se simte atât de invazivÄ? încât face cercetÄ?ri privind anunÈ?urile online È?i aflÄ? cÄ? nu numai agenÈ?ii de publicitate o urmÄ?resc, ci È?i ISP-ul, companiile de analizÄ?, platformele sociale media È?i multe altele.
+
+Aleisha decide cÄ? doreÈ?te sÄ? gÄ?seascÄ? È?i sÄ? utilizeze software care nu colecteazÄ? datele ei, nu o urmÄ?reÈ?te È?i nu spune altor servicii nimic privat despre ea.
+
+Ea merge la un training de confidenÈ?ialitate dintr-un spaÈ?iu hackers local È?i aflÄ? despre ** Tor Browser **, singurul navigator web care îi permite sÄ? navigheze anonim.
+
+---
+
+# 2.TOR PENTRU FEMINIÈ?TI 
+
+### Viitorul este cyberfeminist
+
+Fernanda conduce un colectiv de femei axat pe drepturile reproductive în Brazilia, unde avortul este ilegal.
+
+Fernanda È?i colegii ei au construit un site web cu informaÈ?ii despre accesul la avort, controlul naÈ?terilor È?i alte resurse pentru persoanele care cautÄ? informaÈ?ii despre reproducere.
+
+DacÄ? prin acest site se poate ajunge la ei, ar putea fi arestaÈ?i - sau mai rÄ?u.
+
+Pentru a se proteja, Fernanda È?i colegii ei au creat site-ul web folosind serviciile ** Tor **. Serviciile Onion nu numai cÄ? îi protejeazÄ? de a fi descoperiÈ?i ca operatori ai serverului, ci ajutÄ?, de asemenea, la protejarea vizitatorilor pe site-ul lor web prin solicitarea utilizÄ?rii Tor Browser.
+
+De fapt, Fernanda foloseÈ?te **Tor Browser** pentru toate browserele web doar pentru a fi pe partea sigurÄ?.
+
+De asemenea, ea utilizeazÄ? o aplicaÈ?ie Tor-powered, numitÄ? **OnionShare**, pentru a trimite în siguranÈ?Ä? È?i în mod privat fiÈ?iere altor activiÈ?ti.
+
+### ActiviÈ?tii pentru drepturile reproductive, precum Fernanda, se luptÄ? pentru libertÄ?È?ile fundamentale, iar Tor îi ajutÄ? în activitatea de rezistenÈ?Ä?.
+
+---
+
+# 3. TOR PENTRU DREPTURILE OMULUI
+
+### Apa este viaÈ?Ä?
+
+Jelani trÄ?ieÈ?te într-un mic sat prin care trece un râu larg.
+
+Acest râu a furnizat apÄ? comunitÄ?È?ii sale din moÈ?i-strÄ?moÈ?i.
+
+Dar astÄ?zi, râul lui Jelani este ameninÈ?at de puternice companii multinaÈ?ionale care sondeazÄ? petrolul din regiune.
+
+Firmele private de securitate, plÄ?tite de aceste companii, utilizeazÄ? mecanisme puternice de supraveghere pentru a monitoriza activitÄ?È?ile online ale lui Jelani È?i a vecinilor sÄ?i din sat care se organizeazÄ? pentru a-È?i proteja râul sacru.
+
+Jelani foloseÈ?te **Tor Browser** pentru a împiedica aceste companii sÄ? vizioneze site-ul pentru protecÈ?ia drepturilor omului È?i a asistenÈ?ei juridice internaÈ?ionale È?i scrie bloguri despre miÈ?carea de rezistenÈ?Ä? din satul sÄ?u.
+
+De asemenea, el foloseÈ?te **OnionShare** È?i **SecureDrop** pentru a trimite în siguranÈ?Ä? documente cÄ?tre jurnaliÈ?tii care ajutÄ? la expunerea acestor încÄ?lcÄ?ri ale drepturilor omului.
+
+Toate aceste programe folosesc Tor pentru a proteja intimitatea lui Jelani.
+
+### ActiviÈ?tii pentru drepturile omului, cum ar fi Jelani, se luptÄ? pentru justiÈ?ie în comunitÄ?È?ile lor, iar Tor îi ajutÄ? la activitatea de rezistenÈ?Ä?.
+
+---
+
+# 4. TOR PENTRU ANTI-CENZURÄ?
+
+### ConstruiÈ?i poduri, nu ziduri
+
+Jean cÄ?lÄ?torea pentru prima datÄ? într-o È?arÄ? departe de familia sa.
+
+DupÄ? ce a ajuns la un hotel, È?i-a deschis laptopul.
+
+S-a simÈ?it nedumerit atunci când a apÄ?rut pentru prima oarÄ? pe browserul sÄ?u web mesajul "Connection has timed out" È?i a crezut cÄ? mesajul s-a datorat propriei erori.
+
+Dar dupÄ? ce a încercat de mai multe ori, È?i-a dat seama cÄ? furnizorul de e-mail, un site de È?tiri È?i multe aplicaÈ?ii nu erau disponibile.
+
+A auzit cÄ? în aceastÄ? È?arÄ? se cenzureazÄ? internetul È?i se întreba dacÄ? se întâmplÄ? acest lucru.
+Cum putea sÄ?-È?i contacteze familia din spatele acestui zid impenetrabil?
+DupÄ? ce a fÄ?cut niÈ?te cÄ?utÄ?ri pe web, a gÄ?sit un forum È?i a citit despre VPN-uri, servicii private care vÄ? permit sÄ? vÄ? conectaÈ?i la o altÄ? reÈ?ea necenzuratÄ?.
+
+Jean a petrecut o jumÄ?tate de orÄ? încercând sÄ?-È?i dea seama care VPN ieftin era cel mai bun.
+
+El a ales unul È?i, pentru un timp, pÄ?rea cÄ? funcÈ?ioneazÄ?, dar dupÄ? cinci minute conexiunea a ieÈ?it offline È?i VPN-ul nu se mai putea conecta.
+
+Jean continua sÄ? citeascÄ? pentru a gÄ?si alte opÈ?iuni È?i a învÄ?È?at despre Tor Browser È?i cum poate eluda cenzura.
+
+A gÄ?sit un site web oficial pentru a descÄ?rca programul.
+
+A deschis browserul **Tor Browser**, a urmat instrucÈ?iunile pentru utilizatorii cenzuraÈ?i È?i s-a conectat la un pod /bridge care i-a permis din nou accesul la internet.
+
+Cu Tor Browser, Jean poate naviga liber È?i privat È?i poate lua legÄ?tura cu familia sa.
+
+### Utilizatorii cenzuraÈ?i din întreaga lume se bazeazÄ? pe Tor Browser pentru o modalitate gratuitÄ?, stabilÄ? È?i necenzuratÄ? de a accesa internetul.
+
+---
+
+# 5. SecÈ?iuni comune
+
+## Ce e Torul?
+
+Tor este un software gratuit È?i o reÈ?ea deschisÄ? care te ajutÄ? sÄ? te protejezi de urmÄ?rire, supraveghere È?i cenzurÄ? online.
+Tor este creat gratuit de cÄ?tre o organizaÈ?ie nonprofit 501(c)3 din S.U.A., numitÄ? Tor Project.
+
+Cea mai uÈ?oarÄ? modalitate de a utiliza Tor este Tor Browser.
+Atunci când utilizaÈ?i Tor Browser, nimeni nu poate vedea ce site-uri Web vizitaÈ?i sau din ce locaÈ?ie le vizitaÈ?i.
+
+Alte aplicaÈ?ii, cum ar fi SecureDrop È?i OnionShare, utilizeazÄ? Tor pentru a-È?i proteja utilizatorii împotriva supravegherii È?i cenzurii.
+
+
+## 6. Cum funcÈ?ioneazÄ? Tor?
+
+Amal doreÈ?te sÄ? viziteze privat site-ul Bekele, aÈ?a cÄ? deschide browserul Tor.
+
+Tor Browser selecteazÄ? un circuit aleatoriu de trei relee, care sunt computere din întreaga lume configurate pentru a ruta traficul prin reÈ?eaua Tor.
+
+Tor Browser cripteazÄ? de trei ori cererea ei pentru website È?i o trimite la primul releu Tor în circuitul ei.
+
+Primul releu eliminÄ? primul strat de criptare, dar nu aflÄ? cÄ? destinaÈ?ia este site-ul Bekele.
+
+Primul releu aflÄ? doar urmÄ?toarea locaÈ?ie din circuit, care este al doilea releu.
+
+Al doilea releu eliminÄ? un alt strat de criptare È?i înainteazÄ? cererea de paginÄ? web cÄ?tre cel de-al treilea releu.
+
+Al treilea releu eliminÄ? ultimul strat de criptare È?i înainteazÄ? cererea de paginÄ? web cÄ?tre destinaÈ?ia sa, site-ul Bekele, dar nu È?tie cÄ? cererea vine de la Amal.
+
+Bekele nu È?tie cÄ? cererea pentru website a venit de la Amal, cu excepÈ?ia cazului în care ea i-ar fi spus asta.
+
+## 7. Cine foloseÈ?te Tor? 
+
+Oamenii din întreaga lume folosesc Tor pentru a-È?i proteja intimitatea È?i pentru a accesa liber internetul.
+
+Tor ajutÄ? la protejarea jurnaliÈ?tilor, a apÄ?rÄ?torilor drepturilor omului, a victimelor violenÈ?ei domestice, a cercetÄ?torilor universitari È?i a oricui se confruntÄ? cu urmÄ?rirea, cenzura sau supravegherea.
+
+## 6. De ce sÄ? aveÈ?i încredere în Tor?
+
+Tor este proiectat pentru intimitate. Nu È?tim cine sunt utilizatorii noÈ?tri È?i nu È?inem jurnalele de activitate ale utilizatorilor.
+
+Operatorii releului Tor nu pot dezvÄ?lui adevÄ?rata identitate a utilizatorilor Tor.
+
+Evaluarea continuÄ? a codului sursÄ? Tor de cÄ?tre comunitÄ?È?ile academice È?i cu surse deschise garanteazÄ? cÄ? nu existÄ? backdoors în Tor, iar contractul nostru social promite cÄ? backdoor nu va fi folosit niciodatÄ? în Tor.
+
+## 7. AderaÈ?i la comunitatea Tor
+
+Realizarea Tor a fost posibilÄ? datoritÄ? mai multor utilizatori, dezvoltatori, operatori de retransmisie È?i avocaÈ?i din întreaga lume.
+
+Avem nevoie de ajutorul dvs. pentru ca Tor sÄ? devinÄ? mai uÈ?or de folosit È?i mai sigur pentru oamenii de pretutindeni.
+
+PuteÈ?i contribui voluntar la Tor, scriind un cod, rulând un releu, creând documentaÈ?ie, oferind suport pentru utilizatori sau spunând oamenilor din comunitatea dvs. despre Tor.
+
+Comunitatea Tor este guvernatÄ? de un cod de conduitÄ? È?i subliniem promisiunile noastre cÄ?tre comunitate din contractul nostru social.
+
+AflaÈ?i mai multe despre Tor vizitând site-ul nostru, pagina noastrÄ? wiki, gÄ?sindu-ne pe IRC, alÄ?turându-vÄ? uneia dintre listele noastre de discuÈ?ii sau înscriindu-vÄ? la Tor News de pe newsletter.torproject.org.
+
+
+## 8. DescÄ?rcare Tor
+
+Tor pentru Desktop
+torproject.org/download
+
+TOR PE MOBIL
+### Android 
+Tor Browser pentru Android este valabil pe GooglePlay.
+
+### iOS
+Onion Browser, dezvoltat de M. Tigas, este unicul browser pe care îl recomandÄ?m pentru iOS.
+
diff --git a/ru.po b/ru.po
new file mode 100644
index 000000000..fbe69cfd0
--- /dev/null
+++ b/ru.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR Ð?Ð? Ð?Ð?Ð?ФÐ?Ð?Ð?Ð?ЦÐ?Ð?Ð?ЬÐ?Ð?СТЬ
+
+### Человек имееÑ? пÑ?аво на непÑ?икоÑ?новенноÑ?Ñ?Ñ? Ñ?аÑ?Ñ?ной жизни
+
+Ð?ак и многие из наÑ?, Ð?лиÑ?а пÑ?оводиÑ? много вÑ?емени онлайн - обÑ?аÑ?Ñ?Ñ? Ñ? дÑ?Ñ?зÑ?Ñ?ми, оÑ?Ñ?авлÑ?Ñ? комменÑ?аÑ?ии в Ñ?оÑ?Ñ?еÑ?Ñ?Ñ? и пÑ?оÑ?маÑ?Ñ?иваÑ? веб-Ñ?Ñ?Ñ?аниÑ?Ñ?.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## ЧÑ?о Ñ?акое Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sco.po b/sco.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/sco.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/si.po b/si.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/si.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sk.po b/sk.po
new file mode 100644
index 000000000..69c441cd4
--- /dev/null
+++ b/sk.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Ä?o je Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sl.po b/sl.po
new file mode 100644
index 000000000..1c6f4fb6d
--- /dev/null
+++ b/sl.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Kaj je Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sn.po b/sn.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/sn.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/so.po b/so.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/so.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sq.po b/sq.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/sq.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sr.po b/sr.po
new file mode 100644
index 000000000..9d39f37d2
--- /dev/null
+++ b/sr.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Å ta je TOR?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sv.po b/sv.po
new file mode 100644
index 000000000..244c5ad66
--- /dev/null
+++ b/sv.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Vad är Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sw.po b/sw.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/sw.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/szl.po b/szl.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/szl.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ta.po b/ta.po
new file mode 100644
index 000000000..b4dd074a7
--- /dev/null
+++ b/ta.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Tor �ன�றால� �ன�ன?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/te.po b/te.po
new file mode 100644
index 000000000..ef59c80b9
--- /dev/null
+++ b/te.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## �ార� ���� �మి�ి?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/tg.po b/tg.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/tg.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/th.po b/th.po
new file mode 100644
index 000000000..42edc0e97
--- /dev/null
+++ b/th.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Tor �ืออะ�ร
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/tk.po b/tk.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/tk.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/tl_PH.po b/tl_PH.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/tl_PH.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/tor-outreach2019-2020.md b/tor-outreach2019-2020.md
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/tor-outreach2019-2020.md
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/tr.po b/tr.po
new file mode 100644
index 000000000..12fffdd7f
--- /dev/null
+++ b/tr.po
@@ -0,0 +1,162 @@
+# Tor Bilgilendirme BaÅ?lıkları 2019-2020
+
+# 1. KÄ°Å?Ä°SEL GÄ°ZLÄ°LÄ°K Ä°Ã?Ä°N TOR
+
+### KiÅ?isel gizlilik bir insan hakkıdır
+
+Aleisha çoÄ?umuz gibi zamanının önemli bir kısmında çevrimiçi oluyor. ArkadaÅ?ları ile görüÅ?üyor, sosyal aÄ?larda paylaÅ?ım yapıyor ve Ä°nternet sitelerine bakıyor.
+
+Bir süre önce, çevrimiçi olduÄ?u yerlerde daha önce yaptıÄ?ı aramalar ile ilgili reklamlar görmeye baÅ?ladıÄ?ını farketti.
+
+Bu durumu rahatsız edici bularak çevrimiçi reklamlar konusunu araÅ?tırdıÄ?ında, yalnız reklamcıların deÄ?il, Ä°nternet hizmeti saÄ?layıcıları, istatistik ve çevrimiçi davranıÅ? toplama firmaları, sosyal aÄ? platformları gibi pek çok kuruluÅ?un kendisini izlediÄ?ini öÄ?rendi.
+
+Aleisha kiÅ?isel bilgilerini toplamayan, çevrimiçi iÅ?lemlerini izlemeyen ve onun hakkında özel olan herhangi bir bilgiyi baÅ?ka yerlere aktarmayan bir yazılım bulmak ve kullanmak istediÄ?ine karar verdi. 
+
+Bunun üzerine katıldıÄ?ı bir kiÅ?isel bilgileri koruma eÄ?itiminde **Tor Browser** uygulamasının anonim kalarak iÅ?lem yapmayı saÄ?layan tek tarayıcı olduÄ?unu öÄ?rendi.
+
+---
+
+# 2. FEMÄ°NÄ°STLER Ä°Ã?Ä°N TOR
+
+### Gelecek siberfeminist olacak
+
+Fernanda kürtajın yasa dıÅ?ı olduÄ?u Brezilya'da bir kadın birliÄ?i ile üreme hakları üzerinde çalıÅ?ıyor.
+
+Fernanda ve arkadaÅ?ları kürtaj olanakları, doÄ?um kontrolü ve üreme ile ilgili diÄ?er bilgileri içeren bir web sitesi oluÅ?turmuÅ?.
+
+Bu web sitesi ile baÄ?lantılı oldukları anlaÅ?ılırsa tutuklanabilirler ya da baÅ?larına daha kötü Å?eyler gelebilir.
+
+Kendilerini korumak için Fernanda ve arkadaÅ?ları web sitesini Tor **onion hizmetleri** üzerinde hazırladılar. Onion hizmetleri hem onların web sitesini hazırlayanlar olarak bulunabilmelerini engelliyor hem de web sitesine eriÅ?mek için Tor Browser kullanması gerektiÄ?inden ziyaretçilerini de korumuÅ? oluyor.
+
+Aslında Fernanda güvenli tarafta kalabilmek için tüm İnternet aramalarını yalnız **Tor Browser** ile yapıyor.
+
+Ayrıca çeÅ?itli dosyaları diÄ?er aktivistler ile güvenli bir Å?ekilde paylaÅ?ırken kiÅ?isel gizliliÄ?ini de korumak için Tor tarafından geliÅ?tirilmiÅ? **OnionShare** uygulamasını kullanıyor.
+
+### Tor, üreme hakkı için mücadele eden Fernanda gibi temel hakları savunan aktivistlere yardımcı olur.
+
+---
+
+# 3. Ä°NSAN HAKLARI Ä°Ã?Ä°N TOR
+
+### Su hayattır
+
+Jelanı içinden büyük bir nehir geçen küçük bir köyde yaÅ?ıyor.
+
+Bu nehir atalarının zamanından beri köy halkının suyunu saÄ?lıyor.
+
+Ancak bugün Jelani'nin nehri bölgede petrol sondajı yapan çok uluslu güçlü Å?irketlerin tehdidi altında.
+
+Bu Å?irketler için çalıÅ?an özel güvenlik firmaları, nehirlerini korumak için bir araya gelen Jelani ve komÅ?ularından oluÅ?an köy halkının çevrimiçi yaptıklarını izlemek için geliÅ?miÅ? yöntemler kullanıyor.
+
+Jelani uluslararası insan hakları ya da hukuk ile ilgili web sitelerini ziyaret etmek ve köyündeki direniÅ? hakkında yazılar yazmak için **Tor Browser** kullanıyor.
+
+Ayrıca elindeki belgeleri insan haklarını açıÄ?a çıkarmak üzerine çalıÅ?an gazetecilere güvenli bir Å?ekilde iletmek için **OnionShare** ve **SecureDrop** uygulamalarını kullanıyor. 
+
+Jelani'nin kiÅ?isel gizliliÄ?in korunmasına yardımcı olan tüm bu uygulamalar Tor kullanır. 
+
+### Jelani gibi insan hakları aktivistleri toplumlarında adaleti saÄ?lamak için çalıÅ?ırlarken Tor onlara yardımcı olur.
+
+---
+
+# 4. SANSÃ?RE KARÅ?I TOR
+
+### Duvarlar deÄ?il köprüler kurun
+
+Jean ilk kez ailesinden uzakta bir ülkeye gidiyor.
+
+Oteline vardıÄ?ında bilgisayarını açıyor.
+
+Web tarayıcısında "BaÄ?lantı zaman aÅ?ımına uÄ?radı" iletisini görünce önce bunun kendi hatasından olduÄ?unu düÅ?ünüyor.
+
+Ancak bir kaç kez yeniden denediÄ?inde e-posta hizmeti saÄ?layıcısına, bir haber sitesine giremediÄ?ini ve pek çok uygulamayı kullanamadıÄ?ını fark ediyor.
+
+Bu ülkede Ä°nternet eriÅ?imine sansür uygulandıÄ?ını duyduÄ?unu anımsayınca sorunun bu olduÄ?unu anlıyor.
+AÅ?ılmaz bir duvarın arkasından ailesi ile nasıl görüÅ?ebileceÄ?ini merak ediyor.
+Web üzerinde biraz araÅ?tırma yapınca bir forumda sansürlenmeyen bir aÄ? üzerine baÄ?lanmayı saÄ?layan VPN adında özel hizmetler bulunduÄ?unu öÄ?reniyor. 
+
+Jean en ucuz ve iyi VPN hizmetinin hangisi olduÄ?unu anlamak için bir buçuk saat harcıyor.
+
+İçlerinden birini seçiyor ve bu bir süre için iÅ?e yarıyor gibi görünüyor. Ancak beÅ? dakika sonra baÄ?lantı kopuyor ve bir daha VPN baÄ?lantısı kurulamıyor. 
+
+Jean baÅ?ka ne yapabileceÄ?ini araÅ?tırıyor ve Tor Browser uygulaması ile sansürü nasıl aÅ?abileceÄ?ini öÄ?reniyor.
+
+Uygulamayı indirebileceÄ?i bir resmi yansı web sitesi buluyor.
+
+**Tor Browser** uygulamasını baÅ?lattıktan sonra sansür uygulanan kullanıcılara uygun ayarları seçerek bir köprüye baÄ?lanıyor ve Ä°nternet'e yeniden eriÅ?ebiliyor.
+
+Jean Tor Browser kullanarak kiÅ?isel gizliliÄ?inin korunmasını saÄ?larken Ä°nternet'e özgürce baÄ?lanıp ailesi ile görüÅ?ebiliyor.
+
+### Dünyada sansüre uÄ?rayan tüm kullanıcılar Tor Browser kullanarak ücretsiz ve güvenli bir Å?ekilde Ä°nternet'e eriÅ?ebilir.
+
+---
+
+# 5. PAYLAÅ?ILAN BÃ?LÃ?MLER
+
+## Tor nedir?
+
+Tor çevrimiçi izlenmenizi engelleyen ve sansürü aÅ?manızı saÄ?layan özgür ve ücretsiz bir açık aÄ?dır.
+Tor BirleÅ?ik Devletler 501(c)3 koÅ?ulları altında faaliyet gösteren ve kar amacı gütmeyen bir kuruluÅ? olan Tor Projesi tarafından geliÅ?tirilmiÅ?tir.
+
+Tor kullanmanın en kolay yolu Tor Browser uygulamasıdır.
+Tor Browser uygulamasını kullandıÄ?ınızda hiç kimse hangi web sitelerini ziyaret ettiÄ?inizi ve dünyanın neresinde olduÄ?unuzu göremez.
+
+SecureDrop ve OnionShare gibi diÄ?er uygulamalar kullanıcılarını izleme ve sansüre karÅ?ı korur.
+
+
+## 6. TOR NASIL Ã?ALIÅ?IR?
+
+Amal, kiÅ?isel gizliliÄ?ini koruyarak Bekele'nin web sitesine bakmak ister ve Tor Browser uygulamasını açar.
+
+Tor Browser, tüm dünya üzerinde Tor aÄ?ının trafiÄ?ini yönlendirmek üzere ayarlanmıÅ? pek çok bilgisayardan rastgele üç tanesini seçer ve bir aktarıcı devresi oluÅ?turur. 
+
+Ardından Tor Browser, web sitesi isteÄ?ini üç kez Å?ifreler ve az önce oluÅ?turulmuÅ? olan Tor devresindeki ilk aktarıcıya gönderir.
+
+Ä°lk aktarıcı birinci Å?ifreleme katmanını çözer ancak hedefin Bekele'nin web sitesi olduÄ?unu öÄ?renemez.
+
+Birinci aktarıcı yalnız devrede bir sonraki hedefin ikinci aktarıcı olduÄ?unu öÄ?renir.
+
+Ä°kinci aktarıcı ikinci Å?ifreleme katmanını çözer ve hedefi öÄ?renerek web sayfası isteÄ?ini üçüncü aktarıcıya iletir.
+
+Ã?çüncü aktarıcı son Å?ifreleme katmanını çözer ve web sayfasını isteÄ?ini Bekele'nin web sitesine iletir. Ancak bu isteÄ?in Amal tarafından yapıldıÄ?ını bilmez.
+
+Bekele, Amal kendisine söylemedikçe web sitesi ile ilgili isteÄ?in ondan geldiÄ?ini bilemez.
+
+## 7. KÄ°MLER TOR KULLANIR?
+
+Tüm dünyadan insanlar kiÅ?isel gizliliklerini korumak ve web sitelerine özgürce eriÅ?mek için Tor kullanır.
+
+Tor gazetecilere, insan hakları savunucularına, yerel Å?iddet kurbanlarına, akademik araÅ?tırmacılara ve izleme, sansür ya da gözetimle karÅ?ılaÅ?an herkese yardımcı olur.
+
+## 6. TOR'A NEDEN GÃ?VENEYÄ°M?
+
+Tor kiÅ?isel gizliliÄ?i korumak için tasarlanmıÅ?tır. Kullanıcılarımızın kim olduÄ?unu bilmeyiz ve kullanıcıların iÅ?lemleri ile ilgili herhangi bir günlük kaydı tutmayız. 
+
+Tor aktarıcı hizmeti sunanlar, aktarıcılarını kullanan Tor kullanıcılarının gerçek kimliklerini öÄ?renemez.
+
+Tor kaynak kodunun akademik ve açık kaynak toplulukları tarafından sürekli gözden geçirilmesi sayesinde Tor üzerinde herhangi bir arka kapı bulunmaz. Ayrıca topluma Tor üzerinde bir arka kapı bulunmayacaÄ?ına dair verdiÄ?imiz bir söz var.
+
+## 7. TOR TOPLULUÄ?UNA KATILIN
+
+Tor, dünyanın dört bir yanındaki kullanıcılar, geliÅ?tiriciler, aktarıcı iÅ?letmecileri ve destekçiler sayesinde var oluyor.
+
+Ä°steyen herkes için Tor uygulamasını daha kullanıÅ?lı ve güvenli hale getirmek için desteÄ?iniz gerekiyor.
+
+Kod geliÅ?tirerek, bir aktarıcı iÅ?leterek, belgeler yazarak, kullanıcı desteÄ?i sunarak ya da çevrenizdekileri Tor hakkında bilgilendirerek Tor projesine gönüllü destek verebilirsiniz.
+
+Tor topluluÄ?unun davranıÅ? kuralları vardır ve topluluÄ?a verdiÄ?imiz sözleri toplumsal sözleÅ?memizde özetliyoruz.
+
+Web sitemizi ve wiki sayfalarımızı ziyaret ederek, IRC üzerinde bizi bularak, e-posta listelerimizden birine katılarak ya da newsletter.torproject.org adresinden Tor News duyurularına abone olarak Tor hakkında daha fazla bilgi alabilirsiniz.
+
+
+## 8. TOR UYGULAMASINI Ä°NDÄ°RÄ°N
+
+Masaüstü için Tor
+torproject.org/download
+
+MOBÄ°L AYGIT Ã?ZERÄ°NDE TOR
+### Android 
+Android için Tor Browser, GooglePlay üzerinden alınabilir.
+
+### iOS
+M. Tigas tarafından geliÅ?tirilen Onion Browser, iOS için önerdiÄ?imiz tek tarayıcıdır.
+
diff --git a/ug@xxxxxxx b/ug@xxxxxxx
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ug@xxxxxxx
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/uk.po b/uk.po
new file mode 100644
index 000000000..d20d81414
--- /dev/null
+++ b/uk.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Що Ñ?аке Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ur.po b/ur.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ur.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/uz.po b/uz.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/uz.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/vi.po b/vi.po
new file mode 100644
index 000000000..e4474d649
--- /dev/null
+++ b/vi.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Tor là gì?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/vls.po b/vls.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/vls.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/yo.po b/yo.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/yo.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/zh_CN.po b/zh_CN.po
new file mode 100644
index 000000000..507a23dee
--- /dev/null
+++ b/zh_CN.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### æ°´æ?¯ç??å?½ä¹?æº?
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## ä»?ä¹?æ?¯ Torï¼?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/zh_TW.po b/zh_TW.po
new file mode 100644
index 000000000..dc7cc8368
--- /dev/null
+++ b/zh_TW.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY 
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS 
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse. 
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser. 
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately. 
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life 
+
+Jelani lives in a small village  which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors. 
+
+But today, Jelaniâ??s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river. 
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelaniâ??s privacy. 
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable. 
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect. 
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family. 
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## �麼� Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project. 
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world youâ??re coming from. 
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekeleâ??s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekeleâ??s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekeleâ??s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor? 
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance. 
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We donâ??t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor. 
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract. 
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android 
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits