Add-ons, extensies, en plug-ins zijn componenten die toegevoegd kunnen worden aan web browsers om hen nieuwe features te geven. Tor Browser comes with one add-on installed: NoScript. Je moet geen extra add-ons aan Tor Browser toevoegen, omdat dat sommige privacyfeatures in gevaar kan brengen.

Anti-virus software wordt gebruikt voor het voorkomen, detecteren, en verwijderen van kwaadaardige software. Anti-virus software kan bemoeien met Tor op uw computer. Mogelijk moet u de documentatie van uw anti-virus software moeten raadplegen als u niet weet hoe je Tor moet toestaan.

Een webapplicatie (web app) is een applicatie dat de client draait in een webbrowser. App kan ook verwijzen naar software dat je installeert op mobiele besturingssystemen.

Atlas is een webapplicatie om te leren over momenteel actieve Tor relays.

Om van een relay haar doorvoer te bepalen, nemen speciale relays genaamd bandbreedte autoriteiten periodieke metingen van de relays in de consensus.

Vingerafdrukking is het proces waarbij informatie wordt verzamelt over een apparaat of service, zodat zo nauwkeurig mogelijk de identiteit of kenmerken in te schatten. Uniek gedrag of reacties kunnen worden gebruikt om het apparaat te identificeren of service te analyseren. Tor Browser voorkomt vingerafdrukken.

Browsergeschiedenis is een lijst met aanvragen gemaakt terwijl een webbrowser wordt gebruikt, en bevat informatie zoals de bezochte website en wanneer. Tor Browser verwijdert browsergeschiedenis nadat u uw sesie heeft gestopt.

Net als ordinaire Tor relays, bruggen worden beheert door vrijwilligers; echter in tegenstelling tot ordinaire relays, worden deze niet publiekelijk vermeld, zodat een tegenstander deze niet gemakkelijk kan identificeren. Pluggable Transports zijn een bruggenoort welke helpen met het verbergen van het feit dat je Tor gebruikt.

Een speciale relay dat de lijst met bruggen onderhoudt.

A short, four emoji visualization which can be used to identify the right bridge address at a glance.

Brug-mojis zijn door mensen leesbare brugidentificatiemiddelen en vertegenwoordigen niet de kwaliteit van de verbinding met het Tor-netwerk of de status van de brug.

De string van emoji-karakters kan niet worden gebruikt als invoer. Gebruikers zijn verplicht om het volledige brugadres aan te bieden om te kunnen verbinden met een brug.

Captcha's zijn een uitdagingstest die gebruikt worden om te bepalen of de gebruiker menselijk is of niet. Tor gebruikers worden vaak Captcha's verzocht omdat Tor relays veel aanvragen maakt, waardoor sommige sites het lastig vinden om te bepalen of deze aanvragen van mensen komen of van robots.

Spelling notes:

Alleen de eerste letter is een hoofdletter, want Captcha wordt beschouwd als een zelfstandig naamwoord

Een pad door het Tornetwerk gebouwd door clients die bestaan uit willekeurig geselecteerde punten. Het circuit begint met een brug of een guard. De meeste circuits bestaan uit drie punten - een guard of brug, een middel relay, en een uitgang. De meeste onion services gebruiken zes sprongen in een circuit (met de uitzondering van enkele onion services), en nooit een uitgangspunt. U kunt uw huidige Torcircuit bekijken door te klikken op de [i] op de adresbalk.

In Tor, een client is een punt in het Tornetwerk, die meestal beheert wordt names een gebruiker, dat de applicatieverbinding leidt over een reeks van relays.

Compass is een webapplicatie om in bulk te leren over actieve Tor relays.

The Connection Test in Tor Browser can test and inform the user about the state of their Internet connection and connection to the Tor network.

In Tor-termen, een enkel document gecompileerd en gestemd op door de map autoriteiten eens per uur, dat ervoor zorgt dat alle clients dezelfde informatie over relays hebben dat samen het Tornetwerk omvat.

Checksums zijn hash waarden van bestanden. Als je software hebt gedownload zonder fouten, is de gegeven checksum van de bestanden identiek.

Cross-Site Scripting (XSS) geeft een aanvaller de mogelijkheid om kwaadaardige functionaliteit of gedrag aan een website toe te voegen, wanneer ze de mogelijkheid niet zou moeten hebben.

Een cryptografische signatuur bewijst de authenticiteit van een bericht of bestand. Het wordt gemaakt door de eigenaar van het privé gedeelte van een publieke sleutel cryptografie steutelpaar en kan geverifieerd worden met de bijbehorden publieke sleutel. Als u software download van torproject.org, kunt u signatuursbestanden (.asc) vinden. Deze zijn PGP signaturen, zodat u kunt verifiëren dat het bestand dat u heeft gedownload ook daadwerkelijk het bestand is dat we willen dat u ontvangt. For more information, see how you can verify signatures.

Een daemon is een computerprogramma dat actief is als een achtergrondsprocess, ander dan direct onder controle van een gebruiker.

Gevarenzone converteert elk document (zelfs pdf) naar pdf, wanneer het document potentieel gevaarlijk is of van een onbetrouwbare bron komt. Dit wordt gedaan door de pdf om te zetten naar ruwe pixelgegevens en dan weer terug naar pdf.

Een speciale relay dat een lijst met actieve relays onderhoudt en periodiek een consensus publiceert samen met de andere directory authoriteiten.

Domain fronting is a censorship circumvention technique which masks the site you are connecting to. From the perspective of a censor, it appears like you are connecting to a major service which would be costly for a censor to block, like Microsoft or Google. However, it does not make you anonymous, or completely hide your destination like Tor Browser does. For more information see this blogpost about domain fronting.

Spelling notes:

No need to capitalize.

Translation notes:

You can translate this term if it sounds better on your language.

Transmitted data which is encrypted directly from origin to destination is called end-to-end encryption. This helps ensure the data or message being sent is only read by the sending and receiving party.

De ExoneraTor service onderhoudt een database van relay IP-adressen dat deel hebben uitgemaakt van het Tornetwerk. Het antwoord de vraag of een Tor relay op dat moment op een bepaald IP-adres actief was. Deze service is vaak handig tijdens het omgaan met overheidsinstanties.

F-Droid is een repository van FOSS (vrije en open bron software) toepassingen voor Android. Net als in Google Play kan men bladeren, installeren en updates bijhouden op het toestel met F-Droid. Tor Browser is beschikbaar op F-Droid. Volg deze stappen als u liever de app installeert via F-Droid.

Mozilla Firefox is een vrije en open-source web browser ontwikkelt door de Mozilla Foundation en haar dochteronderneming, de Mozilla Corporation. Tor Browser is gebouwd uit een bewerkte versie van Firefox ESR (Verlengde Ondersteunings Release). Firefox is beschikbaar voor de Windows, macOS en Linux besturingssystemen, met de mobiele variant beschikbaar op Android en iOS.

Een firewall is een netwerksbeveilingssysteem dat het inkomende en uitgaande netwerkverkeer bewaakt en controleert. Dit verkeersfilter is gebaseerd op vooraf bepaalde regels. Een firewall brengt meestal een barrière tot stand tussen een vertrouwde, veilige interne netwerk en een ander buitenstaande netwerk. Een firewall kan echter ook gebruikt worden als content filter om censuur te dwingen. Sommige mensen ervaren problemen tijdens het verbinden met Tor omdat hun firewall Torverbindingen blokkeert. U kunt uw firewall opnieuw instellen of uitschakelen en Tor opnieuw opstarten om dit te testen.

Flash Player is a browser plugin for Internet applications to watch audio and video content. You should never enable Flash to run in Tor Browser as it is unsafe. Many services that use Flash also offer an HTML5 alternative, which should work in Tor Browser.

FTE (format-transforming encryption) is een pluggable transport dat Tor-verkeer vermomt als gewoon webverkeer (HTTP).

GetTor is a service that automatically responds to messages (Email, Telegram) with links to the latest version of Tor Browser, hosted at a variety of locations, such as Dropbox, Google Drive and GitHub.

Spelling notes:

The second T is capitalized when possible: GetTor.

Translation notes:

Do not translate.

Het Tor Project neemt deel aan de Google Summer of Code, een zomerprogramma voor universiteitsstudenten.

Het Tor Project neemt deel aan het Google Season of Docs, een programma voor technische schrijvers.

Het is een icoon met drie horizontale lijnen, meestal in de linkerboven- of rechterbovenhoek van het scherm. Door op het pictogram te klikken of te tikken, verschijnt er een menu met opties of extra pagina's.

Referentie: https://en.wikipedia.org/wiki/Hamburger_button

hamburger-menu

Een cryptografische hashwaarde is het resultaat van een wiskundig algoritme dat gegevens omzet in een bitreeks van een vaste grootte. Het is ontworpen als eenrichtingsfunctie, wat betekent dat de waarde gemakkelijk te berekenen is in één richting, maar onuitvoerbaar is om te keren. Hashwaarden dienen om de integriteit van gegevens te verifiëren.

A hashring is a distributed structure used to store a set of keys and associated values. In the case of Tor, the keys are generally derived from the name of an onion service, and the values are information a client needs to connect to that service.

Spelling notes:

Note that this is not hashing.

Translation notes:

Do not translate this term.

The Tor Project can refer to either The Tor Project Inc, a 501(c)3 US nonprofit responsible for maintaining the Tor software, or the Tor Project community made up of thousands of volunteers from all over the world who help create Tor.

The Hypertext Transfer Protocol (HTTP) is a channel used to send files and data between devices on a network. Originally used to transfer only web pages, it is now relied upon to deliver many forms of data and communication.

Hypertext Transfer Protocol Secure is the encrypted version of the HTTP channel used to transfer files and data between devices on a network.

HTTPS Everywhere is a Firefox, Chrome, and Opera extension that makes HTTPS the default on websites that have set up HTTPS but have not made it the default. HTTPS Everywhere is installed in Tor Browser for Android.

Since Tor Browser 11.5, HTTPS-Only Mode is enabled by default for desktop, and HTTPS Everywhere is no longer bundled with Tor Browser.

An Internet service provider (ISP) is an organization that provides services for accessing and using the Internet. When using Tor Browser, your ISP cannot see what websites you're visiting.

An Internet Protocol address (IP address) is a numerical (or alpha-numeric in the case of IPv6) label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. The IP address is the location address of the device, similar to the addresses of physical locations. Tor Browser obscures your location by making it look like your traffic is coming from an IP address that is not your own.

JavaScript is a programming language that websites use to offer interactive elements such as video, animation, audio, and status timelines. Unfortunately, JavaScript can also enable attacks on the security of the web browser, which might lead to deanonymization. The NoScript extension in Tor Browser can be used to manage JavaScript on different websites.

Letterboxing is a Tor Browser feature that conceals a user's real window size from websites. It achieves this by adding margins to the browser window. The feature helps prevent fingerprinting users based on their window or screen size.

"little-t tor" is one way of referring to tor the network daemon, as opposed to Tor Browser or Tor Project.

These pluggable transports all make it look like you are browsing a major web site instead of using Tor. Meek-azure makes it look like you are using a Microsoft web site.

MetricsPort provides an interface to the underlying Tor relay metrics. It is used mainly by Tor relay operators to gather metrics and other relevant information in order to diagnose problems and bottlenecks, or to monitor the relay's performance.

For more information please read the MetricsPort section on the article about overloaded relays.

Translation notes:

Do not translate.

The middle position in the Tor circuit. Non-exit relays can function as either a "middle" or a "guard" for different users.

Moat is an interactive tool you can use to get bridges from within Tor Browser. It uses domain fronting to help you circumvent censorship. Moat also employs a Captcha to prevent a censor from quickly blocking all of the bridges.

Click here, to read more about using moat in the Tor Browser manual.

Sometimes the direct access to the Tor network is blocked by your Internet Service Provider (ISP) or by a government. Tor Browser includes some circumvention tools for getting around these blocks, including bridges, pluggable transports, and GetTor.

This option is useful if the exit you are using is unable to connect to the website you require, or is not loading it properly. Selecting it will cause the currently active tab or window to be reloaded over a new Tor circuit. Other open tabs and windows from the same website will use the new circuit as well once they are reloaded. This option does not clear any private information or unlink your activity, nor does it affect your current connections to other websites.

New Identity is a Tor Browser feature if you want to prevent your subsequent browser activity from being linkable to what you were doing before. Selecting it will close all your open tabs and windows, clear all private information such as cookies and browsing history, and use New Tor circuits for all connections. Tor Browser will warn you that all activity and downloads will be stopped, so take this into account before clicking "New Identity" (accessible through the small sparkly broom icon at the top-right of the screen). New Identity can also help if Tor Browser is having trouble connecting to a particular site, similarly to "New Tor Circuit for this Site".

Tor Browser includes an add-on called NoScript, accessed by clicking the hamburger menu ("≡") at the top-right of the screen, then navigating to "Add-ons and themes". NoScript allows you to control the JavaScript that runs on individual web pages, or to block it entirely.

The anonymizing relay monitor (formerly arm, now nyx) is a terminal status monitor for Tor, intended for command-line usage. This is a tool for monitoring the core Tor process on a system, often useful for relay operators.

Obfs3 is a pluggable transport that makes Tor traffic look random, so that it does not look like Tor or any other protocol. Obfs3 is not supported anymore.

Obfs4 is a pluggable transport that makes Tor traffic look random like obfs3, and also prevents censors from finding bridges by Internet scanning. Obfs4 bridges are less likely to be blocked than obfs3 bridges.

An iOS app which is open source, uses Tor routing, and is developed by someone who works closely with the Tor Project. Learn more about Onion Browser

Translation notes:

Project name. Do not translate "Onion", however you can translate "Browser". Ex: Navegador Onion.

Onion services (formerly known as "hidden services") are services (like websites) that are only accessible through the Tor network. Onion services offer advantages over ordinary services on the non-private web, including: location hiding, end-to-end authentication, end-to-end encryption, and NAT punching.

An onion site is websites that is only accessible via Tor. Although similar in meaning to onion service, but, onion site refers exclusively to websites. These websites use the .onion Top Level Domain (TLD).

A standardized Internet domain name used by onion services that end in .onion and is designed to be self-authenticating.

Translation notes:

Can be partially or totally translated, i.e. for Spanish 'dirección cebolla' or 'dirección onion'. But be careful when translating, because the actual onion addresses finish with .onion, in English.

Onion-Location is a non-standard HTTP header that websites can use to advertise their onion counterpart. If the website that you are visiting has an onion site available, a purple suggestion pill will prompt at the URL bar in Tor Browser displaying ".onion available". When you click on ".onion available", the website will be reloaded and redirected to its onion counterpart.

Translation notes:

Do not translate.

Onionoo is a web-based protocol to learn about currently running Tor relays and bridges. Onionoo provides the data for other applications and websites (metrics.torproject.org) which in turn present Tor network status information to humans.

The set of available onion services. For example, you can say "my site is in onionspace" instead of "my site is in the Dark Web."

OONI stands for "Open Observatory of Network Interference", it is a global observation network for detecting censorship, surveillance and traffic manipulation on the internet.

The main system software that manages computer hardware and software resources and provides common services for computer programs. The most used desktop operating systems are Windows, macOS and Linux. Android and iOS are the dominant mobile operating systems.

Orbot is a free app from The Guardian Project that empowers other apps on your device to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and hide it by bouncing through a series of computers around the world.

Orfox was first released 23 September 2015 by The Guardian Project. In de volgende drie jaren, verbeterde Orfox steeds en werd een populaire manier om met meer privacy te surfen dan de standard browsers, en Orfox was een cruciale hulp voor mensen die censuur omzeilden en toegang te geven tot geblokkeerde sites en kritieke bronnen. It was installed over 14 million times, and maintained over 1 million active users.

Orfox is no longer maintained or supported. It has been replaced by Tor Browser for Android. Read more about Orfox.

Translation notes:

Do not translate this application name.

Tools that Tor can use to disguise the traffic it sends out. This can be useful in situations where an Internet Service Provider (ISP) or other authority is actively blocking connections to the Tor network.

The private portion of a public/private key pair. This is the key that must be kept private, and not disseminated to others.

A proxy is a middle man between a client (like a web browser) and a service (like a web server). Instead of connecting directly to the service, a client sends the message to the proxy. The proxy makes the request on behalf of the client, and passes the response back to the client. The service only communicates with and sees the proxy.

The public portion of a public/private key pair. This is the key that can be disseminated to others.

A public-key cryptography system uses pairs of mathematical keys. The public key can be disseminated widely while its corresponding private key is known only by the owner of the key pair. Any person can encrypt a message using the public key of the receiver but only the receiver in possession of the private key is able to decrypt the message. Additionally, the private key can be used to create a signature to prove the identity of the creator of a message or other files. This signature can be verified by the public key.

In public key cryptography, a public key fingerprint is a sequence of bytes that is used to identify and authenticate a corresponding longer public key.

A publicly-listed node in the Tor network that forwards traffic on behalf of clients, and that registers itself with the directory authorities.

It is an add-on for the Chrome or Chromium browsers that allows you to download several security and privacy programs, including Tor Browser, from different sources.

ScrambleSuit is similar to the obfs4 pluggable transport but has a different set of bridges.

Element used for offering dynamic/interactive content via websites.

Secure sockets layer (SSL) is a standard Internet security protocol that is used to secure an internet connection and protect sensitive data being transmitted between two systems. SSL encrypts data that is being transferred, preventing third parties from accessing the data as it is being sent.

The specialized address format of onion addresses is self-authenticating. The format automatically guarantees that the onion address is bound to the key used to protect connections to the onion site. Ordinary internet domain names require site owners to trust and be approved by a Certificate Authority (CA) for this binding, and they are subject to hijack by the CA and typically by many other parties as well.

A device on a network that offers a service, such as file and web page storage, email or chat.

A session refers to a conversation between two devices communicating on a network. Using Tor Browser means that your session data will be wiped when you close the web browser.

A single onion service is an onion service that can be configured for services that do not require anonymity, but want to offer it for clients connecting to their service. Single onion services use only three hops in the circuit rather than the typical six hops for onion services.

Quickstart connects Tor Browser to the Tor Network automatically when launched, based on the last used connection settings.

Snowflake is a pluggable transport which provides censorship circumvention and access to a free and open internet. It has three components; the Snowflake client, the Snowflake proxy (the two together known as the Snowflake peers) and the broker. Snowflake can allow an open browser tab to act as an ephemeral Tor bridge. In order to prevent the blocking of proxy IP addresses, Snowflake involves a large number of volunteer proxies, which also makes them hard to pin point.

SOCKS5 is an Internet protocol used by Tor. It sends the traffic through the Tor network instead of sending it from your IP address into the open network. It is a general purpose proxy that sits at the layer 5 of the OSI model and uses the tunneling method. The applications that you run with SOCKS5 will be aware of the tunneling, but you can prevent identity correlation if set up correctly.

Spelling notes:

All in caps, as it is an acronym.

In Tor-termen verwijst een "hop" naar het verkeer tussen de relays in een kanaal.

Stem is a Python (programming language) controller library for core Tor. If you want to control core Tor with python, this is for you.

The Sybil attack in computer security is an attack wherein a reputation system is subverted by creating a large number of identities, and using them to gain a disproportionately large influence in the network.

Tails is a "live" operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims to preserve your privacy and anonymity. Learn more about Tails.

The Guardian Project is a group of software developers, activists and designers that create easy to use, secure, opensource mobile apps and operating system enhancements. The Orbot app provided by The Guardian Project helps route other apps on your android device over the Tor network.

Most websites use numerous third-party services, including advertising and analytics trackers, which collect data about your IP address, web browser, system and your browsing behavior itself, all of which can link your activity across different sites. Tor Browser prevents a lot of this activity from happening.

Tor is a program you can run on your computer that helps keep you safe on the Internet. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. This set of volunteer relays is called the Tor network. Sometimes the software associated with this network is called Core Tor, and sometimes "little-t tor". The way most people use Tor is with Tor Browser which is a version of Firefox that fixes many privacy issues.

Tor Browser uses the Tor network to protect your privacy and anonymity. Your internet activity, including the names and addresses of the websites you visit, will be hidden from your Internet Service Provider (ISP) and anyone watching your connection locally. The operators of the websites and services that you use, and anyone watching them, will see a connection coming from the Tor network instead of your real (IP) address, and will not know who you are unless you explicitly identify yourself. In addition, Tor Browser is designed to prevent websites from "fingerprinting" or identifying you based on your browser configuration. By default, Tor Browser does not keep any browsing history. Cookies are only valid for a single session (until Tor Browser is exited or a New Identity is requested).

Spelling notes:

Tor Browser. Sometimes also mentioned as tbb. Not 'TOR Browser'.

Translation notes:

Do not translate "Tor", however you can translate "Browser". Example in Spanish: Navegador Tor (altering the order because is more natural like that in Spanish.) Some languages such as Arabic transliterate the word Tor, تور. That is, they write Tor with other characters.

When you run Tor Browser for the first time, you see the Tor Launcher window. It offers you the option to connect directly to the Tor network, or to configure Tor Browser for your connection. In the second case, Tor Launcher will take you through a series of configuration options.

Tor launcher is no longer used in Tor Browser since the 10.5 release.

Translation notes:

Do not translate or transliterate.

"Tor log" is an automatically-generated list of Tor's activity that can help diagnose problems. When something goes wrong with Tor, you may see an option with the error message to "copy Tor log to clipboard". You should see an option to copy the log to your clipboard, which you can then paste to a document to show whoever is helping you troubleshoot.

If you don't see this option and you have Tor Browser open, you can navigate to the hamburger menu ("≡"), then click on "Settings", and finally on "Connection" in the side bar. Klik onderaan de pagina naast de tekst "Bekijk de Tor-logs" op de knop "Logs weergeven...".

Tor Messenger was a cross-platform chat program that aimed to be secure by default and send all of its traffic over Tor. Tor Messenger is not in development anymore. It supported Jabber (XMPP), IRC, Google Talk, Facebook Chat, Twitter, Yahoo, and others; enabled Off-the-Record (OTR) Messaging automatically; and had an easy-to-use graphical user interface localized into multiple languages.

Tor Metrics (.onion) archives historical data about the Tor ecosystem, collects data from the public Tor network and related services, and assists in developing novel approaches to safe, privacy preserving data collection.

Tor2web is a project to let users access onion services without using the Tor Browser. NOTE: This is not as safe as connecting to the onion services via Tor Browser, and will remove all Tor-related protections the client would otherwise have.

This extension configures Thunderbird to make connections over Tor.

Torsocks allows you to use many applications in a safer way with Tor. It ensures that DNS requests are handled safely and explicitly rejects any traffic other than TCP from the application you're using.

TPI is an acronym for The Tor Project, Inc.

People on IRC often use tpo to abbreviate torproject.org when writing hostnames. For example, blog.tpo is an abbreviation for blog.torproject.org.

Traffic is the data sent and received by clients and servers.

De laatste relay in het Torcircuit dat verkeer verstuurt op het publieke Internet. De service waarmee u verbind (website, chat service, e-mailaanbieder etc.) zal het IP-adres van de uitgangsrelay zien.

A feature in Tor Browser that when required will offer to automatically apply the bridge configuration which works best in the user's location.

Translation notes:

See how it appears on your language's Tor Browser. Keep in English if there is no version of Tor Browser in your language at https://support.torproject.org/tbb/tbb-37/

Voormalige naam voor "onion services", soms nog in gebruik in Tor documentatie of communicatie.

Het proces waarbij een stukje informatie geklauterd wordt in een geheime code dat alleen gelezen kan worden door de ontvangen. Tor gebruikt drie lagen van versleuteling in het Torcircuit; elke relay ontsleuteld één laag voordat het wordt doorgestuurd naar de volgende relay.

Het eerste relais in de Tor-schakeling, tenzij u een brug gebruikt. Als u een brug gebruikt, neemt de brug de plaats in van de wachter. To learn more about this type of relays, please read What are Entry Guards?

A web browser (commonly referred to as a browser) is a software application for retrieving, presenting, and browsing information resources on the World Wide Web. Major web browsers include Firefox, Chrome, Internet Explorer, and Safari.

A website mirror is a one-to-one copy of a website that you can find under other web addresses. A current list of torproject.org mirrors is available at https://www.torproject.org/getinvolved/mirrors.html.en.