[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [community/master] better strings for l10n
commit 17968159ffdc39db72da04482b44cf78f8747ac4
Author: emma peel <emma.peel@xxxxxxxxxx>
Date: Fri Jun 14 09:03:40 2019 +0200
better strings for l10n
---
content/training/best-practices/contents.lr | 39 ++++++++++++++++++-----------
content/training/contents.lr | 6 +++--
2 files changed, 28 insertions(+), 17 deletions(-)
diff --git a/content/training/best-practices/contents.lr b/content/training/best-practices/contents.lr
index 09e08aa..1f9fced 100644
--- a/content/training/best-practices/contents.lr
+++ b/content/training/best-practices/contents.lr
@@ -20,13 +20,16 @@ html: two-columns-page.html
---
body:
-Running security trainings is a fun and rewarding way to help your community conduct human rights work safely. Good preparation is essential to an effective and safe training, so we've curated some resources to help you make the most of your training event.
+Running security trainings is a fun and rewarding way to help your community conduct human rights work safely.
+Good preparation is essential to an effective and safe training, so we've curated some resources to help you make the most of your training event.
## Before the training
_Am I the right person to give this training?_
-Security trainings can help people communicate and use the internet safely, but there are additional considerations to be made before training some at-risk groups. That's why we recommend this resource from EFF's Security Education Companion, ["Am I the right person to give this training?"](https://sec.eff.org/articles/right-person-to-train). This resource can help you be sure that you're doing the best by the community of people you wish to train.
+Security trainings can help people communicate and use the internet safely, but there are additional considerations to be made before training some at-risk groups.
+That's why we recommend this resource from EFF's Security Education Companion, ["Am I the right person to give this training?"](https://sec.eff.org/articles/right-person-to-train).
+This resource can help you be sure that you're doing the best by the community of people you wish to train.
Other questions to ask yourself before deciding to do a training:
@@ -35,26 +38,32 @@ Other questions to ask yourself before deciding to do a training:
Once you've answered those questions, you're ready to plan your training!
-1. Find a location that is accessible, affordable, has an internet connection and other materials like a white board, projector, and screen. Make sure that the location is safe for your attendees to visit.
-2. Promote your event in your community's spaces, taking safety into consideration. Under many circumstances, social media is great for promotion, but for higher risk groups, you may want to use a smaller word-of-mouth network or require community members to share information individually to other trusted people.
+1. Find a location that is accessible, affordable, has an internet connection and other materials like a white board, projector, and screen.
+ Make sure that the location is safe for your attendees to visit.
+2. Promote your event in your community's spaces, taking safety into consideration.
+ Under many circumstances, social media is great for promotion, but for higher risk groups, you may want to use a smaller word-of-mouth network or require community members to share information individually to other trusted people.
3. Create localized handouts for some of the more difficult concepts that you'll be teaching.
4. Make sure you have plenty of stickers to hand out to participants!
-5. Create a link list of all the resources you'll be talking about. This includes downloads and PDFs of handouts. You'll share this link list on a whiteboard or project it at the training.
-6. Determine how you'll do hands-on assistance at your training. Will you be able to handle this alone? Or will you require partners? If you need more help, make sure the partners you're bringing in are aware of the safety needs of the community, and communicate with your contacts in the community to make sure they're okay with you bringing in additional trainers.
-7. Make sure your presentation is up-to-date (both information and screenshots) and save your presentation in two file formats -- for example, odp and pdf -- and on at least one additional device -- for example, on your computer and on a USB stick.
-8. Decide how you will facilitate a safer space. We recommend using the Tor Code of Conduct. You can also start the training by asking participants to come up with their own community agreements for the space.
+5. Create a link list of all the resources you'll be talking about.
+ This includes downloads and PDFs of handouts.
+ You'll share this link list on a whiteboard or project it at the training.
+6. Determine how you'll do hands-on assistance at your training.
+ Will you be able to handle this alone? Or will you require partners? If you need more help, make sure the partners you're bringing in are aware of the safety needs of the community, and communicate with your contacts in the community to make sure they're okay with you bringing in additional trainers.
+7. Make sure your presentation is up-to-date (both information and screenshots) and save your presentation in two file formats -- for example, odp and pdf -- and on at least one additional device -- for example, on your computer and on a USB stick.
+8. Decide how you will facilitate a safer space. We recommend using the Tor Code of Conduct.
+ You can also start the training by asking participants to come up with their own community agreements for the space.
##Â At the training
-1. Create an agenda and share it on a projection or on a whiteboard so that your participants can be prepared for the day.
+1. Create an agenda and share it on a projection or on a whiteboard so that your participants can be prepared for the day.
2. Communicate about how much time the training will take, and when breaks will happen. Make sure you take breaks!
-3. Communicate about when you'll take questions, either during the training, at the end, or both.
+3. Communicate about when you'll take questions, either during the training, at the end, or both.
4. Communicate about how you'll offer hands-on help (if at all).
-5. Communicate about how participants can contact you securely after the training.
-6. Show the participants the resources at community.torproject.org and support.torproject.org.
-7. Show the participants other resources like sec.eff.org.
+5. Communicate about how participants can contact you securely after the training.
+6. Show the participants the resources at community.torproject.org and support.torproject.org.
+7. Show the participants other resources like sec.eff.org.
##Â After the training
-1. Think about how you will evaluate your success at the training. You may want to create a follow up survey, or at least contact participants and ask them to share their feedback with you.
-
+1. Think about how you will evaluate your success at the training.
+ You may want to create a follow up survey, or at least contact participants and ask them to share their feedback with you.
diff --git a/content/training/contents.lr b/content/training/contents.lr
index da8dfc2..3553914 100644
--- a/content/training/contents.lr
+++ b/content/training/contents.lr
@@ -18,6 +18,8 @@ html: training.html
---
body:
-##We want to teach the world about Tor. Will you help?
+## We want to teach the world about Tor. Will you help?
-Are you a Tor trainer or interested in becoming one? Looking for resources to help your community learn the most about Tor? We've got you covered. For some users with serious threat models, using Tor and other privacy tools can be risky if not done with care. If this describes your community, or if you're not sure, please [contact our community team](https://trac.torproject.org/projects/tor/wiki/org/teams/CommunityTeam#Communication) for more help.
+Are you a Tor trainer or interested in becoming one? Looking for resources to help your community learn the most about Tor? We've got you covered.
+For some users with serious threat models, using Tor and other privacy tools can be risky if not done with care.
+If this describes your community, or if you're not sure, please [contact our community team](https://trac.torproject.org/projects/tor/wiki/org/teams/CommunityTeam#Communication) for more help.
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits