[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r18091: {website} update german volunteer page to r17898 (website/trunk/de)
Author: qbi
Date: 2009-01-13 05:18:45 -0500 (Tue, 13 Jan 2009)
New Revision: 18091
Modified:
website/trunk/de/volunteer.wml
Log:
update german volunteer page to r17898
Modified: website/trunk/de/volunteer.wml
===================================================================
--- website/trunk/de/volunteer.wml 2009-01-13 10:12:36 UTC (rev 18090)
+++ website/trunk/de/volunteer.wml 2009-01-13 10:18:45 UTC (rev 18091)
@@ -1,5 +1,5 @@
## translation metadata
-# Based-On-Revision: 16742
+# Based-On-Revision: 17898
# Last-Translator: jens@xxxxxxxxxxxx, peter@xxxxxxxxxxxxx
#include "head.wmi" TITLE="Tor: Mithelfen" CHARSET="UTF-8"
@@ -159,7 +159,7 @@
<br />
In addition, these same statistics can be gathered about the traffic
through a node. Events can be added to the <a
-href="https://www.torproject.org/svn/torctl/doc/howto.txt">Tor Control
+href="https://svn.torproject.org/svn/torctl/trunk/doc/howto.txt">Tor Control
Protocol</a> to
report if a circuit extend attempt through the node succeeds or fails, and
passive statistics can be gathered on both bandwidth and reliability
@@ -386,7 +386,7 @@
The <a href="http://p56soo2ibjkx23xo.onion/">exitlist software</a>
is written by our fabulous anonymous
contributer Tup. It's a DNS server written in Haskell that supports part of our <a
-href="https://www.torproject.org/svn/trunk/doc/contrib/torel-design.txt">exitlist
+href="https://<svnsandbox>doc/contrib/torel-design.txt">exitlist
design document</a>. Currently, it is functional and it is used by
check.torproject.org and other users. The issues that are outstanding
are mostly aesthetic. This wonderful service could use a much better
@@ -660,7 +660,7 @@
<b>Bring up new ideas!</b>
<br />
Don't like any of these? Look at the <a
-href="<svnsandbox>doc/design-paper/roadmap-future.pdf">Tor development
+href="<svnsandbox>doc/roadmap/2008-12-19-roadmap-full.pdf">Tor development
roadmap</a> for more ideas.
</li>
@@ -842,7 +842,7 @@
messen und verbessern und bei guten Resultaten Tor überholen.</li>
<li>Unsere Ziele zum Schutz vor Zensur schließen ein, dass ein
Angreifer Tor-Verkehr von <a
- href="https://www.torproject.org/svn/trunk/doc/design-paper/blocking.html#sec:network-fingerprint">normalem
+ href="<svnsandbox>doc/design-paper/blocking.html#sec:network-fingerprint">normalem
SSL-Verkehr unterscheiden</a> kann. Offensichtlich können wir keine
perfekte Steganographie erreichen und dabei benutzbar bleiben. Aber
wir möchten gern Angriffen, die nur wenige Pakete betrachten,