[tor-commits] [translation/https_everywhere] Update translations for https_everywhere

translation at torproject.org translation at torproject.org
Thu Nov 20 12:45:17 UTC 2014


commit 3b319a3eb2c64535ef70ecb0407c8680e8cf2613
Author: Translation commit bot <translation at torproject.org>
Date:   Thu Nov 20 12:45:13 2014 +0000

    Update translations for https_everywhere
---
 fo/ssl-observatory.dtd |    6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/fo/ssl-observatory.dtd b/fo/ssl-observatory.dtd
index dcbb155..9c9da38 100644
--- a/fo/ssl-observatory.dtd
+++ b/fo/ssl-observatory.dtd
@@ -20,14 +20,14 @@ to turn it on?">-->
 <!-- Observatory preferences dialog -->
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"Tað er trygd at koyra frá, uttan at tú ert ein
+"Tað er trygt at koyra frá, uttan so at tú ert ein
 øgiliga ágandadi stórfyritøka:">
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"Trygt, um ikki tú brúkar netið hjá einari stórfyritøku við loyniligum intranetsnøvnum:">
 
 <!ENTITY ssl-observatory.prefs.alt_roots 
-"Submit and check certificates signed by non-standard root CAs">
+"Melda til og kanna váttanir, skrivaðar undir av óvanligum "root CA"-um">
 
 <!ENTITY ssl-observatory.prefs.alt_roots_tooltip 
 "It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority.  If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce.  So we leave it off by default.">



More information about the tor-commits mailing list