[tor-bugs] #21250 [Community/Translations]: Suggestions for translations source strings

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Jan 18 12:47:42 UTC 2017


#21250: Suggestions for translations source strings
------------------------------------+-----------------------
 Reporter:  scootergrisen           |          Owner:  phoul
     Type:  enhancement             |         Status:  new
 Priority:  Very Low                |      Milestone:
Component:  Community/Translations  |        Version:
 Severity:  Trivial                 |     Resolution:
 Keywords:  translation             |  Actual Points:
Parent ID:                          |         Points:
 Reviewer:                          |        Sponsor:
------------------------------------+-----------------------

Comment (by scootergrisen):

 Double spaces:

 {{{
 torproject.tor-launcher-network-settingsdtd

 <!ENTITY torsettings.bridgeHelp4 "As a last resort, you can request bridge
 addresses by sending a polite email message to
 help at rt.torproject.org.  Please note that a person will need to
 respond to each request.">

 ---

 torproject.3-https-everywhere-https-everywhere-dtd

 <!ENTITY https-everywhere.about.noscript "Also, portions of HTTPS
 Everywhere are based on code from NoScript, by Giorgio Maone and others.
 We are grateful for their excellent work!">

 ---

 torproject.3-https-everywhere-ssl-observatory-dtd

 <!ENTITY ssl-observatory.prefs.explanation2

 "For example, when you visit https://www.something.com, the certificate
 received by the Observatory will indicate that somebody visited
 www.something.com, but not who visited the site, or what specific page
 they
 looked at.  Mouseover the options for further details:">

 <!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks
 against your browser by sending the certificates you receive to the
 Observatory.  Turn this on?">

 <!ENTITY ssl-observatory.prefs.explanation
 "HTTPS Everywhere can use EFF's SSL Observatory.  This does two things:
 (1)
 sends copies of HTTPS certificates to the Observatory, to help us
 detect 'man in the middle' attacks and improve the Web's security; and (2)
 lets us warn you about insecure connections or attacks on your browser.">

 <!ENTITY ssl-observatory.prefs.alt_roots_tooltip
 "It is safe (and a good idea) to enable this option, unless you use an
 intrusive corporate network or Kaspersky antivirus software that monitors
 your browsing with a TLS proxy and a private root Certificate Authority.
 If enabled on such a network, this option might publish evidence of which
 https:// domains were being visited through that proxy, because of the
 unique certificates it would produce.  So we leave it off by default.">

 }}}

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21250#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list