commit d1e776f8b306e1febede2f13edc70cff0013b7f1 Author: Translation commit bot translation@torproject.org Date: Fri Jun 22 04:49:35 2018 +0000
Update translations for support-https --- tr.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tr.json b/tr.json index 625e41dd5..777a027fc 100644 --- a/tr.json +++ b/tr.json @@ -2,7 +2,7 @@ "https-1": { "id": "#https-1", "control": "https-1", - "title": "When I'm using Tor, can eavesdroppers still see the information I share with websites, like login information and things I type into forms?", + "title": "Tor kullandığımda beni izleyen kişi ya da kuruluşlar web siteleri ile paylaştığım oturum açma bilgilerimi ya da formlar üzerine yazdığım bilgileri görebilir mi?", "description": "<p class="mb-3">Tor protects eavesdroppers from learning sites that you visit. However, information sent unencrypted over the internet using plain HTTP can still be intercepted by exit relay operators or anyone observing the traffic between your exit relay and your destination website. If the site you are visiting uses HTTPS, then the traffic leaving your exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div class="row"><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image2.png" alt="https"><div class="card-body"><h4 class="card-title">If you are using HTTPS, your website URL will begin with "https://".</h4></div></div></div><div class="col-md-6"><div class="card"><img class="card-img-top" src="/static/images/image6.png" alt="https"><div class="card-body"><h4 class="card-title">This visualization shows what information is visible to eavesdroppers with and without Tor Br owser and HTTPS encryption.</h4></div></div></div></div>" } }
tor-commits@lists.torproject.org