[tor-commits] [translation/https_everywhere] Update translations for https_everywhere
translation at torproject.org
translation at torproject.org
Thu Nov 20 12:45:17 UTC 2014
commit 3b319a3eb2c64535ef70ecb0407c8680e8cf2613
Author: Translation commit bot <translation at torproject.org>
Date: Thu Nov 20 12:45:13 2014 +0000
Update translations for https_everywhere
---
fo/ssl-observatory.dtd | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/fo/ssl-observatory.dtd b/fo/ssl-observatory.dtd
index dcbb155..9c9da38 100644
--- a/fo/ssl-observatory.dtd
+++ b/fo/ssl-observatory.dtd
@@ -20,14 +20,14 @@ to turn it on?">-->
<!-- Observatory preferences dialog -->
<!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"Tað er trygd at koyra frá, uttan at tú ert ein
+"Tað er trygt at koyra frá, uttan so at tú ert ein
øgiliga ágandadi stórfyritøka:">
<!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"Trygt, um ikki tú brúkar netið hjá einari stórfyritøku við loyniligum intranetsnøvnum:">
<!ENTITY ssl-observatory.prefs.alt_roots
-"Submit and check certificates signed by non-standard root CAs">
+"Melda til og kanna váttanir, skrivaðar undir av óvanligum "root CA"-um">
<!ENTITY ssl-observatory.prefs.alt_roots_tooltip
"It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority. If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce. So we leave it off by default.">
More information about the tor-commits
mailing list