[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [translation/https_everywhere] Update translations for https_everywhere
commit 26086581a9314e042501b30b9a8a143940a6c8e6
Author: Translation commit bot <translation@xxxxxxxxxxxxxx>
Date: Tue Sep 12 08:15:32 2017 +0000
Update translations for https_everywhere
---
is/https-everywhere.dtd | 2 +-
is/ssl-observatory.dtd | 8 ++++----
2 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/is/https-everywhere.dtd b/is/https-everywhere.dtd
index 126f77e71..160104f6a 100644
--- a/is/https-everywhere.dtd
+++ b/is/https-everywhere.dtd
@@ -4,7 +4,7 @@
<!ENTITY https-everywhere.about.version "�tgáfa">
<!ENTITY https-everywhere.about.created_by "Búið til af">
<!ENTITY https-everywhere.about.and " og">
-<!ENTITY https-everywhere.about.librarians ""Ruleset Librarians"">
+<!ENTITY https-everywhere.about.librarians "Reglusafn">
<!ENTITY https-everywhere.about.add_new_rule "Bæta við nýrri reglu">
<!ENTITY https-everywhere.about.thanks "�ökk sé">
<!ENTITY https-everywhere.about.many_contributors "grÃðarlega mörgum aðilum, þar á meðal">
diff --git a/is/ssl-observatory.dtd b/is/ssl-observatory.dtd
index cc826575e..91a97dd8f 100644
--- a/is/ssl-observatory.dtd
+++ b/is/ssl-observatory.dtd
@@ -20,11 +20,11 @@ to turn it on?">-->
<!-- Observatory preferences dialog -->
<!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"It is safe to enable this, unless you use a very
-intrusive corporate network:">
+"�að er öruggt að virkja þetta, nema þú sért að nota
+verulega nærgöngult fyrirtækjanet:">
<!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"�ruggt, nema þú notir fyrirtækjanet með földum innranetsþjónum:">
<!ENTITY ssl-observatory.prefs.alt_roots
"Submit and check certificates signed by non-standard root CAs">
@@ -32,7 +32,7 @@ intrusive corporate network:">
<!ENTITY ssl-observatory.prefs.alt_roots_tooltip
"It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority. If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce. So we leave it off by default.">
-<!ENTITY ssl-observatory.prefs.anonymous "Check certificates using Tor for anonymity">
+<!ENTITY ssl-observatory.prefs.anonymous "Athuga skilrÃki sem nota Tor til að dyljast">
<!ENTITY ssl-observatory.prefs.anonymous_unavailable
"Check certificates using Tor for anonymity (requires Tor)">
<!ENTITY ssl-observatory.prefs.anonymous_tooltip
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits