[tor-commits] [translation/https_everywhere] Update translations for https_everywhere
translation at torproject.org
translation at torproject.org
Sat May 23 20:45:18 UTC 2015
commit e6482c33d2b740fb53f0457a4e53a045e1c5135a
Author: Translation commit bot <translation at torproject.org>
Date: Sat May 23 20:45:16 2015 +0000
Update translations for https_everywhere
---
id/ssl-observatory.dtd | 7 +++----
1 file changed, 3 insertions(+), 4 deletions(-)
diff --git a/id/ssl-observatory.dtd b/id/ssl-observatory.dtd
index 297504f..034584d 100644
--- a/id/ssl-observatory.dtd
+++ b/id/ssl-observatory.dtd
@@ -20,14 +20,13 @@ to turn it on?">-->
<!-- Observatory preferences dialog -->
<!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"It is safe to enable this, unless you use a very
-intrusive corporate network:">
+"Aman untuk mengaktifkan ini, kecuali jika anda sangat enter jaringan perusahaan yang sangat mengganggu">
<!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"Aman, kecuali jika anda menggunakan jaringan perusahaan dengan nama server intranet rahasia">
<!ENTITY ssl-observatory.prefs.alt_roots
-"Submit and check certificates signed by non-standard root CAs">
+"Kirim dan cek sertifikat yang ditanda tangani oleh non-standard root CAs">
<!ENTITY ssl-observatory.prefs.alt_roots_tooltip
"It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority. If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce. So we leave it off by default.">
More information about the tor-commits
mailing list