commit 26086581a9314e042501b30b9a8a143940a6c8e6 Author: Translation commit bot translation@torproject.org Date: Tue Sep 12 08:15:32 2017 +0000
Update translations for https_everywhere --- is/https-everywhere.dtd | 2 +- is/ssl-observatory.dtd | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/is/https-everywhere.dtd b/is/https-everywhere.dtd index 126f77e71..160104f6a 100644 --- a/is/https-everywhere.dtd +++ b/is/https-everywhere.dtd @@ -4,7 +4,7 @@ <!ENTITY https-everywhere.about.version "Útgáfa"> <!ENTITY https-everywhere.about.created_by "Búið til af"> <!ENTITY https-everywhere.about.and " og"> -<!ENTITY https-everywhere.about.librarians ""Ruleset Librarians""> +<!ENTITY https-everywhere.about.librarians "Reglusafn"> <!ENTITY https-everywhere.about.add_new_rule "Bæta við nýrri reglu"> <!ENTITY https-everywhere.about.thanks "Þökk sé"> <!ENTITY https-everywhere.about.many_contributors "gríðarlega mörgum aðilum, þar á meðal"> diff --git a/is/ssl-observatory.dtd b/is/ssl-observatory.dtd index cc826575e..91a97dd8f 100644 --- a/is/ssl-observatory.dtd +++ b/is/ssl-observatory.dtd @@ -20,11 +20,11 @@ to turn it on?">--> <!-- Observatory preferences dialog -->
<!ENTITY ssl-observatory.prefs.adv_priv_opts1 -"It is safe to enable this, unless you use a very -intrusive corporate network:"> +"Það er öruggt að virkja þetta, nema þú sért að nota +verulega nærgöngult fyrirtækjanet:">
<!ENTITY ssl-observatory.prefs.adv_priv_opts2 -"Safe, unless you use a corporate network with secret intranet server names:"> +"Öruggt, nema þú notir fyrirtækjanet með földum innranetsþjónum:">
<!ENTITY ssl-observatory.prefs.alt_roots "Submit and check certificates signed by non-standard root CAs"> @@ -32,7 +32,7 @@ intrusive corporate network:"> <!ENTITY ssl-observatory.prefs.alt_roots_tooltip "It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority. If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce. So we leave it off by default.">
-<!ENTITY ssl-observatory.prefs.anonymous "Check certificates using Tor for anonymity"> +<!ENTITY ssl-observatory.prefs.anonymous "Athuga skilríki sem nota Tor til að dyljast"> <!ENTITY ssl-observatory.prefs.anonymous_unavailable "Check certificates using Tor for anonymity (requires Tor)"> <!ENTITY ssl-observatory.prefs.anonymous_tooltip