|
drebs
Translation approved |
|
|
drebs
Changes committed |
Changes committed
4 years ago
|
|
drebs
Changes committed |
Changes committed
4 years ago
|
|
drebs
Suggestion accepted |
|
|
drebs
Translation approved |
|
|
drebs
Changes committed |
Changes committed
4 years ago
|
|
drebs
Changes committed |
Changes committed
4 years ago
|
|
drebs
Suggestion accepted |
|
|
drebs
Translation approved |
|
|
drebs
Changes committed |
Changes committed
4 years ago
|
|
drebs
Suggestion accepted |
|
|
drebs
Translation approved |
|
|
drebs
Changes committed |
Changes committed
4 years ago
|
|
drebs
Suggestion accepted |
|
|
drebs
Translation added |
|
|
drebs
Translation added |
|
|
drebs
Translation approved |
|
|
drebs
Translation added |
|
|
drebs
Translation added |
|
|
drebs
Translation added |
|
connection to Tor. As a consequence, the same technology can be used to hide
that you are using Tor if it could look suspicious to someone who monitors
your Internet connection.
aocamuflarndo sua conexãode um modo que não possa serpara que ela não seja reconhecida como umaconexão
Tor. Desse modà rede Tor. Por isso, essa mesma tecnologia pode ser usada para esconder o fato de que vocêestá usando Tor, caso isso possa parecer suspeito para alguém que monitore sua
conexão a internet.