[translation/https_everywhere] Update translations for https_everywhere

commit 3b319a3eb2c64535ef70ecb0407c8680e8cf2613 Author: Translation commit bot <translation@torproject.org> Date: Thu Nov 20 12:45:13 2014 +0000 Update translations for https_everywhere --- fo/ssl-observatory.dtd | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/fo/ssl-observatory.dtd b/fo/ssl-observatory.dtd index dcbb155..9c9da38 100644 --- a/fo/ssl-observatory.dtd +++ b/fo/ssl-observatory.dtd @@ -20,14 +20,14 @@ to turn it on?">--> <!-- Observatory preferences dialog --> <!ENTITY ssl-observatory.prefs.adv_priv_opts1 -"Tað er trygd at koyra frá, uttan at tú ert ein +"Tað er trygt at koyra frá, uttan so at tú ert ein øgiliga ágandadi stórfyritøka:"> <!ENTITY ssl-observatory.prefs.adv_priv_opts2 -"Safe, unless you use a corporate network with secret intranet server names:"> +"Trygt, um ikki tú brúkar netið hjá einari stórfyritøku við loyniligum intranetsnøvnum:"> <!ENTITY ssl-observatory.prefs.alt_roots -"Submit and check certificates signed by non-standard root CAs"> +"Melda til og kanna váttanir, skrivaðar undir av óvanligum "root CA"-um"> <!ENTITY ssl-observatory.prefs.alt_roots_tooltip "It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority. If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce. So we leave it off by default.">
participants (1)
-
translation@torproject.org