1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-11-16 05:12:38 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2025-11-11 19:32:49 +00:00
parent 4dfa708122
commit 10ed2b41e2
8 changed files with 31 additions and 31 deletions

View File

@@ -6,7 +6,7 @@ description: Tor is a free to use, decentralized network designed for using the
![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } ![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right }
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Dzięki temu, że ruch w sieci Tor jest trudny do zablokowania i namierzenia, Tor stanowi skuteczne narzędzie do omijania cenzury.
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

View File

@@ -21,7 +21,7 @@ When it comes to anonymizing networks, we want to specially note that [Tor](adva
![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } ![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right }
The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } circumvention tool. The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Osoby fizyczne i organizacje mogą również wymieniać się informacjami w sieci Tor za pomocą „ukrytych usług .onion”, nie narażając swojej prywatności. Because Tor traffic is difficult to block and trace, Tor is an effective [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } circumvention tool.
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" }
@@ -35,7 +35,7 @@ The recommended way to access the Tor network is via the official Tor Browser, w
[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } [Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button }
You can access the Tor network using other tools; making this determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using apps like [Orbot](#orbot) or mobile browser apps to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. You can access the Tor network using other tools; making this determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using apps like [Orbot](#orbot) or mobile browser apps to access the Tor network is probably fine. Zwiększenie liczby osób korzystających z sieci Tor na co dzień pomaga zmniejszyć negatywny stereotyp tej sieci i obniża wartość „list użytkowników Tor”, które mogą tworzyć ISP lub rządy.
<div class="admonition example" markdown> <div class="admonition example" markdown>
<p class="admonition-title">Try it out!</p> <p class="admonition-title">Try it out!</p>

View File

@@ -147,7 +147,7 @@ Even with E2EE, service providers can still profile you based on **metadata**, w
## Mass Surveillance Programs ## Mass Surveillance Programs
<span class="pg-blue">:material-eye-outline: Mass Surveillance</span> <span class="pg-blue">:material-eye-outline: Masowa inwigilacja</span>
Mass surveillance is the intricate effort to monitor the "behavior, many activities, or information" of an entire (or substantial fraction of a) population.[^1] It often refers to government programs, such as the ones [disclosed by Edward Snowden in 2013](https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)). However, it can also be carried out by corporations, either on behalf of government agencies or by their own initiative. Mass surveillance is the intricate effort to monitor the "behavior, many activities, or information" of an entire (or substantial fraction of a) population.[^1] It often refers to government programs, such as the ones [disclosed by Edward Snowden in 2013](https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)). However, it can also be carried out by corporations, either on behalf of government agencies or by their own initiative.
@@ -205,7 +205,7 @@ If you've already submitted your real information to sites which shouldn't have
## Avoiding Censorship ## Avoiding Censorship
<span class="pg-blue-gray">:material-close-outline: Censorship</span> <span class="pg-blue-gray">:material-close-outline: Cenzura</span>
Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5]

View File

@@ -8,8 +8,8 @@ cover: cryptocurrency.webp
<small>Chroni przed następującymi zagrożeniami:</small> <small>Chroni przed następującymi zagrożeniami:</small>
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-eye-outline: Masowa inwigilacja](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray} - [:material-close-outline: Cenzura](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray}
Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@@ -77,7 +77,7 @@ MySudo's virtual cards are currently only available via their iOS app.
<small>Chroni przed następującymi zagrożeniami:</small> <small>Chroni przed następującymi zagrożeniami:</small>
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-eye-outline: Masowa inwigilacja](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered).

View File

@@ -10,7 +10,7 @@ cover: real-time-communication.webp
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange}
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal}
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-eye-outline: Masowa inwigilacja](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
- [:material-account-cash: Kapitalizm inwigilacji](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} - [:material-account-cash: Kapitalizm inwigilacji](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
These recommendations for encrypted **real-time communication** are great for securing your sensitive communications. These instant messengers come in the form of many [types of communication networks](advanced/communication-network-types.md). These recommendations for encrypted **real-time communication** are great for securing your sensitive communications. These instant messengers come in the form of many [types of communication networks](advanced/communication-network-types.md).

View File

@@ -59,7 +59,7 @@ For more details about each project, why they were chosen, and additional tips o
![Tor Browser logo](assets/img/browsers/tor.svg){ align=left } ![Tor Browser logo](assets/img/browsers/tor.svg){ align=left }
**Tor Browser** (Desktop & Android) is the top choice if you need anonymity, as it provides you with access to the **Tor** network, a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. **Tor Browser** (Desktop & Android) is the top choice if you need anonymity, as it provides you with access to the **Tor** network, a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Osoby fizyczne i organizacje mogą również wymieniać się informacjami w sieci Tor za pomocą „ukrytych usług .onion”, nie narażając swojej prywatności. Dzięki temu, że ruch w sieci Tor jest trudny do zablokowania i namierzenia, Tor stanowi skuteczne narzędzie do omijania cenzury.
[Read Our Full Review :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Read Our Full Review :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary }

View File

@@ -1,8 +1,8 @@
--- ---
meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" meta_title: "Przeglądarka Tor Browser i sieć Tor: anonimowe przeglądanie Internetu Privacy Guides"
title: "Tor Browser" title: "Tor Browser"
icon: simple/torbrowser icon: simple/torbrowser
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. description: Chroń swoje przeglądanie Internetu przed ciekawskimi oczami, korzystając z sieci Tor — bezpiecznej sieci omijającej cenzurę.
cover: tor.webp cover: tor.webp
schema: schema:
- -
@@ -10,8 +10,8 @@ schema:
"@type": SoftwareApplication "@type": SoftwareApplication
name: Tor Browser name: Tor Browser
image: /assets/img/browsers/tor.svg image: /assets/img/browsers/tor.svg
url: https://torproject.org url: https://torproject.org/pl
sameAs: https://en.wikipedia.org/wiki/Tor_(network) sameAs: https://pl.wikipedia.org/wiki/Tor_(sieć_anonimowa)
applicationCategory: Web Browser applicationCategory: Web Browser
operatingSystem: operatingSystem:
- Windows - Windows
@@ -26,25 +26,25 @@ schema:
<small>Chroni przed następującymi zagrożeniami:</small> <small>Chroni przed następującymi zagrożeniami:</small>
- [:material-account-cash: Kapitalizm inwigilacji](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} - [:material-account-cash: Kapitalizm inwigilacji](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-eye-outline: Masowa inwigilacja](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray} - [:material-close-outline: Cenzura](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray}
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. **Tor** to sieć serwerów prowadzonych przez wolontariuszy, która pozwala na bezpłatne połączenie i zwiększenie prywatności oraz bezpieczeństwa w Internecie. Osoby fizyczne i organizacje mogą również wymieniać się informacjami w sieci Tor za pomocą „ukrytych usług .onion”, nie narażając swojej prywatności. Dzięki temu, że ruch w sieci Tor jest trudny do zablokowania i namierzenia, Tor stanowi skuteczne narzędzie do omijania cenzury.
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} [Szczegółowy przegląd sieci Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Film: Dlaczego warto korzystać z sieci Tor?](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}
<div class="admonition tip" markdown> <div class="admonition tip" markdown>
<p class="admonition-title">Porada</p> <p class="admonition-title">Porada</p>
Before connecting to Tor, please ensure you've read our [overview](advanced/tor-overview.md) on what Tor is and how to connect to it safely. We often recommend connecting to Tor through a trusted [VPN provider](vpn.md), but you have to do so **properly** to avoid decreasing your anonymity. Przed połączeniem się z siecią Tor zapoznaj się z naszym [przeglądem](advanced/tor-overview.md), wyjaśniającym czym jest Tor i jak bezpiecznie z niego korzystać. Często zalecamy łączenie się z Tor za pośrednictwem zaufanego [dostawcy VPN](vpn.md), ale należy zrobić to **prawidłowo**, aby nie obniżyć poziomu swojej anonimowości.
</div> </div>
There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. Istnieje kilka sposobów połączenia się z siecią Tor z urządzenia, z których najczęściej używaną jest przeglądarka **Tor Browser** fork Firefoksa stworzony z myślą o [:material-incognito: anonimowym](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} przeglądaniu Internetu na komputerach stacjonarnych i Androidzie.
Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. Niektóre aplikacje sprawdzają się lepiej niż inne; wybór zależy od Twojego modelu zagrożeń. Jeśli jesteś okazjonalnym użytkownikiem sieci Tor i nie obawiasz się, że Twój dostawca Internetu będzie gromadził dowody przeciwko Tobie, korzystanie z przeglądarek mobilnych, takich jak [Onion Browser](#onion-browser-ios), aby połączyć się z siecią Tor, jest w porządku. Zwiększenie liczby osób korzystających z sieci Tor na co dzień pomaga zmniejszyć negatywny stereotyp tej sieci i obniża wartość „list użytkowników Tor”, które mogą tworzyć ISP lub rządy.
If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. Jeżeli w Twojej sytuacji pełna anonimowość jest kluczowa, zalecamy **wyłącznie** korzystanie z klienta desktopowego Tor Browser, najlepiej w konfiguracji [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os). Przeglądarki mobilne są mniej popularne w sieci Tor (i w rezultacie łatwiejsze do zidentyfikowania), a inne konfiguracje nie są tak gruntownie testowane pod kątem deanonimizacji.
## Tor Browser ## Tor Browser
@@ -54,20 +54,20 @@ If more complete anonymity is paramount to your situation, you should **only** b
**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. **Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*.
[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:octicons-home-16: Strona główna](https://torproject.org/pl){ .md-button .md-button--primary }
[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Usługa onion" }
[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Dokumentacja" }
[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" }
[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" } [:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Wspomóż projekt" }
<details class="downloads" markdown> <details class="downloads" markdown>
<summary>Downloads</summary> <summary>Pobierz</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser)
- [:simple-android: Android](https://torproject.org/download/#android) - [:simple-android: Android](https://torproject.org/pl/download/#android)
- [:fontawesome-brands-windows: Windows](https://torproject.org/download) - [:fontawesome-brands-windows: Windows](https://torproject.org/pl/download)
- [:simple-apple: macOS](https://torproject.org/download) - [:simple-apple: macOS](https://torproject.org/pl/download)
- [:simple-linux: Linux](https://torproject.org/download) - [:simple-linux: Linux](https://torproject.org/pl/download)
</details> </details>