[tor-commits] [translation/https_everywhere] Update translations for https_everywhere

translation at torproject.org translation at torproject.org
Sat Jan 11 21:16:19 UTC 2014


commit 9ae2e44ec5b5504ba2f56340167a2371b5a91a1a
Author: Translation commit bot <translation at torproject.org>
Date:   Sat Jan 11 21:16:19 2014 +0000

    Update translations for https_everywhere
---
 ady/https-everywhere.dtd        |   46 +++++++++++++++++++
 ady/https-everywhere.properties |    8 ++++
 ady/ssl-observatory.dtd         |   95 +++++++++++++++++++++++++++++++++++++++
 3 files changed, 149 insertions(+)

diff --git a/ady/https-everywhere.dtd b/ady/https-everywhere.dtd
new file mode 100644
index 0000000..33cd86d
--- /dev/null
+++ b/ady/https-everywhere.dtd
@@ -0,0 +1,46 @@
+<!ENTITY https-everywhere.about.title "About HTTPS Everywhere">
+<!ENTITY https-everywhere.about.ext_name "HTTPS Everywhere">
+<!ENTITY https-everywhere.about.ext_description "Encrypt the Web! Automatically use HTTPS security on many sites.">
+<!ENTITY https-everywhere.about.version "Version">
+<!ENTITY https-everywhere.about.created_by "Created by">
+<!ENTITY https-everywhere.about.librarians "Ruleset Librarians">
+<!ENTITY https-everywhere.about.thanks "Thanks to">
+<!ENTITY https-everywhere.about.contribute  "If you like HTTPS Everywhere, you might consider">
+<!ENTITY https-everywhere.about.donate_tor "Donating to Tor">
+<!ENTITY https-everywhere.about.tor_lang_code "en">
+<!ENTITY https-everywhere.about.donate_eff "Donating to EFF">
+
+<!ENTITY https-everywhere.menu.about "About HTTPS Everywhere">
+<!ENTITY https-everywhere.menu.observatory "SSL Observatory Preferences">
+<!ENTITY https-everywhere.menu.globalEnable "Enable HTTPS Everywhere">
+<!ENTITY https-everywhere.menu.globalDisable "Disable HTTPS Everywhere">
+
+<!ENTITY https-everywhere.prefs.title "HTTPS Everywhere Preferences">
+<!ENTITY https-everywhere.prefs.enable_all "Enable All">
+<!ENTITY https-everywhere.prefs.disable_all "Disable All">
+<!ENTITY https-everywhere.prefs.reset_defaults "Reset to Defaults">
+<!ENTITY https-everywhere.prefs.search "Search">
+<!ENTITY https-everywhere.prefs.site "Site">
+<!ENTITY https-everywhere.prefs.notes "Notes">
+<!ENTITY https-everywhere.prefs.list_caption "Which HTTPS redirection rules should apply?">
+<!ENTITY https-everywhere.prefs.enabled "Enabled">
+<!ENTITY https-everywhere.prefs.ruleset_howto "You can learn how to write your own rulesets (to add support for other web sites)">
+<!ENTITY https-everywhere.prefs.here_link "here">
+<!ENTITY https-everywhere.prefs.toggle "Toggle">
+<!ENTITY https-everywhere.prefs.reset_default "Reset to Default">
+<!ENTITY https-everywhere.prefs.view_xml_source "View XML Source">
+
+<!ENTITY https-everywhere.source.downloading "Downloading">
+<!ENTITY https-everywhere.source.filename "Filename">
+<!ENTITY https-everywhere.source.unable_to_download "Unable to download source.">
+
+<!ENTITY https-everywhere.popup.title "HTTPS Everywhere 4.0development.11 notification">
+<!ENTITY https-everywhere.popup.paragraph1 "Oops. You were using the stable version of HTTPS Everywhere, but we might have accidentally upgraded you to the development version in our last release.">
+<!ENTITY https-everywhere.popup.paragraph2 "Would you like to go back to stable?">
+<!ENTITY https-everywhere.popup.paragraph3 "We'd love it if you continued using our development release and helped us make HTTPS Everywhere better! You might find there are a few more bugs here and there, which you can report to https-everywhere at eff.org. Sorry about the inconvenience, and thank you for using HTTPS Everywhere.">
+<!ENTITY https-everywhere.popup.keep "Keep me on the development version">
+<!ENTITY https-everywhere.popup.revert "Download the latest stable version">
+
+<!ENTITY https-everywhere.ruleset-tests.status_title "HTTPS Everywhere Ruleset Tests">
+<!ENTITY https-everywhere.ruleset-tests.status_cancel_button "Cancel">
+<!ENTITY https-everywhere.ruleset-tests.status_start_button "Start">
diff --git a/ady/https-everywhere.properties b/ady/https-everywhere.properties
new file mode 100644
index 0000000..21feda9
--- /dev/null
+++ b/ady/https-everywhere.properties
@@ -0,0 +1,8 @@
+# https-everywhere.menu.globalEnable = Enable HTTPS Everywhere
+# https-everywhere.menu.globalDisable = Disable HTTPS Everywhere
+# https-everywhere.menu.enableDisable = Enable / Disable Rules
+# https-everywhere.menu.noRules = (No Rules for This Page)
+# https-everywhere.menu.unknownRules = (Rules for This Page Unknown)
+# https-everywhere.toolbar.hint = HTTPS Everywhere is now active. You can toggle it on a site-by-site basis by clicking the icon in the address bar.
+# https-everywhere.migration.notification0 = In order to implement a crucial fix, this update resets your HTTPS Everywhere rule preferences to their default values.
+# https-everywhere.menu.ruleset-tests = Run HTTPS Everywhere Ruleset Tests
diff --git a/ady/ssl-observatory.dtd b/ady/ssl-observatory.dtd
new file mode 100644
index 0000000..9457a96
--- /dev/null
+++ b/ady/ssl-observatory.dtd
@@ -0,0 +1,95 @@
+<!-- Observatory popup window -->
+<!ENTITY ssl-observatory.popup.details "Details and Privacy Information">
+<!ENTITY ssl-observatory.popup.later "Ask Me Later">
+<!ENTITY ssl-observatory.popup.no "No">
+
+<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks
+against your browser by sending the certificates you receive to the
+Observatory.  Turn this on?">
+
+<!--<!ENTITY ssl-observatory.popup.text 
+"EFF's SSL Observatory can detect attacks against HTTPS websites by collecting
+and auditing the certificates being presented to your browser. Would you like
+to turn it on?">-->
+
+<!ENTITY ssl-observatory.popup.title 
+"Should HTTPS Everywhere use the SSL Observatory?">
+
+<!ENTITY ssl-observatory.popup.yes "Yes">
+
+<!-- Observatory preferences dialog -->
+
+<!ENTITY ssl-observatory.prefs.adv_priv_opts1
+"It is safe to enable this, unless you use a very
+intrusive corporate network:">
+
+<!ENTITY ssl-observatory.prefs.adv_priv_opts2
+"Safe, unless you use a corporate network with secret intranet server names:">
+
+<!ENTITY ssl-observatory.prefs.alt_roots 
+"Submit and check certificates signed by non-standard root CAs">
+
+<!ENTITY ssl-observatory.prefs.alt_roots_tooltip 
+"It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority.  If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce.  So we leave it off by default.">
+
+<!ENTITY ssl-observatory.prefs.anonymous "Check certificates using Tor for anonymity">
+<!ENTITY ssl-observatory.prefs.anonymous_unavailable 
+"Check certificates using Tor for anonymity (requires Tor)">
+<!ENTITY ssl-observatory.prefs.anonymous_tooltip 
+"This option requires Tor to be installed and running">
+
+<!ENTITY ssl-observatory.prefs.asn 
+"When you see a new certificate, tell the Observatory which ISP you are connected to">
+
+<!ENTITY ssl-observatory.prefs.asn_tooltip
+"This will fetch and send the "Autonomous System number" of your network.  This will help us locate attacks against HTTPS, and to determine whether we have observations from networks in places like Iran and Syria where attacks are comparatively common.">
+
+<!ENTITY ssl-observatory.prefs.done "Done">
+
+<!ENTITY ssl-observatory.prefs.explanation 
+"HTTPS Everywhere can use EFF's SSL Observatory.  This does two things: (1)
+sends copies of HTTPS certificates to the Observatory, to help us
+detect 'man in the middle' attacks and improve the Web's security; and (2)
+lets us warn you about insecure connections or attacks on your browser.">
+
+<!--<!ENTITY ssl-observatory.prefs.explanation2
+"When you visit https://www.example.com, the Observatory will learn that
+somebody visited that site, but will not know who or what page they looked at.
+Mouseover the options for further details:">-->
+
+<!ENTITY ssl-observatory.prefs.explanation2
+
+"For example, when you visit https://www.something.com, the certificate
+received by the Observatory will indicate that somebody visited
+www.something.com, but not who visited the site, or what specific page they
+looked at.  Mouseover the options for further details:">
+
+<!ENTITY ssl-observatory.prefs.hide "Hide advanced options">
+
+<!ENTITY ssl-observatory.prefs.nonanon 
+"Check certificates even if Tor is not available">
+
+<!ENTITY ssl-observatory.prefs.nonanon_tooltip
+"We will still try to keep the data anonymous, but this option is less secure">
+
+<!ENTITY ssl-observatory.prefs.priv_dns 
+"Submit and check certificates for non-public DNS names">
+
+<!ENTITY ssl-observatory.prefs.priv_dns_tooltip
+"Unless this option is checked, the Observatory will not record certificates for names that it cannot resolve through the DNS system.">
+
+<!ENTITY ssl-observatory.prefs.show "Show advanced options">
+
+<!ENTITY ssl-observatory.prefs.title "SSL Observatory Preferences">
+
+<!ENTITY ssl-observatory.prefs.use "Use the Observatory?">
+<!ENTITY ssl-observatory.warning.title "WARNING from EFF's SSL Observatory">
+<!ENTITY ssl-observatory.warning.showcert "Show the certificate chain">
+<!ENTITY ssl-observatory.warning.okay "I understand">
+<!ENTITY ssl-observatory.warning.text "EFF's SSL Observatory has issued a warning about the HTTPS certificiate(s) for this site:">
+<!ENTITY ssl-observatory.warning.defense "If you are logged in to this site, it may be advisable to change your password once you have a safe connection.">
+
+<!ENTITY ssl-observatory.prefs.self_signed
+"Submit and check self-signed certificates">
+<!ENTITY ssl-observatory.prefs.self_signed_tooltip
+"This is recommended; cryptographic problems are especially common in self-signed embedded devices">



More information about the tor-commits mailing list