From a58b5811aa1fdf0c079c3656f58a997d9ac1f160 Mon Sep 17 00:00:00 2001 From: Samuel Shifterovich Date: Sun, 25 Nov 2018 20:39:23 +0100 Subject: [PATCH] i18n proof of concept --- _data/lang/en/kdl.json | 5 +++++ _data/lang/it/kdl.json | 4 ++++ _includes/content/kdl.md | 6 ++++++ i18ntest.html | 12 ++++++++++++ 4 files changed, 27 insertions(+) create mode 100644 _data/lang/en/kdl.json create mode 100644 _data/lang/it/kdl.json create mode 100644 _includes/content/kdl.md create mode 100644 i18ntest.html diff --git a/_data/lang/en/kdl.json b/_data/lang/en/kdl.json new file mode 100644 index 00000000..f842315c --- /dev/null +++ b/_data/lang/en/kdl.json @@ -0,0 +1,5 @@ +{ + "title": "Key Disclosure Law", + "subtitle": "Who is required to hand over the encryption keys to authorities?", + "description": "Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.\n\nSteganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data)." +} \ No newline at end of file diff --git a/_data/lang/it/kdl.json b/_data/lang/it/kdl.json new file mode 100644 index 00000000..6d526bcd --- /dev/null +++ b/_data/lang/it/kdl.json @@ -0,0 +1,4 @@ +{ + "title": "Key Disclosure Law (but in Italian)", + "description": "Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.\n\nSteganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data). (but in Italian)" +} \ No newline at end of file diff --git a/_includes/content/kdl.md b/_includes/content/kdl.md new file mode 100644 index 00000000..3564fa07 --- /dev/null +++ b/_includes/content/kdl.md @@ -0,0 +1,6 @@ +{% assign lang = site.data.lang.[include.lang].kdl %} +{% assign english = site.data.lang.en.kdl %} + +# {{ lang.title | default: english.title }} +## {{ lang.subtitle | default: english.subtitle }} +{{ lang.description | default: english.description }} \ No newline at end of file diff --git a/i18ntest.html b/i18ntest.html new file mode 100644 index 00000000..28c3cb44 --- /dev/null +++ b/i18ntest.html @@ -0,0 +1,12 @@ +--- +layout: default +--- + +
+ +{% capture kdl %} + {% include content/kdl.md lang="it" %} +{% endcapture %} +{{ kdl | markdownify }} + +
\ No newline at end of file