Glosario
Get familiar with terms and expressions used in our work and privacy enhancing technologies in general.
Add-ons, extensions, and plugins are components that can be added to web browsers to give them new features. Tor Browser comes with one add-on installed: NoScript. No deberías instalar más complementos en el Navegador Tor, ya que puedes comprometer tu privacidad.
A web application (web app), is an application that the client runs in a web browser. App can also refer to software that you install on mobile operating systems.
Una característica en el Navegador Tor que cuando se requiere ofrecerá aplicar automáticamente la configuración de puentes que funcione mejor en la ubicación del usuario.
Translation notes: See how it appears on your language's Tor Browser. Keep in English if there is no version of Tor Browser in your language.
El ataque Sybil en la seguridad informática es un ataque en el que se subvierte un sistema de reputación creando un gran número de identidades y utilizándolas para obtener una influencia desproporcionadamente grande en la red.
Atlas is a web application to learn about currently running Tor relays.
A special-purpose relay that maintains the list of bridges.
Secure sockets layer (SSL) is a standard Internet security protocol that is used to secure an internet connection and protect sensitive data being transmitted between two systems. SSL encrypts data that is being transferred, preventing third parties from accessing the data as it is being sent.
Los Captchas son una prueba de desafío-respuesta utilizada en la computación para determinar si el usuario es o no humano. Tor users are often served Captchas because Tor relays make so many requests that sometimes websites have a hard time determining whether or not those requests are coming from humans or bots.
Spelling notes: Only capitalize first letter, as Captcha is now considered a noun.
Sometimes the direct access to the Tor network is blocked by your Internet Service Provider (ISP) or by a government. Tor Browser includes some circumvention tools for getting around these blocks, including bridges, pluggable transports, and GetTor.
Transmitted data which is encrypted directly from origin to destination is called end-to-end encryption. This helps ensure the data or message being sent is only read by the sending and receiving party.
A path through the Tor network built by clients consisting of randomly selected nodes. The circuit begins with either a bridge or a guard. Most circuits consist of three nodes - a guard or bridge, a middle relay, and an exit. Most onion services use six hops in a circuit (with the exception of single onion services), and never an exit node. You can view your current Tor circuit by clicking on the [i] on the URL bar.
The private portion of a public/private key pair. Esta es la clave que debe mantenerse en privado, y no dar a otros.
The public portion of a public/private key pair. Esta es la clave que se envía a otras personas.
Compass is a web application to learn about currently running Tor relays in bulk.
In Tor terms, a single document compiled and voted on by the directory authorities once per hour, ensuring that all clients have the same information about the relays that make up the Tor network.
An HTTP cookie (also called web cookie, Internet cookie, browser cookie or simply cookie) is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing. By default, Tor Browser does not store cookies.
Un sistema de criptografía de clave pública utiliza pares de claves matemáticas. The public key can be disseminated widely while its corresponding private key is known only by the owner of the key pair. Any person can encrypt a message using the public key of the receiver but only the receiver in possession of the private key is able to decrypt the message. Additionally, the private key can be used to create a signature to prove the identity of the creator of a message or other files. Se puede verificar esta firma con la clave pública.
Cross-Site Scripting (XSS) permite a un atacante añadir funcionalidad o comportamiento malicioso a un sitio web cuando no debería tener la capacidad de hacerlo.
Dangerzone convierte cualquier documento (incluso pdf) a pdf, cuando el documento es potencialmente peligroso o proviene de una fuente no fiable. Esto se hace convirtiendo el pdf a formato imágen y volviéndolo a convertir a pdf.
Un demonio (daemon) es un programa de ordenador que se ejecuta como un proceso en segundo plano, en lugar de estar bajo el control directo de un usuario.
The specialized address format of onion addresses is self-authenticating. The format automatically guarantees that the onion address is bound to the key used to protect connections to the onion site. Ordinary internet domain names require site owners to trust and be approved by a Certificate Authority (CA) for this binding, and they are subject to hijack by the CA and typically by many other parties as well.
Una dirección de Protocolo de Internet (dirección IP) es una etiqueta numérica (o alfanumérica en el caso de IPv6) asignada a cada dispositivo (por ejemplo, ordenador, impresora) que participa en una red de ordenadores que utiliza el Protocolo de Internet para comunicarse. La dirección IP es la dirección de ubicación del dispositivo, similar a las direcciones de las ubicaciones físicas. Tor Browser obscures your location by making it look like your traffic is coming from an IP address that is not your own.
A standardized Internet domain name used by onion services that end in .onion and is designed to be self-authenticating.
Translation notes: Can be partially or totally translated, i.e. for Spanish 'dirección cebolla' or 'dirección onion'. But be careful when translating, because the actual onion addresses finish with .onion, in English.
El Proyecto Tor se puede referir a The Tor Project Inc, una organización 501(c)3 sin ánimo de lucro de los EE.UU. responsable del mantenimiento del software Tor, o a la comunidad alrededor de Tor Project formada por miles de voluntarios de todo el mundo que ayudan a crear Tor.
El enmascaramiento de dominio es una técnica de evasión de la censura que disfraza el sitio al que estás conectando. Desde la perspectiva de un censor, aparece como que estás conectando a un servicio importante, que sería problemático bloquear para el censor, como Microsoft o Google. However, it does not make you anonymous, or completely hide your destination like Tor Browser does. Para más información mire esto entrada de blog sobre enmascaramiento de dominio.
Spelling notes: No need to capitalize.
Translation notes: You can translate this term if it sounds better on your language.
The set of available onion services. For example, you can say "my site is in onionspace" instead of "my site is in the Dark Web."
The ExoneraTor service maintains a database of relay IP addresses that have been part of the Tor network. It answers the question of whether there was a Tor relay running on a given IP address on a given date. This service is often useful when dealing with law enforcement.
F-Droid es un repositorio de aplicaciones FOSS (software libre y de código abierto) para Android. Al igual que en Google Play, puedes ver una lista de aplicaciones, instalarlas y mantenerlas actualizadas, en el dispositivo que usa F-Droid. Tor Browser is available on F-Droid. Follow these steps if you prefer installing the app through F-Droid.
Mozilla Firefox is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. Tor Browser is built from a modified version of Firefox ESR (Extended Support Release). Firefox is available for Windows, macOS and Linux operating systems, with its mobile version available for Android and iOS.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic. This traffic filter is based on predetermined rules. A firewall typically establishes a barrier between a trusted, secure internal network and another outside network but it can also be used as a content filter in the sense of censorship. Sometimes people have trouble connecting to Tor because their firewall blocks Tor connections. You can reconfigure or disable your firewall and restart Tor to test this.
A cryptographic signature proves the authenticity of a message or file. It is created by the holder of the private portion of a public key cryptography key pair and can be verified by the corresponding public key. If you download software from torproject.org, you will find it as signature files (.asc). These are PGP signatures, so you can verify that the file you have downloaded is exactly the one that we intended you to get. For more information, see how you can verify signatures.
Flash Player is a browser plugin for Internet applications to watch audio and video content. You should never enable Flash to run in Tor Browser as it is unsafe. Many services that use Flash also offer an HTML5 alternative, which should work in Tor Browser.
FTE (format-transforming encryption) was a pluggable transport that disguised Tor traffic as ordinary web (HTTP) traffic. Ya no se usa.
Translation notes: Do not translate.
GetTor is a service that automatically responds to messages (Email, Telegram) with links to the latest version of Tor Browser, hosted at a variety of locations, such as Dropbox, Google Drive and GitHub.
Spelling notes: The second T is capitalized when possible: GetTor.
Translation notes: Do not translate.
El Proyecto Tor participa en el Google Summer of Code, que es un programa de verano para estudiantes universitarios.
El Proyecto Tor participa en el Google Season of Docs, que es un programa para autores de documentación técnica.
The first relay in the Tor circuit, unless using a bridge. When using a bridge, the bridge takes the place of the guard. To learn more about this type of relays, please read What are Entry Guards?.
A cryptographic hash value is the result of a mathematical algorithm that maps data to a bit string of a fixed size. It's designed as one-way-function which means the value is easy to calculate in one direction but infeasible to invert. Hash values serve to verify the integrity of data.
Un hashring es una estructura distribuida utilizada para almacenar un conjunto de claves y valores asociados. En el caso de Tor, las claves se derivan generalmente del nombre de un servicio de Onion, y los valores son información que un cliente necesita para conectarse a ese servicio.
Spelling notes: Note that this is not hashing.
Translation notes: Do not translate.
A browser history is a record of requests made while using a web browser, and includes information like websites visited and when. Tor Browser deletes your browsing history after you close your session.
The Hypertext Transfer Protocol (HTTP) is a channel used to send files and data between devices on a network. Originally used to transfer only web pages, it is now relied upon to deliver many forms of data and communication.
Hypertext Transfer Protocol Secure is the encrypted version of the HTTP channel used to transfer files and data between devices on a network.
HTTPS Everywhere is a Firefox, Chrome, and Opera extension that makes HTTPS the default on websites that have set up HTTPS but have not made it the default. HTTPS Everywhere está instalado en el Navegador Tor para Android. Desde la versión de Tor 11.5, el modo HTTPS-Only está habilitado de forma predeterminada para el escritorio, y HTTPS Everywhere ya no se incluye en el Navegador Tor.
In public key cryptography, a public key fingerprint is a sequence of bytes that is used to identify and authenticate a corresponding longer public key.
La toma de huellas es el proceso de recopilar información sobre un dispositivo o servicio para hacer conjeturas fundamentadas sobre su identidad o características.. El comportamiento o las respuestas únicas se pueden utilizar para identificar el dispositivo o servicio analizado. Tor Browser prevents fingerprinting.
JavaScript es un lenguaje de programación que los sitios web usan para ofrecer elementos interactivos como vídeo, animación, audio, y estados en líneas de tiempo. Unfortunately, JavaScript can also enable attacks on the security of the web browser, which might lead to deanonymization. The NoScript extension in Tor Browser can be used to manage JavaScript on different websites.
El formato letterboxing es una función del navegador Tor que oculta el tamaño real de la ventana de un usuario a las páginas web. Lo logra agregando márgenes a la ventana del navegador. The feature helps prevent fingerprinting users based on their window or screen size.
These pluggable transports all make it look like you are browsing a major web site instead of using Tor. Meek-azure hace que parezca que estás usando un sitio web de Microsoft.
MetricsPort proporciona una interfaz para las métricas de retransmisión Tor subyacentes. Lo utilizan principalmente los operadores de retransmisión Tor para recopilar métricas y otra información relevante para diagnosticar problemas y cuellos de botella, o para monitorear el rendimiento de la retransmisión. For more information please read the MetricsPort section on the article about overloaded relays.
Translation notes: Do not translate.
Moat is an interactive tool you can use to get bridges from within Tor Browser. It uses domain fronting to help you circumvent censorship. Moat also employs a Captcha to prevent a censor from quickly blocking all of the bridges. Read more about using moat in the Tor Browser manual.
Tor Metrics archives historical data about the Tor ecosystem, collects data from the public Tor network and related services, and assists in developing novel approaches to safe, privacy preserving data collection.
Tor Browser uses the Tor network to protect your privacy and anonymity. Your internet activity, including the names and addresses of the websites you visit, will be hidden from your Internet Service Provider (ISP) and anyone watching your connection locally. Los operadores de los sitios web y servicios que uses, y cualquiera que te esté observando, verán una conexión proveniente de la red Tor en lugar de tu dirección de Internet (IP) real, y no sabrán quién eres a menos que te identifiques de forma concreta. In addition, Tor Browser is designed to prevent websites from "fingerprinting" or identifying you based on your browser configuration. By default, Tor Browser does not keep any browsing history. Cookies are only valid for a single session (until Tor Browser is exited or a New Identity is requested).
Spelling notes: Tor Browser. Sometimes also mentioned as "tbb". Not 'TOR Browser'.
Translation notes: Do not translate "Tor", however you can translate "Browser". Example in Spanish: Navegador Tor (altering the order because is more natural like that in Spanish.) Algunos idiomas como el Árabe, transliteran la palabra Tor, تور. Eso es, escriben Tor con otros caracteres.
Un navegador web (comúnmente referido como navegador) es una aplicación de software para obtener, presentar, y recorrer recursos informáticos en la World Wide Web. Major web browsers include Firefox, Chrome, Internet Explorer, and Safari.
The middle position in the Tor circuit. Non-exit relays can function as either a "middle" or a "guard" for different users.
Tor Browser includes an add-on called NoScript, accessed by clicking the hamburger menu ("≡") at the top-right of the screen, then navigating to "Add-ons and themes". NoScript allows you to control the JavaScript that runs on individual web pages, or to block it entirely.
New Identity is a Tor Browser feature if you want to prevent your subsequent browser activity from being linkable to what you were doing before. Selecting it will close all your open tabs and windows, clear all private information such as cookies and browsing history, and use New Tor circuits for all connections. El Navegador Tor te advertirá que todas las actividades y descargas se detendrán, así que ten esto en cuenta antes de hacer clic en "Nueva Identidad" (accesible mediante el pequeño icono de la escoba en la esquina superior derecha de la pantalla). New Identity can also help if Tor Browser is having trouble connecting to a particular site, similarly to "New Tor Circuit for this Site".
This option is useful if the exit you are using is unable to connect to the website you require, or is not loading it properly. Selecting it will cause the currently active tab or window to be reloaded over a new Tor circuit. Otras pestañas y ventanas abiertas del mismo sitio web también usarán el nuevo circuito una vez que se recarguen. Esta opción no limpia ninguna información privada ni desvincula tu actividad, tampoco afecta a tus conexiones actuales a otros sitios web.
Obfs3 is a pluggable transport that makes Tor traffic look random, so that it does not look like Tor or any other protocol. Obfs3 ya no está soportado.
Obfs4 is a pluggable transport that makes Tor traffic look random like obfs3, and also prevents censors from finding bridges by Internet scanning. Obfs4 bridges are less likely to be blocked than obfs3 bridges.
Una aplicación para iOS que es de código abierto, usa enrutamiento Tor y está desarrollada por una persona que trabaja estrechamente con Tor Project. Conoce más sobre el Onion Browser
Translation notes: Project name. Do not translate "Onion", however you can translate "Browser". Ex: Navegador Onion.
Onion-Location es un encabezado HTTP no estándar que los sitios web pueden usar para publicitar su contraparte onion. Si la página web que estás visitando tiene un sitio onion disponible, aparecerá un globo de sugerencia de color púrpura en la barra de URL del navegador Tor que muestra ".onion disponible". Cuando haces clic en ".onion disponible", la página web se recargará y te redirigirá a la contraparte de onion.
Translation notes: Do not translate.
Onionoo is a web-based protocol to learn about currently running Tor relays and bridges. Onionoo proporciona datos a otras aplicaciones y páginas web (metrics.torproject.org) que a su vez presentan información sobre el estado de la red Tor a los humanos.
OONI stands for "Open Observatory of Network Interference", it is a global observation network for detecting censorship, surveillance and traffic manipulation on the internet.
Orfox fue publicado por primera vez el 23 de septiembre de 2015 por The Guardian Project. Durante los tres años siguientes, Orfox mejoró continuamente y se convirtió en una forma popular de navegar por Internet con más privacidad que los navegadores estándar, y Orfox fue crucial para ayudar a la gente a eludir la censura y acceder a sitios bloqueados y recursos críticos. Se instaló más de 14 millones de veces y mantiene más de un millón de usuarios activos. Orfox ya no se mantiene ni está soportado.. Has sido reemplazado por Tor Browser para Android. Más información sobre Orfox.
Translation notes: Do not translate this application name.
An Internet service provider (ISP) is an organization that provides services for accessing and using the Internet. When using Tor Browser, your ISP cannot see what websites you're visiting.
A proxy is a middle man between a client (like a web browser) and a service (like a web server). Instead of connecting directly to the service, a client sends the message to the proxy. The proxy makes the request on behalf of the client, and passes the response back to the client. The service only communicates with and sees the proxy.
Like ordinary Tor relays, bridges are run by volunteers; unlike ordinary relays, however, they are not listed publicly, so an adversary cannot identify them easily. Pluggable transports are a type of bridge that helps disguise the fact that you are using Tor.
Una breve visualización de cuatro emojis que se puede usar para identificar la dirección del puente de un vistazo. Los Bridge-mojis son identificadores de puente legibles por humanos y no representan la calidad de la conexión a la red Tor o el estado del puente. La cadena de caracteres emoji no puede utilizarse como entrada. Los usuarios deben proporcionar la dirección completa del puente para poder conectarse con un puente.
Most websites use numerous third-party services, including advertising and analytics trackers, which collect data about your IP address, web browser, system and your browsing behavior itself, all of which can link your activity across different sites. Tor Browser prevents a lot of this activity from happening.
"Tor log" is an automatically-generated list of Tor's activity that can help diagnose problems. Cuando algo va mal con Tor, puedes ver una opción con el mensaje de error para "copiar el registro de Tor al portapapeles". Deberías ver una opción para copiar el registro al portapapeles, que luego puedes pegar en un documento para mostrar a quienquiera que te esté ayudando a solucionar el problema. If you don't see this option and you have Tor Browser open, you can navigate to the hamburger menu ("≡"), then click on "Settings", and finally on "Connection" in the side bar. En la parte inferior de la página, junto al texto "Ver el registro de Tor", haz clic en el botón "Ver registro...".
A publicly-listed node in the Tor network that forwards traffic on behalf of clients, and that registers itself with the directory authorities.
Una réplica de sitio web es una copia exacta de un sitio web al cual puedes encontrar bajo otras direcciones web.
The last relay in the Tor circuit which sends traffic out onto the public Internet. The service you are connecting to (website, chat service, email provider, etc.) will see the IP address of the exit.
It is an add-on for the Chrome or Chromium browsers that allows you to download several security and privacy programs, including Tor Browser, from different sources.
ScrambleSuit is similar to the obfs4 pluggable transport but has a different set of bridges.
Elemento utilizado para ofrecer contenido dinámico/interactivo a través de sitios web.
A single onion service is an onion service that can be configured for services that do not require anonymity, but want to offer it for clients connecting to their service. Single onion services use only three hops in the circuit rather than the typical six hops for onion services.
Onion services (formerly known as "hidden services") are services (like websites) that are only accessible through the Tor network. Los servicios Onion ofrecen ventajas sobre los servicios comunes en la web no privada, que incluyen: ocultación de ubicación, autenticación de extremo a extremo, cifrado final y NAT perforado.
Un dispositivo en una red que ofrece un servicio, como almacenamiento de archivos y páginas web, correo electrónico o chat.
A session refers to a conversation between two devices communicating on a network. Using Tor Browser means that your session data will be wiped when you close the web browser.
El software principal del sistema que administra los recursos de hardware y software del ordenador y proporciona servicios comunes para los programas. Los sistemas operativos de escritorio más utilizados son Windows, macOS y Linux. Android e iOS son los sistemas operativos más comunes para móviles.
An onion site is websites that is only accessible via Tor. Although similar in meaning to onion service, but, onion site refers exclusively to websites. Estos sitios web utilizan el dominio de primer nivel (TLD) .onion.
Snowflake es un transporte conectable que proporciona evasión frente a la censura y acceso a una internet libre y abierta. Tiene tres componentes: el cliente Snowflake, el proxy Snowflake (ambos juntos son conocidos como los pares Snowflake) y el broker. Snowflake puede permitir que una pestaña abierta del navegador actúe como un repetidor Tor efímero. Para evitar el bloqueo de direcciones IP proxy, Snowflake involucra un amplio número de proxys voluntarios, lo que también hace que sean difíciles de localizar.
SOCKS5 es un protocolo de Internet usado por Tor. Envía el tráfico a través de la red Tor en lugar de hacerlo desde tu dirección IP hacia la red abierta. It is a general purpose proxy that sits at the layer 5 of the OSI model and uses the tunneling method. Las aplicaciones que ejecutas con SOCKS5 serán conscientes del túnel, pero puedes impedir la correlación de identidades si lo configuras correctamente.
Spelling notes: All in caps, as it is an acronym.
Se usa software antivirus para prevenir, detectar y quitar software malicioso. Antivirus software can interfere with Tor running on your computer. Puede que necesites consultar la documentación de tu software antivirus si no sabes cómo activar Tor.
Stem is a Python (programming language) controller library for core Tor. If you want to control core Tor with python, this is for you.
Checksums are hash values of files. If you have downloaded the software without errors, the given checksum and the checksum of your downloaded file will be identical.
Tails is a "live" operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. Su objetivo es preservar tu privacidad y anonimato. Más información sobre Tails.
El Guardian Project es un grupo de desarrolladores de software, activistas y diseñadores que crean aplicaciones para móviles de código abierto, seguras y fáciles de usar y mejoras para sistemas operativos. La aplicación Orbot proporcionada por The Guardian Project ayuda a enrutar otras aplicaciones en tu dispositivo Android a través de la red Tor.
Tor es un programa que puedes ejecutar en tu ordenador y que te ayuda a mantenerte seguro en Internet. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. This set of volunteer relays is called the Tor network. Sometimes the software associated with this network is called Core Tor, and sometimes "little-t tor". The way most people use Tor is with Tor Browser which is a version of Firefox that fixes many privacy issues.
"tor-en-minúscula" es una forma de referirse al 'daemon' (proceso en segundo plano) tor, para diferenciarlo del Navegador Tor o el Proyecto Tor (que van en mayúscula).
When you run Tor Browser for the first time, you see the Tor Launcher window. It offers you the option to connect directly to the Tor network, or to configure Tor Browser for your connection. En el segundo caso, Tor Launcher te llevará a través de una serie de opciones de configuración. Tor Launcher ya no se usa en el Navegador Tor desde la versión 10.5.
Translation notes: Do not translate or transliterate.
Tor Messenger was a cross-platform chat program that aimed to be secure by default and send all of its traffic over Tor. Tor Messenger ya no está en desarrollo. Soportaba Jabber (XMPP), IRC, Google Talk, Facebook Chat, Twitter, Yahoo, y otros; habilitaba Mensajería fuera de registro (OTR) automáticamente; y tenía una interfaz gráfica de usuario fácil de usar traducida a múltiples lenguajes.
Tor2web is a project to let users access onion services without using the Tor Browser. NOTE: This is not as safe as connecting to the onion services via Tor Browser, and will remove all Tor-related protections the client would otherwise have.
The core Tor configuration file.
TPI es un acrónimo para Tor Project, Inc.
People often use tpo to abbreviate torproject.org when writing hostnames. For example, blog.tpo is an abbreviation for blog.torproject.org.
Tools that Tor can use to disguise the traffic it sends out. This can be useful in situations where an Internet Service Provider (ISP) or other authority is actively blocking connections to the Tor network.
WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS). For someone monitoring the network, it makes the traffic look like a regular HTTPS connection to a webpage server giving the impression that the user is simply browsing the web.