[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [translation/support-https] pulling translations from transifex
commit e4abee34f6cc6872b53a257834704374ec0e9d7a
Author: Translation commit bot <translation@xxxxxxxxxxxxxx>
Date: Mon Apr 9 23:19:47 2018 +0000
pulling translations from transifex
---
ach.json | 8 ++++++++
ady.json | 8 ++++++++
af.json | 8 ++++++++
ak.json | 8 ++++++++
am.json | 8 ++++++++
ar.json | 8 ++++++++
arn.json | 8 ++++++++
ast.json | 8 ++++++++
az.json | 8 ++++++++
ba.json | 8 ++++++++
be.json | 8 ++++++++
bg.json | 8 ++++++++
bn.json | 8 ++++++++
bn_BD.json | 8 ++++++++
bn_IN.json | 8 ++++++++
bo.json | 8 ++++++++
br.json | 8 ++++++++
brx.json | 8 ++++++++
bs.json | 8 ++++++++
ca.json | 8 ++++++++
ceb.json | 8 ++++++++
cs.json | 8 ++++++++
csb.json | 8 ++++++++
cv.json | 8 ++++++++
cy.json | 8 ++++++++
da.json | 8 ++++++++
de.json | 8 ++++++++
dz.json | 8 ++++++++
el.json | 8 ++++++++
en_GB.json | 8 ++++++++
eo.json | 8 ++++++++
es.json | 8 ++++++++
es_AR.json | 8 ++++++++
es_CL.json | 8 ++++++++
es_CO.json | 8 ++++++++
es_MX.json | 8 ++++++++
et.json | 8 ++++++++
eu.json | 8 ++++++++
fa.json | 8 ++++++++
fi.json | 8 ++++++++
fil.json | 8 ++++++++
fo.json | 8 ++++++++
fr.json | 8 ++++++++
fr_CA.json | 8 ++++++++
fur.json | 8 ++++++++
fy.json | 8 ++++++++
ga.json | 8 ++++++++
gd.json | 8 ++++++++
gl.json | 8 ++++++++
gu.json | 8 ++++++++
gu_IN.json | 8 ++++++++
gun.json | 8 ++++++++
ha.json | 8 ++++++++
he.json | 8 ++++++++
hi.json | 8 ++++++++
hr.json | 8 ++++++++
hr_HR.json | 8 ++++++++
ht.json | 8 ++++++++
hu.json | 8 ++++++++
hy.json | 8 ++++++++
ia.json | 8 ++++++++
id.json | 8 ++++++++
is.json | 8 ++++++++
it.json | 8 ++++++++
ja.json | 8 ++++++++
jv.json | 8 ++++++++
ka.json | 8 ++++++++
kk.json | 8 ++++++++
km.json | 8 ++++++++
kn.json | 8 ++++++++
ko.json | 8 ++++++++
ko_KR.json | 8 ++++++++
ku.json | 8 ++++++++
ku_IQ.json | 8 ++++++++
kw.json | 8 ++++++++
ky.json | 8 ++++++++
la.json | 8 ++++++++
lb.json | 8 ++++++++
lg.json | 8 ++++++++
ln.json | 8 ++++++++
lo.json | 8 ++++++++
lt.json | 8 ++++++++
lv.json | 8 ++++++++
mg.json | 8 ++++++++
mi.json | 8 ++++++++
mk.json | 8 ++++++++
ml.json | 8 ++++++++
mn.json | 8 ++++++++
mr.json | 8 ++++++++
ms_MY.json | 8 ++++++++
mt.json | 8 ++++++++
my.json | 8 ++++++++
nah.json | 8 ++++++++
nap.json | 8 ++++++++
nb.json | 8 ++++++++
nds.json | 8 ++++++++
ne.json | 8 ++++++++
nl.json | 8 ++++++++
nl_BE.json | 8 ++++++++
nn.json | 8 ++++++++
nso.json | 8 ++++++++
oc.json | 8 ++++++++
om.json | 8 ++++++++
or.json | 8 ++++++++
pa.json | 8 ++++++++
pap.json | 8 ++++++++
pl.json | 8 ++++++++
pms.json | 8 ++++++++
ps.json | 8 ++++++++
pt.json | 8 ++++++++
pt_BR.json | 8 ++++++++
ro.json | 8 ++++++++
ru.json | 8 ++++++++
ru@xxxxxxxxxxxxx | 8 ++++++++
scn.json | 8 ++++++++
sco.json | 8 ++++++++
si_LK.json | 8 ++++++++
sk.json | 8 ++++++++
sk_SK.json | 8 ++++++++
sl.json | 8 ++++++++
sl_SI.json | 8 ++++++++
sn.json | 8 ++++++++
so.json | 8 ++++++++
son.json | 8 ++++++++
sq.json | 8 ++++++++
sr.json | 8 ++++++++
sr@xxxxxxxxxx | 8 ++++++++
st.json | 8 ++++++++
su.json | 8 ++++++++
support-https.json | 8 ++++++++
sv.json | 8 ++++++++
sw.json | 8 ++++++++
szl.json | 8 ++++++++
ta.json | 8 ++++++++
te.json | 8 ++++++++
te_IN.json | 8 ++++++++
tg.json | 8 ++++++++
th.json | 8 ++++++++
ti.json | 8 ++++++++
tk.json | 8 ++++++++
tr.json | 8 ++++++++
tzm.json | 8 ++++++++
ug@xxxxxxxxx | 8 ++++++++
uk.json | 8 ++++++++
ur.json | 8 ++++++++
ur_PK.json | 8 ++++++++
uz.json | 8 ++++++++
ve.json | 8 ++++++++
vi.json | 8 ++++++++
wa.json | 8 ++++++++
wo.json | 8 ++++++++
zh_CN.json | 8 ++++++++
zh_HK.json | 8 ++++++++
zh_TW.json | 8 ++++++++
zu.json | 8 ++++++++
155 files changed, 1240 insertions(+)
diff --git a/ach.json b/ach.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ach.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ady.json b/ady.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ady.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/af.json b/af.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/af.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ak.json b/ak.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ak.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/am.json b/am.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/am.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ar.json b/ar.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ar.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/arn.json b/arn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/arn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ast.json b/ast.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ast.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/az.json b/az.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/az.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ba.json b/ba.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ba.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/be.json b/be.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/be.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/bg.json b/bg.json
new file mode 100644
index 000000000..a19cec0f6
--- /dev/null
+++ b/bg.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Ð?огаÑ?о използвам ТоÑ?, могаÑ? ли подÑ?лÑ?Ñ?ваÑ?иÑ?е вÑ?е оÑ?е да видÑ?Ñ? инÑ?оÑ?маÑ?иÑ?Ñ?а, коÑ?Ñ?о Ñ?поделÑ?м Ñ?Ñ?Ñ? Ñ?айÑ?ове, каÑ?о поÑ?Ñ?ебиÑ?елÑ?ко име, паÑ?ола или дÑ?Ñ?ги неÑ?а. коиÑ?о попÑ?лвам вÑ?в Ñ?оÑ?ми?",
+ "description": "<p class=\"mb-3\">ТоÑ? пÑ?едпазва оÑ? вÑ?зможноÑ?Ñ?а подÑ?лÑ?Ñ?ваÑ?иÑ?е да могаÑ? да наÑ?Ñ?аÑ? Ñ?айÑ?овеÑ?е, коиÑ?о поÑ?еÑ?аваÑ?е. Ð?Ñ?пÑ?еки Ñ?ова инÑ?оÑ?маÑ?иÑ?, коÑ?Ñ?о попÑ?лваÑ?е в некÑ?ипÑ?иÑ?ана Ñ?оÑ?ма пÑ?ез инÑ?еÑ?неÑ?, използвайки HTTP вÑ?е пак може дабÑ?де пÑ?еÑ?Ñ?еÑ?наÑ?а пÑ?и изÑ?одниÑ? пÑ?епÑ?аÑ?аÑ? оÑ? опеÑ?аÑ?оÑ?а мÑ? или вÑ?екиго, койÑ?о наблÑ?дава Ñ?Ñ?аÑ?ика междÑ? изÑ?одниÑ? пÑ?епÑ?аÑ?аÑ? и кÑ?айниÑ? Ñ?ебÑ?айÑ?, койÑ?о поÑ?еÑ?аваÑ?е. Ð?ко Ñ?ебÑ?айÑ?а използва HTTPS, Ñ?огава Ñ?Ñ?аÑ?икÑ?Ñ? напÑ?Ñ?каÑ? изÑ?одниÑ? пÑ?епÑ?аÑ?аÑ? Ñ?е бÑ?де кÑ?ипÑ?иÑ?ан и нÑ?ма да бÑ?де доÑ?Ñ?Ñ?пен до подÑ?лÑ?Ñ?ваÑ?иÑ?е</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img c
lass=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Ð?ко използваÑ?е HTTPS, Ð?аÑ?иÑ?Ñ? инÑ?еÑ?неÑ? адÑ?еÑ? Ñ?е запоÑ?ва Ñ? \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Ð?изÑ?ализаÑ?иÑ?Ñ?а показва каква инÑ?оÑ?маÑ?иÑ? е доÑ?Ñ?Ñ?пна на подÑ?лÑ?Ñ?ваÑ?иÑ?е Ñ? или без ТоÑ? бÑ?аÑ?зÑ?Ñ?а и Ñ? HTTPS кÑ?ипÑ?иÑ?ане</h4></div></div></div></div>"
+ }
+}
diff --git a/bn.json b/bn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/bn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/bn_BD.json b/bn_BD.json
new file mode 100644
index 000000000..6f9edde5a
--- /dev/null
+++ b/bn_BD.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "য�ন �মি �র ব�যবহার �র�ি, ত�ন �মি য� তথ�য �য়�বসা���র সাথ� শ�য়ার �রি, ল�-�ন তথ�য �ব� �ি�� �মি ফর�ম-� �া�প �রি, �ড়িপাত�রা ��ন� স� তথ�য দ��ত� পার�?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/bn_IN.json b/bn_IN.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/bn_IN.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/bo.json b/bo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/bo.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/br.json b/br.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/br.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/brx.json b/brx.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/brx.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/bs.json b/bs.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/bs.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ca.json b/ca.json
new file mode 100644
index 000000000..7fcd40d6e
--- /dev/null
+++ b/ca.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Quan utilitzo el Tor, poden esbrinar la informació que comparteixo amb els llocs web, com ara la informació d'inici de sessió i les coses que escric als formularis?",
+ "description": "<p class=\"mb-3\">El Tor us protegeix la vostra navegació de mirades indiscretes als llocs web que visiteu. Tanmateix, la informació enviada sense xifrar a Internet mitjançant HTTP bà sic, encara es pot interceptar pels relés dels operadors de de sortida o qualsevol persona que observi el trà nsit entre el relé de sortida i el lloc web de destinació. Si el lloc que esteu visitant utilitza HTTPS, el trà nsit que deixeu al relé de sortida es xifrarà i no serà visible.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Si utilitzeu HTTPS, aleshores l'URL del vostre lloc web començarà amb «https://»;.</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Aquesta visualització mostra
quina informació és visible amb i sense el Tor i el xifrat HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/ceb.json b/ceb.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ceb.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/cs.json b/cs.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/cs.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/csb.json b/csb.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/csb.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/cv.json b/cv.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/cv.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/cy.json b/cy.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/cy.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/da.json b/da.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/da.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/de.json b/de.json
new file mode 100644
index 000000000..c2b78efa7
--- /dev/null
+++ b/de.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Während ich Tor benutze, können Lauscher immer noch die Informationen sehen, die ich mit Webseiten teile, wie Login-Informationen und Dinge, die ich in Formulare eintippe?",
+ "description": "Tor stoppt Lauscher davor über die Seiten die du besuchst zu lernen. Allerdings können Informationen, die unverschlüsselt über das Internet mit Hilfe von Plain-HTTP gesendet werden, weiterhin von den Betreibern der Exit-server oder jedem, der den Verkehr zwischen Ihrem Exit-server und Ihrer Ziel-seite beobachtet, abgefangen werden. Wenn die Seite, die Sie besuchen, HTTPS verwendet, dann wird der Verkehr, der Ihr Exit-server verlässt, verschlüsselt und ist für Lauscher nicht sichtbar. Wenn Sie HTTPS verwenden, beginnt Ihre Internetseiten-URL mit \"https://\". Diese Visualisierung zeigt, welche Informationen für Lauscher mit und ohne Tor Browser und HTTPS-Verschlüsselung sichtbar sind."
+ }
+}
diff --git a/dz.json b/dz.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/dz.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/el.json b/el.json
new file mode 100644
index 000000000..590fc20aa
--- /dev/null
+++ b/el.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Î?Ï?αν Ï?Ï?ηÏ?ιμοÏ?οιÏ? Ï?ον Tor, μÏ?οÏ?οÏ?ν να Ï?Ï?οκλαÏ?οÏ?ν οι Ï?ληÏ?οÏ?οÏ?ίεÏ? Ï?οÏ? μοιÏ?άζομαι Ï?ε ιÏ?Ï?Ï?Ï?οÏ?οÏ?Ï?, Ï?Ï?Ï?Ï? Ï?ιÏ? Ï?ληÏ?οÏ?οÏ?ίεÏ? Ï?Ï?νδεÏ?ηÏ? και Ï?α Ï?Ï?οιÏ?εία Ï?οÏ? Ï?ληκÏ?Ï?ολογÏ? Ï?ε Ï?Ï?Ï?μεÏ?;",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/en_GB.json b/en_GB.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/en_GB.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/eo.json b/eo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/eo.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/es.json b/es.json
new file mode 100644
index 000000000..6adfcab5a
--- /dev/null
+++ b/es.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Cuando estoy usando Tor, ¿alguien a la escucha todavÃa puede ver la información que comparto con los sitios web, como la información de inicio de sesión y las cosas que escribo en los formularios?",
+ "description": "<p class=\"mb-3\">Tor protege contra que alguien a la escucha conozca los sitios que visita. Sin embargo, la información enviada sin cifrar por Internet usando HTTP simple todavÃa puede ser interceptada por los operadores de los repetidores de salida o cualquiera que observe el tráfico entre su repetidor de salida y su sitio web de destino. Si el sitio que está visitando usa HTTPS, el tráfico que abandona su repetidor de salida estará cifrado, y no será visible para quien se encuentre a la escucha.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Si está usando HTTPS, la URL de su sitio web comenzará con \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Esta vi
sualización muestra qué información es visible para alguien a la escucha con y sin el Navegador Tor y el cifrado HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/es_AR.json b/es_AR.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/es_AR.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/es_CL.json b/es_CL.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/es_CL.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/es_CO.json b/es_CO.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/es_CO.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/es_MX.json b/es_MX.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/es_MX.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/et.json b/et.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/et.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/eu.json b/eu.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/eu.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fa.json b/fa.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fa.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fi.json b/fi.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fi.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fil.json b/fil.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fil.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fo.json b/fo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fo.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fr.json b/fr.json
new file mode 100644
index 000000000..4c1a33feb
--- /dev/null
+++ b/fr.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Quand jâ??utilise Tor, les systèmes dâ??écoute peuvent-ils encore voir les renseignements que je partage avec les sites Web, comme les renseignements de connexion et ce que je tape dans les formulairesâ???",
+ "description": "<p class=\"mb-3\">Tor empêche aux systèmes dâ??écoute de découvrir quels sites vous visitez. Cependant, les renseignements envoyés par Internet sans chiffrement en utilisant une simple connexion HTTP peuvent toujours être interceptés par les opérateurs de relais de sortie ou quiconque observe le trafic entre votre relais de sortie et votre site Web de destination. Si le site que vous visitez utilise HTTPS, le trafic quittant votre relais de sortie sera alors chiffré et invisible aux systèmes dâ??écoute.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Si vous utilisez HTTPS, lâ??URL de votre site Web commencera par « â??https:// »;.</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"car
d-title\">Cette représentation montre quels renseignements sont visibles aux systèmes dâ??écoute avec et sans le navigateur Tor et le chiffrement HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/fr_CA.json b/fr_CA.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fr_CA.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fur.json b/fur.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fur.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/fy.json b/fy.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/fy.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ga.json b/ga.json
new file mode 100644
index 000000000..a6e966539
--- /dev/null
+++ b/ga.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Agus Brabhsálaà Tor in úsáid agam, an bhfuil cúléisteoirà in ann an fhaisnéis a sheolaim chuig suÃmh Ghréasáin a fheiceáil, mar shampla focail fhaire nó faisnéis a chuirim i bhfoirmeacha?",
+ "description": "<p class=\"mb-3\">NÃl cúléisteoirà in ann na suÃmh a dtugann tú cuairt orthu a fheiceáil nuair a úsáideann tú Tor. Mar sin féin, nuair a sheolann tú faisnéis neamhchriptithe trasna an IdirlÃn thar HTTP, is féidir le hoibreoirà an athsheachadáin deiridh, nó le haon duine atá ag féachaint ar an trácht idir an athsheachadán deiridh agus an suÃomh Gréasáin, an trácht sin a fheiceáil. Má úsáideann an suÃomh HTTPS, beidh an trácht idir an athsheachadán deiridh agus an suÃomh criptithe, agus nà bheidh cúléisteoirà in ann é a fheiceáil.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Má tá tú ag úsáid HTTPS, feicfidh tú \"â??https://\" ag tús an URL.</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"http
s\"><div class=\"card-body\"><h4 class=\"card-title\">LéirÃonn an pictiúr seo an t-eolas is féidir le cúléisteoirà a fheiceáil le agus gan Brabhsálaà Tor agus criptiúchán HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/gd.json b/gd.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gd.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/gl.json b/gl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gl.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/gu.json b/gu.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gu.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/gu_IN.json b/gu_IN.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gu_IN.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/gun.json b/gun.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/gun.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ha.json b/ha.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ha.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/he.json b/he.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/he.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/hi.json b/hi.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hi.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/hr.json b/hr.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hr.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/hr_HR.json b/hr_HR.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hr_HR.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ht.json b/ht.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ht.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/hu.json b/hu.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hu.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/hy.json b/hy.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/hy.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ia.json b/ia.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ia.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/id.json b/id.json
new file mode 100644
index 000000000..b96fe6137
--- /dev/null
+++ b/id.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Saat saya menggunakan Tor, akankah pihak-pihak yang menguping melihat informasi yang saya bagikan di situs-situs, seperti informasi login dan hal-hal yang saya masukkan ke dalam formulir?",
+ "description": "<p class=\"mb-3\">Tor melindungi Anda dari pihak-pihak yang ingin mengetahui situs yang Anda kunjungi. Namun, informasi tidak terenkripsi yang terkirim lewat Internet menggunakan HTTP polos, tetap dapat ditangkap oleh operator exit relay atau siapapun yang mengamati lalu-lintas antara exit relay dan situs tujuan. Jika situsnya menggunakan HTTPS, lalu-lintas keluar dari exit relay akan terenkripsi dan tidak terlihat oleh pihak ketiga. </p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> Jika Anda menggunakan HTTPS, URL situs Anda akan dimulai dengan \n\"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> Visualisasi ini menunjukkan informasi yang terlihat oleh para penguping
, menggunakan dan tidak menggunakan Tor Browser dan enkripsi HTTPS. </h4></div></div></div></div>"
+ }
+}
diff --git a/is.json b/is.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/is.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/it.json b/it.json
new file mode 100644
index 000000000..7a13c6d3f
--- /dev/null
+++ b/it.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Quando uso Tor, può qualcuno intercettare le informazioni che condivido con i siti, come le informazioni di accesso e i dati inseriti nei moduli?",
+ "description": "<p class=\"mb-3\">Tor protegge contro gli intercettatori dal sapere i siti che visiti. Comunque, le informazioni inviate su internet usando il protocollo HTTP possono essere intercettate da operatori di relay di uscita (exit node) o chiunque stia osservando il traffico tra il relay di uscita e il sito web di destinazione. Se il sito che stai visitando usa HTTPS, allora il traffico che lascia il relay di uscita sarà cifrato, e non sarà visibile da possibili intercettatori.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Se stai usando HTTPS, l'URL del sito web inizierà con \"https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Questa visualizzazione mostra quale informazione
è visibile agli intercettatori con e senza il Browser Tor e la cifratura HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/ja.json b/ja.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ja.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/jv.json b/jv.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/jv.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ka.json b/ka.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ka.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/kk.json b/kk.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/kk.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/km.json b/km.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/km.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/kn.json b/kn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/kn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ko.json b/ko.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ko.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ko_KR.json b/ko_KR.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ko_KR.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ku.json b/ku.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ku.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ku_IQ.json b/ku_IQ.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ku_IQ.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/kw.json b/kw.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/kw.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ky.json b/ky.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ky.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/la.json b/la.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/la.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/lb.json b/lb.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lb.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/lg.json b/lg.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lg.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ln.json b/ln.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ln.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/lo.json b/lo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lo.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/lt.json b/lt.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lt.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/lv.json b/lv.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/lv.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/mg.json b/mg.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mg.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/mi.json b/mi.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mi.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/mk.json b/mk.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mk.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ml.json b/ml.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ml.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/mn.json b/mn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/mr.json b/mr.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mr.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ms_MY.json b/ms_MY.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ms_MY.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/mt.json b/mt.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/mt.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/my.json b/my.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/my.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nah.json b/nah.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nah.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nap.json b/nap.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nap.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nb.json b/nb.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nb.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nds.json b/nds.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nds.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ne.json b/ne.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ne.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nl.json b/nl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nl.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nl_BE.json b/nl_BE.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nl_BE.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nn.json b/nn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/nso.json b/nso.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/nso.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/oc.json b/oc.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/oc.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/om.json b/om.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/om.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/or.json b/or.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/or.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/pa.json b/pa.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pa.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/pap.json b/pap.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pap.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/pl.json b/pl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pl.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/pms.json b/pms.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pms.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ps.json b/ps.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ps.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/pt.json b/pt.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/pt.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/pt_BR.json b/pt_BR.json
new file mode 100644
index 000000000..d1295b69e
--- /dev/null
+++ b/pt_BR.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Quando eu uso Tor, alguém que me espie pode ver as informações que eu compartilho com websites, como aquelas de logins ou de formulários que eu preencho?",
+ "description": "<p class=\"mb-3\">Tor impede que outras pessoas de saberem quais sites você consulta. Mesmo assim, informações envidas sem criptografia por sites que utilizam HTTP podem ser interceptadas por operados de relés de saÃda ou por qualquer pessoa que acompanhe o tráfego entre o seu relé de saÃda e o site que você consulta. Se o site que você estiver consultando utilizar HTTPS, o tráfego que sair do seu relé de saÃda será criptografado e, assim, invisÃvel a pessoas que espionem. </p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> se você estiver usando HTTPS, a URL do seu website começará com \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">Esta visualizaçÃ
£o mostra quais informações são visÃveis à s pessoas que espionem como ou sem o Navegador Tor e criptografia HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/ro.json b/ro.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ro.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ru.json b/ru.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ru.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ru@xxxxxxxxxxxxx b/ru@xxxxxxxxxxxxx
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ru@xxxxxxxxxxxxx
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/scn.json b/scn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/scn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sco.json b/sco.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sco.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/si_LK.json b/si_LK.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/si_LK.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sk.json b/sk.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sk.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sk_SK.json b/sk_SK.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sk_SK.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sl.json b/sl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sl.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sl_SI.json b/sl_SI.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sl_SI.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sn.json b/sn.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sn.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/so.json b/so.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/so.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/son.json b/son.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/son.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sq.json b/sq.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sq.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sr.json b/sr.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sr.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sr@xxxxxxxxxx b/sr@xxxxxxxxxx
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sr@xxxxxxxxxx
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/st.json b/st.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/st.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/su.json b/su.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/su.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/support-https.json b/support-https.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/support-https.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sv.json b/sv.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sv.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/sw.json b/sw.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/sw.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/szl.json b/szl.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/szl.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ta.json b/ta.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ta.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/te.json b/te.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/te.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/te_IN.json b/te_IN.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/te_IN.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/tg.json b/tg.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/tg.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/th.json b/th.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/th.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ti.json b/ti.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ti.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/tk.json b/tk.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/tk.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/tr.json b/tr.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/tr.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/tzm.json b/tzm.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/tzm.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ug@xxxxxxxxx b/ug@xxxxxxxxx
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ug@xxxxxxxxx
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/uk.json b/uk.json
new file mode 100644
index 000000000..b16b30765
--- /dev/null
+++ b/uk.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "Ð?оли Ñ? коÑ?иÑ?Ñ?Ñ?Ñ?Ñ?Ñ? Tor, Ñ?и можÑ?Ñ?Ñ? пÑ?дÑ?лÑ?Ñ?Ñ?ваÑ?Ñ? вÑ?е-Ñ?аки баÑ?иÑ?и Ñ?нÑ?оÑ?маÑ?Ñ?Ñ?, Ñ?коÑ? Ñ? дÑ?лÑ?Ñ?Ñ? з веб-Ñ?айÑ?ами, напÑ?иклад, Ñ?нÑ?оÑ?маÑ?Ñ?Ñ? пÑ?о вÑ?Ñ?д Ñ?а Ñ?нÑ?оÑ?маÑ?Ñ?Ñ?, Ñ?кÑ? Ñ? ввожÑ? Ñ? Ñ?оÑ?ми?",
+ "description": "<p class=\"mb-3\">Tor заÑ?иÑ?аÑ? пÑ?дÑ?лÑ?Ñ?Ñ?ваÑ?Ñ?в вÑ?д вивÑ?еннÑ? Ñ?айÑ?Ñ?в, Ñ?кÑ? ви вÑ?двÑ?дÑ?Ñ?Ñ?е. Ð?Ñ?оÑ?е Ñ?нÑ?оÑ?маÑ?Ñ?Ñ?, Ñ?ка надÑ?илаÑ?Ñ?Ñ?Ñ?Ñ? незаÑ?иÑ?Ñ?ованоÑ? Ñ?еÑ?ез Ð?нÑ?еÑ?неÑ? за допомогоÑ? звиÑ?айного HTTP, може пеÑ?еÑ?оплÑ?ваÑ?иÑ?Ñ? опеÑ?аÑ?оÑ?ами пеÑ?едаваÑ?Ñ?в виÑ?одÑ? або бÑ?дÑ?-ким, Ñ?Ñ?о Ñ?поÑ?Ñ?еÑ?Ñ?гаÑ? за Ñ?Ñ?аÑ?Ñ?ком мÑ?ж виÑ?Ñ?дним пеÑ?едаваÑ?ем Ñ?а веб-Ñ?айÑ?ом пÑ?изнаÑ?еннÑ?. ЯкÑ?о веб-Ñ?айÑ?, Ñ?кий ви вÑ?двÑ?дÑ?Ñ?Ñ?е, викоÑ?иÑ?Ñ?овÑ?Ñ? пÑ?оÑ?окол HTTPS, Ñ?о Ñ?Ñ?аÑ?Ñ?к, Ñ?о залиÑ?аÑ? виÑ?Ñ?дний Ñ?еÑ?Ñ?анÑ?лÑ?Ñ?оÑ?, бÑ?де заÑ?иÑ?Ñ?ований, Ñ? вÑ?н не бÑ?де видимим длÑ? пÑ?дÑ?лÑ?Ñ?Ñ?ваÑ?Ñ?в.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=
\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">ЯкÑ?о ви викоÑ?иÑ?Ñ?овÑ?Ñ?Ñ?е HTTPS, URL-адÑ?еÑ?а ваÑ?ого веб-Ñ?айÑ?Ñ? поÑ?инаÑ?Ñ?Ñ?Ñ?Ñ? з \"https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">ЦÑ? вÑ?зÑ?алÑ?заÑ?Ñ?Ñ? показÑ?Ñ?, Ñ?кÑ? Ñ?нÑ?оÑ?маÑ?Ñ?Ñ? можна побаÑ?иÑ?и пÑ?дÑ?лÑ?Ñ?Ñ?ваÑ?ам з викоÑ?иÑ?Ñ?аннÑ?м Ñ? без Ñ?иÑ?Ñ?Ñ?ваннÑ? бÑ?аÑ?зеÑ?а Tor Ñ? HTTPS.</h4></div></div></div></div>"
+ }
+}
diff --git a/ur.json b/ur.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ur.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ur_PK.json b/ur_PK.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ur_PK.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/uz.json b/uz.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/uz.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/ve.json b/ve.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/ve.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/vi.json b/vi.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/vi.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/wa.json b/wa.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/wa.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/wo.json b/wo.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/wo.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/zh_CN.json b/zh_CN.json
new file mode 100644
index 000000000..33def34d3
--- /dev/null
+++ b/zh_CN.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "å½?æ??使ç?¨Toræ?¶ï¼?çª?å?¬è??è?½å¤?è?·å??æ??å??享ç»?ç½?ç«?ç??ä¿¡æ?¯ï¼?ç?»é??ä¿¡æ?¯æ??è??å?¶ä»?以è¿?ç§?æ ¼å¼?ä¼ é??ç??ä¿¡æ?¯ï¼?å??ï¼?",
+ "description": "<p class=\"mb-3\">Torä¿?æ?¤æ?¨ç??é??ç§?ï¼?å°?ä¼?é?»æ¢çª?å?¬è??è?·å??æ?¨è®¿é?®ç½?ç«?ç??讯æ?¯ã??ä½?æ?¯ï¼?使ç?¨HTTPå??è®®ä¼ è¾?ç??æ?ªè¢«å? å¯?ç??ä¿¡æ?¯å?¯è?½ä¾?æ?§ä¼?被å?ºå?£ä¸ç»§ç??æ??æ?§è??ï¼?æ??æ?¯ç??è§?å?ºå?£ä¸ç»§ä¸?ç?®æ ?ç«?ç?¹æµ?é??ç??人æ??æ?¦æ?ªã??å¦?æ??æ?¨è®¿é?®ç??ç½?ç«?使ç?¨ç??æ?¯HTTPSå??è®®ï¼?é?£ä¹?ä»?å?ºå?£ä¸ç»§æµ?å?ºç??æ?°æ?®å°?ä¼?被å? å¯? ï¼?çª?å?¬è??æ? æ³?解æ??è¿?äº?æ?°æ?®</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> å¦?æ??æ?¨æ£å?¨ä½¿ç?¨HTTPSå??è®®ï¼?æ?¨è®¿é?®ç½?ç«?å°?ç?±\"â??https://â??å¼?å§?ã;??</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\"> è¿?个å?¨ç?»å±?示äº?ï¼?å?¨ä¸?使ç?¨Toræµ?è§?å?¨ä»¥å??HTTPSå? å¯?ç??æ??å?µä¸?ï¼?æ?¨ç??ä¿¡æ?¯æ?¯å¦?ä½?对çª?å?¬è??å
?¯è§?ç??ã??</h4></div></div></div></div>"
+ }
+}
diff --git a/zh_HK.json b/zh_HK.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/zh_HK.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/zh_TW.json b/zh_TW.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/zh_TW.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
diff --git a/zu.json b/zu.json
new file mode 100644
index 000000000..625e41dd5
--- /dev/null
+++ b/zu.json
@@ -0,0 +1,8 @@
+{
+ "https-1": {
+ "id": "#https-1",
+ "control": "https-1",
+ "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?",
+ "description": "<p class=\"mb-3\">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your website URL will begin with \"â??https://\".</h4></div></div></div><div class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 class=\"card-title\">This visualization shows what information is visible to eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
+ }
+}
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits