ignifugo
Translation approved |
|
ignifugo
Changes committed |
Changes committed
3 years ago
|
ignifugo
Changes committed |
Changes committed
3 years ago
|
ignifugo
Suggestion accepted |
|
ignifugo
Suggestion accepted |
|
ignifugo
Suggestion accepted |
|
ignifugo
Suggestion accepted |
|
ignifugo
Suggestion accepted |
|
ignifugo
Suggestion accepted |
|
ignifugo
Suggestion accepted |
|
ignifugo
Suggestion accepted |
|
ignifugo
Translation approved |
|
ignifugo
Changes committed |
Changes committed
3 years ago
|
ignifugo
Changes committed |
Changes committed
3 years ago
|
ignifugo
Suggestion accepted |
|
ignifugo
Suggestion accepted |
|
ignifugo
Suggestion accepted |
|
ignifugo
Suggestion accepted |
|
ignifugo
Suggestion accepted |
|
ignifugo
Suggestion accepted |
|
connection to Tor. As a consequence, the same technology can be used to hide
that you are using Tor if it could look suspicious to someone who monitors
your Internet connection.
connessione a Tor. Di conseguenza, la stessa tecnologia può essere utilizzata per nascondere
che stai utilizzando Tor se questo può sembrare sospetto a qualcuno che monitora
la tua connessione internet.