commit 5495876bf340fac2b6046eb49a01372ee9de912c Author: Translation commit bot translation@torproject.org Date: Tue Jul 10 18:19:25 2018 +0000
Update translations for support-https --- ka.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ka.json b/ka.json index 625e41dd5..ea7437ca1 100644 --- a/ka.json +++ b/ka.json @@ -2,7 +2,7 @@ "https-1": { "id": "#https-1", "control": "https-1", - "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "title": "Tor-ის გამოყენებისას, მაინც აქვთ მიმყურადებლებს შესაძლებლობა მოიპოვონ ჩემ მიერ ვებსაიტებისთვის გაზიარებული მონაცემები, როგორიცაა ანგარიშის სახელები, პაროლები ველებში შეყვანილი სხვა ინფორმაცია?", "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "https://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" } }