commit 72bdf054c1f0e223c64499c3623fdbb4890a3280 Author: Translation commit bot translation@torproject.org Date: Fri Jun 29 06:15:30 2018 +0000
Update translations for https_everywhere --- gu/ssl-observatory.dtd | 2 +- hi/ssl-observatory.dtd | 10 +++++----- 2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/gu/ssl-observatory.dtd b/gu/ssl-observatory.dtd index b432a8f1d..bc967d2aa 100644 --- a/gu/ssl-observatory.dtd +++ b/gu/ssl-observatory.dtd @@ -50,7 +50,7 @@ intrusive corporate network:"> <!ENTITY ssl-observatory.prefs.show_cert_warning_tooltip "This will check submitted certificates against known Certificate Revocation Lists. Unfortunately we cannot guarantee that we will flag every revoked certificate, but if you do see a warning there's a good chance something is wrong.">
-<!ENTITY ssl-observatory.prefs.done "Done"> +<!ENTITY ssl-observatory.prefs.done "થઈ ગયું">
<!ENTITY ssl-observatory.prefs.explanation "HTTPS Everywhere can use EFF's SSL Observatory. This does two things: (1) diff --git a/hi/ssl-observatory.dtd b/hi/ssl-observatory.dtd index 73a383877..73b1ae5f0 100644 --- a/hi/ssl-observatory.dtd +++ b/hi/ssl-observatory.dtd @@ -13,21 +13,21 @@ and auditing the certificates being presented to your browser. Would you like to turn it on?">-->
<!ENTITY ssl-observatory.popup.title -"Should HTTPS Everywhere use the SSL Observatory?"> +"क्या HTTPS Everywhere SSL Observatory का उपयोग करना चाहिए?">
<!ENTITY ssl-observatory.popup.yes "हाँ">
<!-- Observatory preferences dialog -->
<!ENTITY ssl-observatory.prefs.adv_priv_opts1 -"It is safe to enable this, unless you use a very -intrusive corporate network:"> +"यह सक्षम करने के लिए सुरक्षित है, जब तक आप बहुत उपयोग नहीं करते +दखल कॉर्पोरेट नेटवर्क:">
<!ENTITY ssl-observatory.prefs.adv_priv_opts2 -"Safe, unless you use a corporate network with secret intranet server names:"> +"सुरक्षित, जब तक कि आप गुप्त इंट्रानेट सर्वर नामों के साथ कॉर्पोरेट नेटवर्क का उपयोग न करें:">
<!ENTITY ssl-observatory.prefs.alt_roots -"Submit and check certificates signed by non-standard root CAs"> +"गैर-मानक रूट CA द्वारा हस्ताक्षरित प्रमाणपत्र जमा करें और जांचें">
<!ENTITY ssl-observatory.prefs.alt_roots_tooltip "It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority. If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce. So we leave it off by default.">