[tor-commits] [translation/https_everywhere] Update translations for https_everywhere

translation at torproject.org translation at torproject.org
Sat May 23 20:45:18 UTC 2015


commit e6482c33d2b740fb53f0457a4e53a045e1c5135a
Author: Translation commit bot <translation at torproject.org>
Date:   Sat May 23 20:45:16 2015 +0000

    Update translations for https_everywhere
---
 id/ssl-observatory.dtd |    7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/id/ssl-observatory.dtd b/id/ssl-observatory.dtd
index 297504f..034584d 100644
--- a/id/ssl-observatory.dtd
+++ b/id/ssl-observatory.dtd
@@ -20,14 +20,13 @@ to turn it on?">-->
 <!-- Observatory preferences dialog -->
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"It is safe to enable this, unless you use a very
-intrusive corporate network:">
+"Aman untuk mengaktifkan ini, kecuali jika anda sangat enter jaringan perusahaan yang sangat mengganggu">
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"Aman, kecuali jika anda menggunakan jaringan perusahaan dengan nama server intranet rahasia">
 
 <!ENTITY ssl-observatory.prefs.alt_roots 
-"Submit and check certificates signed by non-standard root CAs">
+"Kirim dan cek sertifikat yang ditanda tangani oleh non-standard root CAs">
 
 <!ENTITY ssl-observatory.prefs.alt_roots_tooltip 
 "It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority.  If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce.  So we leave it off by default.">



More information about the tor-commits mailing list