summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorchuchuyh <chuyh@bastardi.net>2015-07-22 09:12:52 -0300
committerchuchuyh <chuyh@bastardi.net>2015-07-22 09:12:52 -0300
commit3e8a05e98d423d906cbdd1585400523248a347a0 (patch)
tree0f208a39360a7c86051f290e182f7bfc7a18bc83
parent74e969217afadb7ec630313a7fe73d8a500c2004 (diff)
Update pt.text
-rw-r--r--pages/features/cryptography/pt.text20
1 files changed, 10 insertions, 10 deletions
diff --git a/pages/features/cryptography/pt.text b/pages/features/cryptography/pt.text
index d6f4324..1c56ff0 100644
--- a/pages/features/cryptography/pt.text
+++ b/pages/features/cryptography/pt.text
@@ -114,25 +114,25 @@ p((. Na verdade, o padrão da OpenVPN provavelmente é melhor que AES-128, desde
h3. obfsproxy
-Obfsproxy is optionally used to make VPN traffic not appear as VPN traffic to someone who is monitoring the network. Obfsproxy uses modules called pluggable transports to obfuscate underlying traffic. Different transports may or may not use encryption and have different implementation and choices over encryption schemes.
+O Obfsproxy é usado opcionalmente para fazer com que o tráfego VPN não se pareça com um tráfego VPN para alguém que estiver monitorando a rede. Obfsproxy usa módulos chamados 'pluggable transports' para ofuscar o tráfego oculto. Transportes diferentes podem ou não ser encriptados e possuem implementeções e escolhas de esquemas de encriptação diferentes.
-We have chosen the Scramblesuit pluggable transport that uses Uniform Diffie-Hellman for the initial handshake and AES-CTR 256 for application data.
+Escolhemos o 'pluggable transport' Scramblesuit, que usa Uniform Diffie-Hellman para o handshake inicial e AES-CTR 256 para os dados da aplicação.
-h2. Encrypted Email - OpenPGP
+h2. Email encriptado - OpenPGP
-The user's autogenerated key pair uses 4096 bit RSA for the master signing key.
+O par de chaves de usuário auto-gerados usam RSA de 4096 bit para a chave de assinatura mestra [master signing key].
-Bitmask will refuse to encrypt to a recipient's public key if the length is 1024 or less.
+O Bitmask não encriptará a chave pública de um destinatário se o seu comprimento for igual ou inferior a 1024 bit.
-All keys are stored in Soledad.
+Todas as chaves estão armazenadas na Soledad.
-Bitmask does not yet support ECC keys.
+O Bitmask ainda não suporta chaves ECC.
-Bitmask uses GnuPG. The python library we use is [[Isis's fork of python-gnupg => https://github.com/isislovecruft/python-gnupg]].
+O Bitmask usa GnuPG. A biblioteca em python que usamos é a [[ramificação Isis do python-gnupg => https://github.com/isislovecruft/python-gnupg]].
-h2. Secure Updates - TUF
+h2. Atualizações de Segurança - TUF
-The secure updates are done using [[TUF => http://theupdateframework.com/]], they use OpenSSL 4096 RSA keys with pyCrypto. There is three keys involved in the update process (root, targets and timestamp).
+As atualizações de segurança são feitas usando o [[TUF => http://theupdateframework.com/]], they use OpenSSL 4096 RSA keys with pyCrypto. There is three keys involved in the update process (root, targets and timestamp).
* The root key is used to certify the rest of the keys that lives in an offline storage and only gets used once per year to update the cerification or in case of rotation of another other key.
* The targets key is used to sign all the updates. This key is in the hands of the release manager and used on every release.