diff --git a/i18n/pl/advanced/tor-overview.md b/i18n/pl/advanced/tor-overview.md index 4d1e61e1..99f69dda 100644 --- a/i18n/pl/advanced/tor-overview.md +++ b/i18n/pl/advanced/tor-overview.md @@ -6,7 +6,7 @@ description: Tor is a free to use, decentralized network designed for using the { align=right } -[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Dzięki temu, że ruch w sieci Tor jest trudny do zablokowania i namierzenia, Tor stanowi skuteczne narzędzie do omijania cenzury. [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} diff --git a/i18n/pl/alternative-networks.md b/i18n/pl/alternative-networks.md index 127d5bcd..13bc6cc3 100644 --- a/i18n/pl/alternative-networks.md +++ b/i18n/pl/alternative-networks.md @@ -21,7 +21,7 @@ When it comes to anonymizing networks, we want to specially note that [Tor](adva { align=right } -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } circumvention tool. +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Osoby fizyczne i organizacje mogą również wymieniać się informacjami w sieci Tor za pomocą „ukrytych usług .onion”, nie narażając swojej prywatności. Because Tor traffic is difficult to block and trace, Tor is an effective [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } circumvention tool. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,7 +35,7 @@ The recommended way to access the Tor network is via the official Tor Browser, w [Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } -You can access the Tor network using other tools; making this determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using apps like [Orbot](#orbot) or mobile browser apps to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +You can access the Tor network using other tools; making this determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using apps like [Orbot](#orbot) or mobile browser apps to access the Tor network is probably fine. Zwiększenie liczby osób korzystających z sieci Tor na co dzień pomaga zmniejszyć negatywny stereotyp tej sieci i obniża wartość „list użytkowników Tor”, które mogą tworzyć ISP lub rządy.
Try it out!
diff --git a/i18n/pl/basics/common-threats.md b/i18n/pl/basics/common-threats.md index e2b21cb5..cc7fdc83 100644 --- a/i18n/pl/basics/common-threats.md +++ b/i18n/pl/basics/common-threats.md @@ -147,7 +147,7 @@ Even with E2EE, service providers can still profile you based on **metadata**, w ## Mass Surveillance Programs -:material-eye-outline: Mass Surveillance +:material-eye-outline: Masowa inwigilacja Mass surveillance is the intricate effort to monitor the "behavior, many activities, or information" of an entire (or substantial fraction of a) population.[^1] It often refers to government programs, such as the ones [disclosed by Edward Snowden in 2013](https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)). However, it can also be carried out by corporations, either on behalf of government agencies or by their own initiative. @@ -205,7 +205,7 @@ If you've already submitted your real information to sites which shouldn't have ## Avoiding Censorship -:material-close-outline: Censorship +:material-close-outline: Cenzura Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] diff --git a/i18n/pl/cryptocurrency.md b/i18n/pl/cryptocurrency.md index 08687fe5..22eb9c71 100644 --- a/i18n/pl/cryptocurrency.md +++ b/i18n/pl/cryptocurrency.md @@ -8,8 +8,8 @@ cover: cryptocurrency.webp Chroni przed następującymi zagrożeniami: -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray} +- [:material-eye-outline: Masowa inwigilacja](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} +- [:material-close-outline: Cenzura](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray} Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/pl/financial-services.md b/i18n/pl/financial-services.md index a936abca..110ebd7e 100644 --- a/i18n/pl/financial-services.md +++ b/i18n/pl/financial-services.md @@ -77,7 +77,7 @@ MySudo's virtual cards are currently only available via their iOS app. Chroni przed następującymi zagrożeniami: -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} +- [:material-eye-outline: Masowa inwigilacja](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). diff --git a/i18n/pl/real-time-communication.md b/i18n/pl/real-time-communication.md index 52767415..14165994 100644 --- a/i18n/pl/real-time-communication.md +++ b/i18n/pl/real-time-communication.md @@ -10,7 +10,7 @@ cover: real-time-communication.webp - [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} +- [:material-eye-outline: Masowa inwigilacja](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Kapitalizm inwigilacji](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} These recommendations for encrypted **real-time communication** are great for securing your sensitive communications. These instant messengers come in the form of many [types of communication networks](advanced/communication-network-types.md). diff --git a/i18n/pl/tools.md b/i18n/pl/tools.md index 86338697..0bb80642 100644 --- a/i18n/pl/tools.md +++ b/i18n/pl/tools.md @@ -59,7 +59,7 @@ For more details about each project, why they were chosen, and additional tips o { align=left } -**Tor Browser** (Desktop & Android) is the top choice if you need anonymity, as it provides you with access to the **Tor** network, a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +**Tor Browser** (Desktop & Android) is the top choice if you need anonymity, as it provides you with access to the **Tor** network, a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Osoby fizyczne i organizacje mogą również wymieniać się informacjami w sieci Tor za pomocą „ukrytych usług .onion”, nie narażając swojej prywatności. Dzięki temu, że ruch w sieci Tor jest trudny do zablokowania i namierzenia, Tor stanowi skuteczne narzędzie do omijania cenzury. [Read Our Full Review :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } diff --git a/i18n/pl/tor.md b/i18n/pl/tor.md index 3b187ea8..d640a678 100644 --- a/i18n/pl/tor.md +++ b/i18n/pl/tor.md @@ -1,8 +1,8 @@ --- -meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" +meta_title: "Przeglądarka Tor Browser i sieć Tor: anonimowe przeglądanie Internetu – Privacy Guides" title: "Tor Browser" icon: simple/torbrowser -description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +description: Chroń swoje przeglądanie Internetu przed ciekawskimi oczami, korzystając z sieci Tor — bezpiecznej sieci omijającej cenzurę. cover: tor.webp schema: - @@ -10,8 +10,8 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://torproject.org - sameAs: https://en.wikipedia.org/wiki/Tor_(network) + url: https://torproject.org/pl + sameAs: https://pl.wikipedia.org/wiki/Tor_(sieć_anonimowa) applicationCategory: Web Browser operatingSystem: - Windows @@ -26,25 +26,25 @@ schema: Chroni przed następującymi zagrożeniami: - [:material-account-cash: Kapitalizm inwigilacji](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray} +- [:material-eye-outline: Masowa inwigilacja](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} +- [:material-close-outline: Cenzura](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray} -**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +**Tor** to sieć serwerów prowadzonych przez wolontariuszy, która pozwala na bezpłatne połączenie i zwiększenie prywatności oraz bezpieczeństwa w Internecie. Osoby fizyczne i organizacje mogą również wymieniać się informacjami w sieci Tor za pomocą „ukrytych usług .onion”, nie narażając swojej prywatności. Dzięki temu, że ruch w sieci Tor jest trudny do zablokowania i namierzenia, Tor stanowi skuteczne narzędzie do omijania cenzury. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} +[Szczegółowy przegląd sieci Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Film: Dlaczego warto korzystać z sieci Tor?](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}Porada
-Before connecting to Tor, please ensure you've read our [overview](advanced/tor-overview.md) on what Tor is and how to connect to it safely. We often recommend connecting to Tor through a trusted [VPN provider](vpn.md), but you have to do so **properly** to avoid decreasing your anonymity. +Przed połączeniem się z siecią Tor zapoznaj się z naszym [przeglądem](advanced/tor-overview.md), wyjaśniającym czym jest Tor i jak bezpiecznie z niego korzystać. Często zalecamy łączenie się z Tor za pośrednictwem zaufanego [dostawcy VPN](vpn.md), ale należy zrobić to **prawidłowo**, aby nie obniżyć poziomu swojej anonimowości.