[tor-commits] [tor-glossary/master] update german translations (#28417)

emmapeel at torproject.org emmapeel at torproject.org
Thu Nov 15 15:50:20 UTC 2018


commit ad1edfe14c1954eb17646ab89100f880b31dd883
Author: traumschule <traumschuleriebau at riseup.net>
Date:   Thu Nov 15 11:21:41 2018 +0100

    update german translations (#28417)
---
 glossary_de.csv | 228 ++++++++++++++++++++++++++++----------------------------
 1 file changed, 114 insertions(+), 114 deletions(-)

diff --git a/glossary_de.csv b/glossary_de.csv
index 797ca76..b01c5a9 100644
--- a/glossary_de.csv
+++ b/glossary_de.csv
@@ -1,7 +1,7 @@
 term,pos,comment,de
- donation process,,,
- testing,,,
- third-party,,,
+ donation process,,, Spendenprozess
+ testing,,, wird geprüft
+ third-party,,, aus dritter Hand
 !,Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",!
 """",Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",»«
 $,,,
@@ -13,7 +13,7 @@ $,,,
 Two-factor authentication
 ""Something you know, and something you have."" Login systems that require only a username and password risk being broken when someone else can obtain (or guess) those pieces of information. Services that offer two-factor authentication also require you to provide a separate confirmation that you are who you say you are. The second factor could be a one-off secret code, a number generated by a program running on a mobile device, or a device that you carry and that you can use to confirm who you are. Companies like banks, and major internet services like Google, Paypal and Twitter now offer two-factor authentication.
 Synonyms: two-step verification, multi-factor authentication.
-Source EFF.",
+Source EFF.",2-Faktor-Authentifzierung
 3D bar chart,Noun,[Martus],3D Balkendiagramm
 3rd party,Adjective,[Signal] As in “Use a 3rd party application.”,
 :,Conjunction,"Punctuation, not a conjunction, however “punctionation” is not an option in Transifex",:
@@ -24,7 +24,7 @@ A security-oriented operating system,Noun,[Qubes OS],Ein sicherheitsorientiertes
 ADIDS,Noun,what is that?,
 API,Noun,"Application Programming Interface: ""In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software."" - Wikipedia",API
 APK,Noun,"""Android application package (APK) is the package file format used to distribute and install application software and middleware onto Google's Android operating system and sometimes on the BlackBerry OS 10."" https://en.wikipedia.org/wiki/Android_application_package",APK
-About,Noun,,
+About,Noun,,Über
 Alice,,[Briar],
 American Apparel,,,
 Android,Noun,[Signal] [Orbot] Operating system,Android
@@ -33,73 +33,73 @@ App Store,Noun,Apple App Store [Signal],App Store
 AppVM,Noun,"[Qubes OS] ""Application Virtual Machine""A VM which is intended for running software applications.",
 Apt.,,,
 Ativistas,,,
-Autocrypt Setup Message,Noun,[Enigmail] [OpenKeychain],
-Autonomous System number,Noun,,
+Autocrypt Setup Message,Noun,[Enigmail] [OpenKeychain],Autocrypt Installations-Nachricht
+Autonomous System number,Noun,,AS-Nummer
 BCC,Noun,"""Blind carbon copy""",BCC
-Back,Adverb,,
-Back to,,,
+Back,Adverb,,Zurück
+Back to,,,Zurück zu
 Backup Key File,Noun,[Martus] Also: key backup,Sicherungsschlüsseldatei
 Benetech,Noun,Company name which should not be translated or transcribed.,
 BitTorrent,,,
 Bitcoin,,,
-Blow the Whistle,Noun,[Globaleaks],
+Blow the Whistle,Noun,[Globaleaks],Hinweise geben
 Blow the Whistle,Verb,[Globaleaks] GlobaLeaks catch phrase,Hinweise geben
 Bob,,[Briar],
-Bug,,,
+Bug,,,Fehler
 C&C,Noun,"A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
 Synonyms: Command and control server, C2.
-Source EFF.",
+Source EFF.","C&C (Kommando und Kontroll-Server, kontrolliert infizierte Computer)"
 C2,Noun,"A command and control server (C&C or C2) is a computer that gives orders to malware-infected devices and receives information from those devices. Some C&C servers control millions of devices.
 Synonyms: Command and control server, C2.
-Source EFF.",
-CFC program,,,
+Source EFF.","C2 (Kommando und Kontroll-Server, kontrolliert infizierte Computer)"
+CFC program,,,CFC-Programm
 CIDR,Noun,Classless inter-domain routing,
 CPU,Noun,,
 CSR,Noun,Certificate Signing Request,
 CSRF,Noun,,
 CVC,,,
-Cancel,Verb,,
-Card Number,,,
+Cancel,Verb,,Abbrechen
+Card Number,,,Kartennummber
 Carol,,[Briar],
-Certificate Signing Request,Noun,,
+Certificate Signing Request,Noun,,CSR (Zertifikat-Signierungs-Anfrage)
 ChatSecure,Noun,Application Name,
 Chrome App,Noun,[Signal],
 Chrome OS,Noun,,
 Chrome Web Store,Noun,,
-Circuit Display,Noun,[Tor],
-Clear,Noun,,
-Clearnet,Noun,,Sichtbare Internet
-Client User Interface,Noun,,Client-Benutzeroberfläche
+Circuit Display,Noun,[Tor],Kanal-Anzeige
+Clear,Noun,,Löschen
+Clearnet,Noun,,Sichtbares Internet
+Client User Interface,Noun,,Programm-Benutzeroberfläche
 ClockVM,Noun,,
-Combined Federal Campaign,,,
+Combined Federal Campaign,,,kombinierte behördliche Kampagne
 Command-line tool,Noun,"The ""command line"" is an ancient way of giving a computer a series of small, self-contained orders (think of those science fiction movies where teenage geniuses type long strings of green text onto black screens). To use a command line tool, the user types a command into a window called a terminal emulator, hits the return or enter key, and then receives a textual response in the same window. Windows, Linux and Apple desktop computers still let you run software using this interface, and even some mobile phones can do the same with the right app. The command line can be used to run software pre-packaged with your operating system. Some downloadable programs, especially technical utilities, use the command line instead of a more familiar ""icons and buttons"" user interface. The command line needn't be scary, but it does require you to type in exactly the right set of letters and numbers to get the correct result, and it's often unclear what to do if the resp
 onses don't match your expectations.
 Source EFF.",Befehlszeilenwerkzeug
-Comments,,,
+Comments,,,Kommentare
 Commit,Noun,,
 Commit,Verb,,
-Company,,,
-Contributions,,,
-Contributors,Noun,,
-Core,,,
+Company,,,Firma
+Contributions,,,Beiträge
+Contributors,Noun,,Mitwirkende
+Core,,,Kern
 Courier,Noun,"App name. Do not translate the app name. If necessary, transcribe the name into translation language and place in parentheses after the original name. Ex: Courier (كوريور)",
-"Credit Card, credit card",,,
-Cross-site scripting,Noun,,
-Crowdfunding,,,
-Crypto,Adjective,,
-Crypto,Noun,This is an abbreviation of “cryptography.”,
-Customization Template Files (*.mct),Noun,[Martus],
+"Credit Card, credit card",,,Kreditkarte
+Cross-site scripting,Noun,,Seiten übergreifende Skripte
+Crowdfunding,,,Schwarmfinanzierung
+Crypto,Adjective,,crypto
+Crypto,Noun,This is an abbreviation of “cryptography.”,Crypto
+Customization Template Files (*.mct),Noun,[Martus],angepasste Vorlagen-Dateien (*.mct)
 DD,Noun,,
 DDoS,Noun,"A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware.
 Synonyms: distributed denial of service
-Source EFF",
+Source EFF",verteilte Dienstblockade (DdoS)
 DDoS (distributed denial of service),Noun,"A method for taking a website or other Internet service offline, by co-ordinating many different computers to request or send data to it simultaneously. Usually the computers used to conduct such an attack are remotely controlled by criminals, who have taken over the machines by breaking into them, or infecting them with malware. (Synonyms: DDoS) (Source EFF)",
-DHT,Noun,,
-DNS,Noun,[Orbot],DNS
-DNS record,Noun,,
+DHT,Noun,,verteilte Streuwerttabelle (DHT)
+DNS,Noun,Domain Name Server,
+DNS record,Noun,,DNS-Eintrag
 DVM,Noun,"[Qubes] An abbreviation of DispVM, typically used to refer to DVM Templates.",
 DVM Template,Noun,[Qubes] TemplateBasedVMs on which DispVMs are based.,
 Darknet,Noun,,
-Data Retention Strategy,Noun,,
+Data Retention Strategy,Noun,,Datenspeicherungsstrategie
 Data Source Grid,Noun,,
 Data-Driven Dropdown (Field),Noun,[Matus],
 Date,Noun,,
@@ -365,7 +365,7 @@ Newsletter,Noun,,Infobrief
 Next,Noun,“Next” button,
 No,Noun,,
 Node,Noun,,Knotenpunkt
-Non-Tor,Noun,,
+Non-Tor,Noun,,Nicht-Tor
 Notes,,,
 OK,Noun,[Signal] “OK” button which can also be translated as “Accept”,
 OPML,Noun,"Outline Processor Markup Language
@@ -378,13 +378,13 @@ Observatory,Noun,,Beobachtungsstelle
 Off,Adjective,,Aus
 Off-the-Record,Noun,"[Orbot] Messaging systems are often unencrypted. OTR is a way of adding encryption to them, so that you can keep using familiar networks like Facebook chat, Google Chat or Hangouts but with your messages more resistant to surveillance. The OTR cryptographic protocol provides strong encryption for  messaging conversations. (Synonyms : OTR) (Source EFF)",
 Oil pipeline,Noun,,
-On,Adjective,,
+On,Adjective,,An
 One-time password,Noun,"Passwords are usually semi-permanent: once you set them up, you can keep using them until you manually change or reset them. One-time passwords only work once. Some one-time password systems work by having a tool or program that can create many different one-time passwords, that you use in turn. This is useful if you're afraid that there may be a key-logger on a system where you have to type in a password.
 Source EFF.",
 Onion,Noun,[Tor],
-Onion Address,Noun,[Tor],
+Onion Address,Noun,[Tor],Onion-Adresse
 Onion Browser,Noun,[Tor],
-Onion Circuits,Noun,[Tor],
+Onion Circuits,Noun,[Tor],Onion-Kanäle
 Onion routing,Noun,[Tor],
 Open Observatory of Network Interference,,,
 Open Observatory of Network Interference (OONI) ,,,
@@ -613,7 +613,7 @@ TRIM,Noun,"[VeraCrypt] ""A trim command (known as TRIM in the ATA command set, a
 TRIM command,Noun,"[VeraCrypt] ""A trim command (known as TRIM in the ATA command set, and UNMAP in the SCSI command set) allows an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally."" https://en.wikipedia.org/wiki/Trim_(computing)",
 TTL,Noun,,
 Tails,Noun,Name of the organization and tool.,Tails
-Tails Installer,Noun,Tails = The Amnesic Incognito Live System,
+Tails Installer,Noun,Tails = The Amnesic Incognito Live System,Tails-Installateur
 Take a stand,,,
 Tamanho,,,
 TemplateBasedHVM,Noun,"[QubesOS] ""Template-Based Hardware Virtual Machine""Any HVM that depends on a TemplateVM for its root filesystem.",
@@ -623,8 +623,8 @@ TemplateVM,Noun,"[QubesOS] ""Template Virtual Machine.""Any VM which supplies it
 Terms & Privacy Policy,Noun,[Signal],
 Text message,Noun,Synonym: SMS,
 Thanks You,,,
-Threat,Noun,"In computer security, a threat is a potential event that could undermine your efforts to defend your data. Threats can be intentional (conceived by attackers), or they could be accidental (you might leave your computer turned on and unguarded). (Source EFF)",
-Threat model,Verb,,
+Threat,Noun,"In computer security, a threat is a potential event that could undermine your efforts to defend your data. Threats can be intentional (conceived by attackers), or they could be accidental (you might leave your computer turned on and unguarded). (Source EFF)",Gefahr
+Threat model,Verb,,Gefahrenmodell
 Threat modeling,Noun,"A way of narrowly thinking about the sorts of protection you want for your data. It's impossible to protect against every kind of trick or attacker, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible attacks you plan to protect against is called threat modeling. Once you have a threat model, you can conduct a risk analysis. (Synonyms: Threat model) (Source EFF)",
 Throwaway,Noun,"A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash. (Synonyms: Burner phone) (Source EFF)",
 Throwaway address,Noun,"An email address you use once, and never again. Used to sign up to Internet services without revealing an email address connected to your identity.
@@ -648,12 +648,12 @@ Tor Project,Noun,[Orbot] Organization name. Do not translate. Name can be transc
 Tor bridge,Noun,,Tor-Brücke
 Tor messenger,Noun,[The Tor Project],
 Tor network,Noun,,Tor-Netzwerk
-Tor relay,Noun,[Tor] [Orbot],Tor-Relais
+Tor relay,Noun,[Tor] [Orbot],Tor-Relay
 Torbutton,Noun,,
 Touch ID,Noun,[Signal] Specific to iOS,
 Trademark,Noun,,
 Twitter,,,
-Two-Factor,Noun,,
+Two-Factor,Noun,,Zwei-Faktor
 UI,Noun,user interface,
 URL,Noun,,URL
 US $,,,
@@ -667,15 +667,15 @@ VM,Noun,"""virtual machine""",
 VPN,,,
 VPN,Noun,"A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance.
 Synonyms: Virtual Private Network
-Source: EFF",
-VPNs,,,
-Vanilla Bridges,,,
+Source: EFF",Virtuelles Privates Netzwerk (VPN)
+VPNs,,,Virtuelle Private Netzwerke (VPNs)
+Vanilla Bridges,,,Standard-Brücken
 Vidalia,Noun,,
-Virtual Machine (VM),Noun,"A software implementation of a machine (for example, a computer) which executes programs like a physical machine.",
+Virtual Machine (VM),Noun,"A software implementation of a machine (for example, a computer) which executes programs like a physical machine.",Virtuelle Maschine (VM)
 Virtual Private Network (VPN),Noun,"A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. (Synonyms: VPN) (Source: EFF)",
 "Virtual Private Network, VPN",Noun,"[Orbot] A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications is packaged together, encrypted and then relayed to this other organization, where it is decrypted, unpacked, and then sent on to its destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. (Synonyms: Virtual Private Network) (Source: EFF)",
 Virtual Private Server (VPS),Noun,Virtual Private Server,
-VoIP Call,Noun,,
+VoIP Call,Noun,,VoIP-Anruf
 Voice over IP (VoIP),Noun,"Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet.
 Synonyms: VoIP.
 Source EFF.",
@@ -868,9 +868,9 @@ box,Noun,,Kästchen
 break in,Noun,,Einbruch
 bridge,Noun,[Orbot] [Tor],Brücke
 bridge,Verb,[Tor],überbrücken
-bridge line,Noun,[Tor] a line with the bridge configuration,
-bridge relay,Noun,[Tor],
-bridge type,Noun,[Tor],
+bridge line,Noun,[Tor] a line with the bridge configuration,Brücken-Konfiguration
+bridge relay,Noun,[Tor],Brücken-Relais
+bridge type,Noun,[Tor],Brücken-Typ
 broad range,,,
 broadcast,Verb,[Signal],
 browse,Verb,[Orbot],durchsuchen
@@ -884,31 +884,31 @@ bug,Noun,,Fehler
 bug report,Noun,[Signal],Fehlermeldung
 bundle,Noun,,Bündel
 bundled,Adjective,,gebündelt
-burden,,,
+burden,,,Last
 burner phone,Noun,"A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash. (Synonyms: Throwaway)
 (Source: EFF)",Wegwerfhandy
 button,Noun,,Schaltfläche
-by,Adverb,,
+by,Adverb,,von
 bypass,Verb,,vorbeikommen
 bytes,Noun,[Globaleaks],Bytes
 cache,Noun,,
 cache,Verb,,
 cache-busting,Noun,,
-calendar,Noun,,
-camera,Noun,,
-cams,,,
-can,Verb,,
+calendar,Noun,,Kalender
+camera,Noun,,Kamera
+cams,,,Kameras
+can,Verb,,kann
 cancel,Verb,[Signal],abbrechen
-cannot,Verb,,
+cannot,Verb,,kann nicht
 capability,Noun,"The capability of an attacker (in the context of an attack) is what it is able to do to achieve its aims. For example, a country's security services might have the capability to listen to telephone calls while a neighbor may have the capability to watch you from their window. To say that an attacker “has"" a capability does not mean that they will necessarily use that capability. It does mean that you should consider and prepare for the possibility.
-Source EFF.",
-car documents,Noun,[Umbrella],
-carjacking,Noun,,
-carry,,,
-case management,Noun,[GlobaLeaks],
-cash,,,
+Source EFF.",Fähigkeit
+car documents,Noun,[Umbrella],KFZ-Brief
+carjacking,Noun,,KFZ-Dienstahl
+carry,,,tragen
+case management,Noun,[GlobaLeaks],Fall-Verwaltung
+cash,,,Bargeld
 cc,Noun,“carbon copy”,
-censor,,,
+censor,,,Zensor
 censored,,,
 censored,Adjective,,
 censorship,,,
@@ -921,12 +921,12 @@ certificate chain,Noun,[Globaleaks],Zertifikatskette
 certificate chain file,Noun,[Globaleaks],
 certificates,Noun,"Is it needed, the plural form defined here? The singular already exists.",Zertifikate
 chain,Noun,,Kette
-change,Verb,,
-change log,Noun,,
-charges,,,
+change,Verb,,Änderung
+change log,Noun,,Changelog
+charges,,,Anklage
 chart,Noun,,
 chat,Noun,[Signal],Unterhaltung
-chat,Verb,[Signal],
+chat,Verb,[Signal],reden
 check,Verb,,überprüfen
 checking,,,
 checkpoint,Noun,,
@@ -937,11 +937,11 @@ choker,Noun,,
 choose,Verb,,
 choose ,Verb,,
 chronic stress,Noun,,
-cipher,Noun,,
+cipher,Noun,,Code
 ciphertext,Noun,,Geheimtext
-circuit,Noun,[Orbot],Schaltkreis
-circuits,,,
-circuits,Noun,,
+circuit,Noun,[Orbot],Kanal
+circuits,,,Kanäle
+circuits,Noun,,Kanäle
 circumvent,Verb,[Orbot],umgehen
 circumvention,Noun,[Signal] [Orbot],Umgehung
 clear,Verb,[Signal] [Orbot],Löschen
@@ -1129,20 +1129,20 @@ discouraged,,,
 discussion,Noun,,
 disk,Noun,"In most contexts in Martus, ""disk"" refers to any sort of removable storage device (USB, CD, floppy disk etc.)",
 diversify,,,
-document,Noun,[Signal],
+document,Noun,[Signal],Dokument
 domain,Noun,An area or set of activities in one's digital life that has certain security requirements and therefore involves the use of certain qube.,Domain
 domain name,Noun,"The address, in words, of a website or Internet service; for example: ssd.eff.org. (Source: EFF)",
-domestic violence survivors,,,
-donating,,,
-donation,,,
-donations,,,
+domestic violence survivors,,,Überlebende häuslicher Gewalt
+donating,,,spenden
+donation,,,Spende
+donations,,,Spenden
 donations,Noun,"feminine noun, otherwise a (V) verb. 
 eu doo
 tu doas
 ele doa
 nós doamos
 vós doais
-eles doam",
+eles doam",Spenden
 donations options,,,
 donor,Noun,,
 download,,,
@@ -1194,16 +1194,16 @@ exchange,Verb,,
 excited,,,
 executable,Noun,,
 exercised,,,
-exit,Noun,,
+exit,Noun,,Ausgang
 exit,Verb,,verlassen
-exit relay,,,
+exit relay,,,Exit-Server
 exit relay,Noun,,Exit-Server
-exited,Verb,,Verlassen
-experience,Verb,,
-expiration,Noun,,
+exited,Verb,,verlassen
+experience,Verb,,Erfahrung
+expiration,Noun,,Ablauf
 expiration date,Noun,,Ablaufdatum
-expire,Verb,[Signal],
-expired,Noun,,
+expire,Verb,[Signal],ablaufen
+expired,Noun,,abgelaufen
 expiry,Noun,[Globaleaks],Ablauf
 expiry,Verb,[Signal],
 export,Noun,[Signal],
@@ -1288,16 +1288,16 @@ goal,Noun,,
 grants,,,
 guard,Noun,,Wächter
 guard relay,Noun,[The Tor Project],Wächterrelais
-guidelines,Noun,,
-handshake,Noun,Signal exchange process between pieces of equipment until they are synchronized. Transmitting and receiving communication can then take place.,
+guidelines,Noun,,Richtlinien
+handshake,Noun,Signal exchange process between pieces of equipment until they are synchronized. Transmitting and receiving communication can then take place.,Handschlag
 hardware,,,
-header,Noun,,
+header,Noun,,Kopfzeilen
 help,Noun,,Hilfe
 help,Verb,,helfen
-helper link,Noun,,
+helper link,Noun,,Hilfe-Verweis
 helper link ,Noun,,
-hidden service,Noun,,
-hidden services,,,
+hidden service,Noun,[Tor],Onion-Dienst
+hidden services,,[Tor],Onion-Dienste
 hidden volume,Noun,[VeraCrypt],
 hide,Verb,,verstecken
 high bandwidth,Noun,,
@@ -1473,7 +1473,7 @@ meta search engine,,,
 metadata,Noun,"Metadata (or ""data about data"") is everything about a piece of information, apart from the information itself. So the content of a message is not metadata, but who sent it, when, where from, and to whom, are all examples of metadata. Legal systems often protect content more than metadata: for instance, in the United States, law enforcement needs a warrant to listen to a person's telephone calls, but claims the right to obtain the list of who you have called far more easily. However, metadata can often reveal a great deal, and will often need to be protected as carefully as the data it describes. (Source EFF) [Signal]",Meta-Daten
 method,,,
 microphone,Noun,[Signal],
-middle relay,Noun,,
+middle relay,Noun,,Mittel-Relais
 migrate,Verb,[Signal],
 miniLock,Noun,,miniLock
 minimize,Verb,Minimize a window,
@@ -1527,20 +1527,20 @@ notify,Verb,,
 obfuscate,Verb,"[Orbot] Transforming of a section of code or program to make it totally unintelligible to a human reader, even if helped by software tools.",verschleiern
 obfuscation,Noun,"Transformation of a section of code or program to make it totally unintelligible to a human reader, even if helped by software tools.",
 obfuscation layer,Noun,"Related to data transmission
-[Tor]",
+[Tor]",Verschleierungs-Schicht
 offline,Adjective,[Signal],
-onboarding,Noun,,
-once,,,
+onboarding,Noun,,Begrüßung
+once,,,ein Mai
 onion service,Noun,[Tor],Onion-Dienst
 online,,,
 online,Adjective,[Signal],
-open,Adjective,,
+open,Adjective,,offen
 open,Verb,,öffnen
-open source,Noun,[Orbot],
+open source,Noun,[Orbot],quelloffen
 open-source,Adjective,[Orbot],Open Source
 opened,Verb,,geöffnet
-operate,,,
-operator,Noun,,
+operate,,,betreiben
+operator,Noun,,betreibende Person
 opt,,,
 optical,Adjective,,optisch
 optimization,Noun,[Orbot],
@@ -1709,17 +1709,17 @@ referral code,Noun,,
 refund,,,
 refunded,,,
 register,Verb,,Benutzerkonto anlegen
-regular,Adjective,,
-regular expression,Noun,,
-reinstall,Verb,[Signal],
-reject,,,
-relay,,,
-relay,Noun,[Orbot],Relais
+regular,Adjective,,gewöhnlich
+regular expression,Noun,,regulärer Ausdruck
+reinstall,Verb,[Signal],neu installieren
+reject,,,ablehnen
+relay,,,Relay
+relay,Noun,[Orbot],Relay
 relay,Verb,[Signal],weiterleiten / umleiten
-relay directory,Noun,,
-relay node,Noun,[Orbot],
-relays,,,
-relays,Noun,,
+relay directory,Noun,,Relay-Verzeichnis
+relay node,Noun,[Orbot],Relay-Knoten
+relays,,,Relays
+relays,Noun,,Relays
 release,Noun,,Veröffentlichung
 release,Verb,,
 release candidate,Noun,,





More information about the tor-commits mailing list