[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [translation/https_everywhere] Update translations for https_everywhere



commit 3b319a3eb2c64535ef70ecb0407c8680e8cf2613
Author: Translation commit bot <translation@xxxxxxxxxxxxxx>
Date:   Thu Nov 20 12:45:13 2014 +0000

    Update translations for https_everywhere
---
 fo/ssl-observatory.dtd |    6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/fo/ssl-observatory.dtd b/fo/ssl-observatory.dtd
index dcbb155..9c9da38 100644
--- a/fo/ssl-observatory.dtd
+++ b/fo/ssl-observatory.dtd
@@ -20,14 +20,14 @@ to turn it on?">-->
 <!-- Observatory preferences dialog -->
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"Tað er trygd at koyra frá, uttan at tú ert ein
+"Tað er trygt at koyra frá, uttan so at tú ert ein
 øgiliga ágandadi stórfyritøka:">
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"Trygt, um ikki tú brúkar netið hjá einari stórfyritøku við loyniligum intranetsnøvnum:">
 
 <!ENTITY ssl-observatory.prefs.alt_roots 
-"Submit and check certificates signed by non-standard root CAs">
+"Melda til og kanna váttanir, skrivaðar undir av óvanligum &quot;root CA&quot;-um">
 
 <!ENTITY ssl-observatory.prefs.alt_roots_tooltip 
 "It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority.  If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce.  So we leave it off by default.">

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits