[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #21250 [Community/Translations]: Suggestions for translations source strings
#21250: Suggestions for translations source strings
------------------------------------+-----------------------
Reporter: scootergrisen | Owner: phoul
Type: enhancement | Status: new
Priority: Very Low | Milestone:
Component: Community/Translations | Version:
Severity: Trivial | Resolution:
Keywords: translation | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
------------------------------------+-----------------------
Comment (by scootergrisen):
Double spaces:
{{{
torproject.tor-launcher-network-settingsdtd
<!ENTITY torsettings.bridgeHelp4 "As a last resort, you can request bridge
addresses by sending a polite email message to
help@xxxxxxxxxxxxxxxxx.  Please note that a person will need to
respond to each request.">
---
torproject.3-https-everywhere-https-everywhere-dtd
<!ENTITY https-everywhere.about.noscript "Also, portions of HTTPS
Everywhere are based on code from NoScript, by Giorgio Maone and others.
We are grateful for their excellent work!">
---
torproject.3-https-everywhere-ssl-observatory-dtd
<!ENTITY ssl-observatory.prefs.explanation2
"For example, when you visit https://www.something.com, the certificate
received by the Observatory will indicate that somebody visited
www.something.com, but not who visited the site, or what specific page
they
looked at. Mouseover the options for further details:">
<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks
against your browser by sending the certificates you receive to the
Observatory. Turn this on?">
<!ENTITY ssl-observatory.prefs.explanation
"HTTPS Everywhere can use EFF's SSL Observatory. This does two things:
(1)
sends copies of HTTPS certificates to the Observatory, to help us
detect 'man in the middle' attacks and improve the Web's security; and (2)
lets us warn you about insecure connections or attacks on your browser.">
<!ENTITY ssl-observatory.prefs.alt_roots_tooltip
"It is safe (and a good idea) to enable this option, unless you use an
intrusive corporate network or Kaspersky antivirus software that monitors
your browsing with a TLS proxy and a private root Certificate Authority.
If enabled on such a network, this option might publish evidence of which
https:// domains were being visited through that proxy, because of the
unique certificates it would produce. So we leave it off by default.">
}}}
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21250#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs