[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor-glossary/master] update german translations (#28417)
commit ad1edfe14c1954eb17646ab89100f880b31dd883
Author: traumschule <traumschuleriebau@xxxxxxxxxx>
Date: Thu Nov 15 11:21:41 2018 +0100
update german translations (#28417)
---
glossary_de.csv | 228 ++++++++++++++++++++++++++++----------------------------
1 file changed, 114 insertions(+), 114 deletions(-)
diff --git a/glossary_de.csv b/glossary_de.csv
index 797ca76..b01c5a9 100644
--- a/glossary_de.csv
+++ b/glossary_de.csv
@@ -1,7 +1,7 @@
term,pos,comment,de
- donation process,,,
- testing,,,
- third-party,,,
+ donation process,,, Spendenprozess
+ testing,,, wird geprüft
+ third-party,,, aus dritter Hand
!,Conjunction,"Punctuation, not a conjunction, however â??punctionationâ?? is not an option in Transifex",!
"""",Conjunction,"Punctuation, not a conjunction, however â??punctionationâ?? is not an option in Transifex",»«
$,,,
@@ -13,7 +13,7 @@ $,,,
Two-factor authentication
""Something you know, and something you have."" Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.
Synonyms: two-step verification, multi-factor authentication.
-Source EFF.",
+Source EFF.",2-Faktor-Authentifzierung
3D bar chart,Noun,[Martus],3D Balkendiagramm
3rd party,Adjective,[Signal] As in â??Use a 3rd party application.â??,
:,Conjunction,"Punctuation, not a conjunction, however â??punctionationâ?? is not an option in Transifex",:
@@ -24,7 +24,7 @@ A security-oriented operating system,Noun,[Qubes OS],Ein sicherheitsorientiertes
ADIDS,Noun,what is that?,
API,Noun,"Application Programming Interface: ""In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software."" - Wikipedia",API
APK,Noun,"""Android application package (APK) is the package file format used to distribute and install application software and middleware onto Google's Android operating system and sometimes on the BlackBerry OS 10."" https://en.wikipedia.org/wiki/Android_application_package",APK
-About,Noun,,
+About,Noun,,Ã?ber
Alice,,[Briar],
American Apparel,,,
Android,Noun,[Signal] [Orbot] Operating system,Android
@@ -33,73 +33,73 @@ App Store,Noun,Apple App Store [Signal],App Store
AppVM,Noun,"[Qubes OS] ""Application Virtual Machine""A VM which is intended for running software applications.",
Apt.,,,
Ativistas,,,
-Autocrypt Setup Message,Noun,[Enigmail] [OpenKeychain],
-Autonomous System number,Noun,,
+Autocrypt Setup Message,Noun,[Enigmail] [OpenKeychain],Autocrypt Installations-Nachricht
+Autonomous System number,Noun,,AS-Nummer
BCC,Noun,"""Blind carbon copy""",BCC
-Back,Adverb,,
-Back to,,,
+Back,Adverb,,Zurück
+Back to,,,Zurück zu
Backup Key File,Noun,[Martus] Also: key backup,Sicherungsschlüsseldatei
Benetech,Noun,Company name which should not be translated or transcribed.,
BitTorrent,,,
Bitcoin,,,
-Blow the Whistle,Noun,[Globaleaks],
+Blow the Whistle,Noun,[Globaleaks],Hinweise geben
Blow the Whistle,Verb,[Globaleaks] GlobaLeaks catch phrase,Hinweise geben
Bob,,[Briar],
-Bug,,,
+Bug,,,Fehler
C&C,Noun,"A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
Synonyms: Command and control server, C2.
-Source EFF.",
+Source EFF.","C&C (Kommando und Kontroll-Server, kontrolliert infizierte Computer)"
C2,Noun,"A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
Synonyms: Command and control server, C2.
-Source EFF.",
-CFC program,,,
+Source EFF.","C2 (Kommando und Kontroll-Server, kontrolliert infizierte Computer)"
+CFC program,,,CFC-Programm
CIDR,Noun,Classless inter-domain routing,
CPU,Noun,,
CSR,Noun,Certificate Signing Request,
CSRF,Noun,,
CVC,,,
-Cancel,Verb,,
-Card Number,,,
+Cancel,Verb,,Abbrechen
+Card Number,,,Kartennummber
Carol,,[Briar],
-Certificate Signing Request,Noun,,
+Certificate Signing Request,Noun,,CSR (Zertifikat-Signierungs-Anfrage)
ChatSecure,Noun,Application Name,
Chrome App,Noun,[Signal],
Chrome OS,Noun,,
Chrome Web Store,Noun,,
-Circuit Display,Noun,[Tor],
-Clear,Noun,,
-Clearnet,Noun,,Sichtbare Internet
-Client User Interface,Noun,,Client-Benutzeroberfläche
+Circuit Display,Noun,[Tor],Kanal-Anzeige
+Clear,Noun,,Löschen
+Clearnet,Noun,,Sichtbares Internet
+Client User Interface,Noun,,Programm-Benutzeroberfläche
ClockVM,Noun,,
-Combined Federal Campaign,,,
+Combined Federal Campaign,,,kombinierte behördliche Kampagne
Command-line tool,Noun,"The ""command line"" is an ancient way of giving a computer a series of small, self-contained orders (think of those science fiction movies where teenage geniuses type long strings of green text onto black screens). To use a command line tool, the user types a command into a window called a terminal emulator, hits the return or enter key, and then receives a textual response in the same window. Windows, Linux and Apple desktop computers still let you run software using this interface, and even some mobile phones can do the same with the right app. The command line can be used to run software pre-packaged with your operating system. Some downloadable programs, especially technical utilities, use the command line instead of a more familiar ""icons and buttons"" user interface. The command line needn't be scary, but it does require you to type in exactly the right set of letters and numbers to get the correct result, and it's often unclear what to do if the resp
onses don't match your expectations.
Source EFF.",Befehlszeilenwerkzeug
-Comments,,,
+Comments,,,Kommentare
Commit,Noun,,
Commit,Verb,,
-Company,,,
-Contributions,,,
-Contributors,Noun,,
-Core,,,
+Company,,,Firma
+Contributions,,,Beiträge
+Contributors,Noun,,Mitwirkende
+Core,,,Kern
Courier,Noun,"App name. Do not translate the app name. If necessary, transcribe the name into translation language and place in parentheses after the original name. Ex: Courier (Ù?Ù?رÙ?Ù?ر)",
-"Credit Card, credit card",,,
-Cross-site scripting,Noun,,
-Crowdfunding,,,
-Crypto,Adjective,,
-Crypto,Noun,This is an abbreviation of â??cryptography.â??,
-Customization Template Files (*.mct),Noun,[Martus],
+"Credit Card, credit card",,,Kreditkarte
+Cross-site scripting,Noun,,Seiten übergreifende Skripte
+Crowdfunding,,,Schwarmfinanzierung
+Crypto,Adjective,,crypto
+Crypto,Noun,This is an abbreviation of â??cryptography.â??,Crypto
+Customization Template Files (*.mct),Noun,[Martus],angepasste Vorlagen-Dateien (*.mct)
DD,Noun,,
DDoS,Noun,"A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware.
Synonyms: distributed denial of service
-Source EFF",
+Source EFF",verteilte Dienstblockade (DdoS)
DDoS (distributed denial of service),Noun,"A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware. (Synonyms: DDoS) (Source EFF)",
-DHT,Noun,,
-DNS,Noun,[Orbot],DNS
-DNS record,Noun,,
+DHT,Noun,,verteilte Streuwerttabelle (DHT)
+DNS,Noun,Domain Name Server,
+DNS record,Noun,,DNS-Eintrag
DVM,Noun,"[Qubes] An abbreviation of DispVM, typically used to refer to DVM Templates.",
DVM Template,Noun,[Qubes] TemplateBasedVMs on which DispVMs are based.,
Darknet,Noun,,
-Data Retention Strategy,Noun,,
+Data Retention Strategy,Noun,,Datenspeicherungsstrategie
Data Source Grid,Noun,,
Data-Driven Dropdown (Field),Noun,[Matus],
Date,Noun,,
@@ -365,7 +365,7 @@ Newsletter,Noun,,Infobrief
Next,Noun,â??Nextâ?? button,
No,Noun,,
Node,Noun,,Knotenpunkt
-Non-Tor,Noun,,
+Non-Tor,Noun,,Nicht-Tor
Notes,,,
OK,Noun,[Signal] â??OKâ?? button which can also be translated as â??Acceptâ??,
OPML,Noun,"Outline Processor Markup Language
@@ -378,13 +378,13 @@ Observatory,Noun,,Beobachtungsstelle
Off,Adjective,,Aus
Off-the-Record,Noun,"[Orbot] Messaging systems are often unencrypted. OTR is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat, Google Chat or Hangouts but with your messages more resistant to surveillance. The OTR cryptographic protocol provides strong encryption for messaging conversations. (Synonyms : OTR) (Source EFF)",
Oil pipeline,Noun,,
-On,Adjective,,
+On,Adjective,,An
One-time password,Noun,"Passwords are usually semi-permanent: once you set them up, you can keep using them until you manually change or reset them. One-time passwords only work once. Some one-time password systems work by having a tool or program that can create many different one-time passwords, that you use in turn. This is useful if you're afraid that there may be a key-logger on a system where you have to type in a password.
Source EFF.",
Onion,Noun,[Tor],
-Onion Address,Noun,[Tor],
+Onion Address,Noun,[Tor],Onion-Adresse
Onion Browser,Noun,[Tor],
-Onion Circuits,Noun,[Tor],
+Onion Circuits,Noun,[Tor],Onion-Kanäle
Onion routing,Noun,[Tor],
Open Observatory of Network Interference,,,
Open Observatory of Network Interference (OONI) ,,,
@@ -613,7 +613,7 @@ TRIM,Noun,"[VeraCrypt] ""A trim command (known as TRIM in the ATA command set, a
TRIM command,Noun,"[VeraCrypt] ""A trim command (known as TRIM in the ATA command set, and UNMAP in the SCSI command set) allows an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally."" https://en.wikipedia.org/wiki/Trim_(computing)",
TTL,Noun,,
Tails,Noun,Name of the organization and tool.,Tails
-Tails Installer,Noun,Tails = The Amnesic Incognito Live System,
+Tails Installer,Noun,Tails = The Amnesic Incognito Live System,Tails-Installateur
Take a stand,,,
Tamanho,,,
TemplateBasedHVM,Noun,"[QubesOS] ""Template-Based Hardware Virtual Machine""Any HVM that depends on a TemplateVM for its root filesystem.",
@@ -623,8 +623,8 @@ TemplateVM,Noun,"[QubesOS] ""Template Virtual Machine.""Any VM which supplies it
Terms & Privacy Policy,Noun,[Signal],
Text message,Noun,Synonym: SMS,
Thanks You,,,
-Threat,Noun,"In computer security, a threat is a potential event that could undermine your efforts to defend your data. Threats can be intentional (conceived by attackers), or they could be accidental (you might leave your computer turned on and unguarded). (Source EFF)",
-Threat model,Verb,,
+Threat,Noun,"In computer security, a threat is a potential event that could undermine your efforts to defend your data. Threats can be intentional (conceived by attackers), or they could be accidental (you might leave your computer turned on and unguarded). (Source EFF)",Gefahr
+Threat model,Verb,,Gefahrenmodell
Threat modeling,Noun,"A way of narrowly thinking about the sorts of protection you want for your data. It's impossible to protect against every kind of trick or attacker, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible attacks you plan to protect against is called threat modeling. Once you have a threat model, you can conduct a risk analysis. (Synonyms: Threat model) (Source EFF)",
Throwaway,Noun,"A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash. (Synonyms: Burner phone) (Source EFF)",
Throwaway address,Noun,"An email address you use once, and never again. Used to sign up to Internet services without revealing an email address connected to your identity.
@@ -648,12 +648,12 @@ Tor Project,Noun,[Orbot] Organization name. Do not translate. Name can be transc
Tor bridge,Noun,,Tor-Brücke
Tor messenger,Noun,[The Tor Project],
Tor network,Noun,,Tor-Netzwerk
-Tor relay,Noun,[Tor] [Orbot],Tor-Relais
+Tor relay,Noun,[Tor] [Orbot],Tor-Relay
Torbutton,Noun,,
Touch ID,Noun,[Signal] Specific to iOS,
Trademark,Noun,,
Twitter,,,
-Two-Factor,Noun,,
+Two-Factor,Noun,,Zwei-Faktor
UI,Noun,user interface,
URL,Noun,,URL
US $,,,
@@ -667,15 +667,15 @@ VM,Noun,"""virtual machine""",
VPN,,,
VPN,Noun,"A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance.
Synonyms: Virtual Private Network
-Source: EFF",
-VPNs,,,
-Vanilla Bridges,,,
+Source: EFF",Virtuelles Privates Netzwerk (VPN)
+VPNs,,,Virtuelle Private Netzwerke (VPNs)
+Vanilla Bridges,,,Standard-Brücken
Vidalia,Noun,,
-Virtual Machine (VM),Noun,"A software implementation of a machine (for example, a computer) which executes programs like a physical machine.",
+Virtual Machine (VM),Noun,"A software implementation of a machine (for example, a computer) which executes programs like a physical machine.",Virtuelle Maschine (VM)
Virtual Private Network (VPN),Noun,"A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. (Synonyms: VPN) (Source: EFF)",
"Virtual Private Network, VPN",Noun,"[Orbot] A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. (Synonyms: Virtual Private Network) (Source: EFF)",
Virtual Private Server (VPS),Noun,Virtual Private Server,
-VoIP Call,Noun,,
+VoIP Call,Noun,,VoIP-Anruf
Voice over IP (VoIP),Noun,"Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet.
Synonyms: VoIP.
Source EFF.",
@@ -868,9 +868,9 @@ box,Noun,,Kästchen
break in,Noun,,Einbruch
bridge,Noun,[Orbot] [Tor],Brücke
bridge,Verb,[Tor],überbrücken
-bridge line,Noun,[Tor] a line with the bridge configuration,
-bridge relay,Noun,[Tor],
-bridge type,Noun,[Tor],
+bridge line,Noun,[Tor] a line with the bridge configuration,Brücken-Konfiguration
+bridge relay,Noun,[Tor],Brücken-Relais
+bridge type,Noun,[Tor],Brücken-Typ
broad range,,,
broadcast,Verb,[Signal],
browse,Verb,[Orbot],durchsuchen
@@ -884,31 +884,31 @@ bug,Noun,,Fehler
bug report,Noun,[Signal],Fehlermeldung
bundle,Noun,,Bündel
bundled,Adjective,,gebündelt
-burden,,,
+burden,,,Last
burner phone,Noun,"A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash. (Synonyms: Throwaway)
(Source: EFF)",Wegwerfhandy
button,Noun,,Schaltfläche
-by,Adverb,,
+by,Adverb,,von
bypass,Verb,,vorbeikommen
bytes,Noun,[Globaleaks],Bytes
cache,Noun,,
cache,Verb,,
cache-busting,Noun,,
-calendar,Noun,,
-camera,Noun,,
-cams,,,
-can,Verb,,
+calendar,Noun,,Kalender
+camera,Noun,,Kamera
+cams,,,Kameras
+can,Verb,,kann
cancel,Verb,[Signal],abbrechen
-cannot,Verb,,
+cannot,Verb,,kann nicht
capability,Noun,"The capability of an attacker (in the context of an attack) is what it is able to do to achieve its aims. For example, a country's security services might have the capability to listen to telephone calls while a neighbor may have the capability to watch you from their window. To say that an attacker â??has"" a capability does not mean that they will necessarily use that capability. It does mean that you should consider and prepare for the possibility.
-Source EFF.",
-car documents,Noun,[Umbrella],
-carjacking,Noun,,
-carry,,,
-case management,Noun,[GlobaLeaks],
-cash,,,
+Source EFF.",Fähigkeit
+car documents,Noun,[Umbrella],KFZ-Brief
+carjacking,Noun,,KFZ-Dienstahl
+carry,,,tragen
+case management,Noun,[GlobaLeaks],Fall-Verwaltung
+cash,,,Bargeld
cc,Noun,â??carbon copyâ??,
-censor,,,
+censor,,,Zensor
censored,,,
censored,Adjective,,
censorship,,,
@@ -921,12 +921,12 @@ certificate chain,Noun,[Globaleaks],Zertifikatskette
certificate chain file,Noun,[Globaleaks],
certificates,Noun,"Is it needed, the plural form defined here? The singular already exists.",Zertifikate
chain,Noun,,Kette
-change,Verb,,
-change log,Noun,,
-charges,,,
+change,Verb,,Ã?nderung
+change log,Noun,,Changelog
+charges,,,Anklage
chart,Noun,,
chat,Noun,[Signal],Unterhaltung
-chat,Verb,[Signal],
+chat,Verb,[Signal],reden
check,Verb,,überprüfen
checking,,,
checkpoint,Noun,,
@@ -937,11 +937,11 @@ choker,Noun,,
choose,Verb,,
choose ,Verb,,
chronic stress,Noun,,
-cipher,Noun,,
+cipher,Noun,,Code
ciphertext,Noun,,Geheimtext
-circuit,Noun,[Orbot],Schaltkreis
-circuits,,,
-circuits,Noun,,
+circuit,Noun,[Orbot],Kanal
+circuits,,,Kanäle
+circuits,Noun,,Kanäle
circumvent,Verb,[Orbot],umgehen
circumvention,Noun,[Signal] [Orbot],Umgehung
clear,Verb,[Signal] [Orbot],Löschen
@@ -1129,20 +1129,20 @@ discouraged,,,
discussion,Noun,,
disk,Noun,"In most contexts in Martus, ""disk"" refers to any sort of removable storage device (USB, CD, floppy disk etc.)",
diversify,,,
-document,Noun,[Signal],
+document,Noun,[Signal],Dokument
domain,Noun,An area or set of activities in one's digital life that has certain security requirements and therefore involves the use of certain qube.,Domain
domain name,Noun,"The address, in words, of a website or Internet service; for example: ssd.eff.org. (Source: EFF)",
-domestic violence survivors,,,
-donating,,,
-donation,,,
-donations,,,
+domestic violence survivors,,,�berlebende häuslicher Gewalt
+donating,,,spenden
+donation,,,Spende
+donations,,,Spenden
donations,Noun,"feminine noun, otherwise a (V) verb.
eu doo
tu doas
ele doa
nós doamos
vós doais
-eles doam",
+eles doam",Spenden
donations options,,,
donor,Noun,,
download,,,
@@ -1194,16 +1194,16 @@ exchange,Verb,,
excited,,,
executable,Noun,,
exercised,,,
-exit,Noun,,
+exit,Noun,,Ausgang
exit,Verb,,verlassen
-exit relay,,,
+exit relay,,,Exit-Server
exit relay,Noun,,Exit-Server
-exited,Verb,,Verlassen
-experience,Verb,,
-expiration,Noun,,
+exited,Verb,,verlassen
+experience,Verb,,Erfahrung
+expiration,Noun,,Ablauf
expiration date,Noun,,Ablaufdatum
-expire,Verb,[Signal],
-expired,Noun,,
+expire,Verb,[Signal],ablaufen
+expired,Noun,,abgelaufen
expiry,Noun,[Globaleaks],Ablauf
expiry,Verb,[Signal],
export,Noun,[Signal],
@@ -1288,16 +1288,16 @@ goal,Noun,,
grants,,,
guard,Noun,,Wächter
guard relay,Noun,[The Tor Project],Wächterrelais
-guidelines,Noun,,
-handshake,Noun,Signal exchange process between pieces of equipment until they are synchronized. Transmitting and receiving communication can then take place.,
+guidelines,Noun,,Richtlinien
+handshake,Noun,Signal exchange process between pieces of equipment until they are synchronized. Transmitting and receiving communication can then take place.,Handschlag
hardware,,,
-header,Noun,,
+header,Noun,,Kopfzeilen
help,Noun,,Hilfe
help,Verb,,helfen
-helper link,Noun,,
+helper link,Noun,,Hilfe-Verweis
helper link ,Noun,,
-hidden service,Noun,,
-hidden services,,,
+hidden service,Noun,[Tor],Onion-Dienst
+hidden services,,[Tor],Onion-Dienste
hidden volume,Noun,[VeraCrypt],
hide,Verb,,verstecken
high bandwidth,Noun,,
@@ -1473,7 +1473,7 @@ meta search engine,,,
metadata,Noun,"Metadata (or ""data about data"") is everything about a piece of information, apart from the information itself. So the content of a message is not metadata, but who sent it, when, where from, and to whom, are all examples of metadata. Legal systems often protect content more than metadata: for instance, in the United States, law enforcement needs a warrant to listen to a person's telephone calls, but claims the right to obtain the list of who you have called far more easily. However, metadata can often reveal a great deal, and will often need to be protected as carefully as the data it describes. (Source EFF) [Signal]",Meta-Daten
method,,,
microphone,Noun,[Signal],
-middle relay,Noun,,
+middle relay,Noun,,Mittel-Relais
migrate,Verb,[Signal],
miniLock,Noun,,miniLock
minimize,Verb,Minimize a window,
@@ -1527,20 +1527,20 @@ notify,Verb,,
obfuscate,Verb,"[Orbot] Transforming of a section of code or program to make it totally unintelligible to a human reader, even if helped by software tools.",verschleiern
obfuscation,Noun,"Transformation of a section of code or program to make it totally unintelligible to a human reader, even if helped by software tools.",
obfuscation layer,Noun,"Related to data transmission
-[Tor]",
+[Tor]",Verschleierungs-Schicht
offline,Adjective,[Signal],
-onboarding,Noun,,
-once,,,
+onboarding,Noun,,Begrü�ung
+once,,,ein Mai
onion service,Noun,[Tor],Onion-Dienst
online,,,
online,Adjective,[Signal],
-open,Adjective,,
+open,Adjective,,offen
open,Verb,,öffnen
-open source,Noun,[Orbot],
+open source,Noun,[Orbot],quelloffen
open-source,Adjective,[Orbot],Open Source
opened,Verb,,geöffnet
-operate,,,
-operator,Noun,,
+operate,,,betreiben
+operator,Noun,,betreibende Person
opt,,,
optical,Adjective,,optisch
optimization,Noun,[Orbot],
@@ -1709,17 +1709,17 @@ referral code,Noun,,
refund,,,
refunded,,,
register,Verb,,Benutzerkonto anlegen
-regular,Adjective,,
-regular expression,Noun,,
-reinstall,Verb,[Signal],
-reject,,,
-relay,,,
-relay,Noun,[Orbot],Relais
+regular,Adjective,,gewöhnlich
+regular expression,Noun,,regulärer Ausdruck
+reinstall,Verb,[Signal],neu installieren
+reject,,,ablehnen
+relay,,,Relay
+relay,Noun,[Orbot],Relay
relay,Verb,[Signal],weiterleiten / umleiten
-relay directory,Noun,,
-relay node,Noun,[Orbot],
-relays,,,
-relays,Noun,,
+relay directory,Noun,,Relay-Verzeichnis
+relay node,Noun,[Orbot],Relay-Knoten
+relays,,,Relays
+relays,Noun,,Relays
release,Noun,,Veröffentlichung
release,Verb,,
release candidate,Noun,,
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits