[tor-commits] [translation/https_everywhere] Update translations for https_everywhere

translation at torproject.org translation at torproject.org
Mon Mar 9 14:15:17 UTC 2015


commit 99399eed0acdc319ef5514dc207b3127425cd1c5
Author: Translation commit bot <translation at torproject.org>
Date:   Mon Mar 9 14:15:14 2015 +0000

    Update translations for https_everywhere
---
 sq/ssl-observatory.dtd |    8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/sq/ssl-observatory.dtd b/sq/ssl-observatory.dtd
index ac6a4d5..e1603af 100644
--- a/sq/ssl-observatory.dtd
+++ b/sq/ssl-observatory.dtd
@@ -20,14 +20,14 @@ to turn it on?">-->
 <!-- Observatory preferences dialog -->
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"It is safe to enable this, unless you use a very
-intrusive corporate network:">
+"Aktivizimi i kësaj është i sigurt, veç nëse përdorni një
+rrjet korporate shumë ndërhyrës:">
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"I sigurt, veç nëse përdorni një rrjet korporate, me emra të fshehtë të shërbyesve të intranetit:">
 
 <!ENTITY ssl-observatory.prefs.alt_roots 
-"Submit and check certificates signed by non-standard root CAs">
+"Paraqitni dhe kontrolloni certifikatat e nënshkruara nga root CA jostandarde">
 
 <!ENTITY ssl-observatory.prefs.alt_roots_tooltip 
 "It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority.  If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce.  So we leave it off by default.">



More information about the tor-commits mailing list