commit ad1edfe14c1954eb17646ab89100f880b31dd883
Author: traumschule <traumschulerie...@riseup.net>
Date:   Thu Nov 15 11:21:41 2018 +0100

    update german translations (#28417)
---
 glossary_de.csv | 228 ++++++++++++++++++++++++++++----------------------------
 1 file changed, 114 insertions(+), 114 deletions(-)

diff --git a/glossary_de.csv b/glossary_de.csv
index 797ca76..b01c5a9 100644
--- a/glossary_de.csv
+++ b/glossary_de.csv
@@ -1,7 +1,7 @@
 term,pos,comment,de
- donation process,,,
- testing,,,
- third-party,,,
+ donation process,,, Spendenprozess
+ testing,,, wird geprüft
+ third-party,,, aus dritter Hand
 !,Conjunction,"Punctuation, not a conjunction, however “punctionation” is 
not an option in Transifex",!
 """",Conjunction,"Punctuation, not a conjunction, however “punctionation” 
is not an option in Transifex",»«
 $,,,
@@ -13,7 +13,7 @@ $,,,
 Two-factor authentication
 ""Something you know, and something you have."" Login systems that require 
only a username and password risk being broken when someone else can obtain (or 
guess) those pieces of information. Services that offer two-factor 
authentication also require you to provide a separate confirmation that you are 
who you say you are. The second factor could be a one-off secret code, a number 
generated by a program running on a mobile device, or a device that you carry 
and that you can use to confirm who you are. Companies like banks, and major 
internet services like Google, Paypal and Twitter now offer two-factor 
authentication.
 Synonyms: two-step verification, multi-factor authentication.
-Source EFF.",
+Source EFF.",2-Faktor-Authentifzierung
 3D bar chart,Noun,[Martus],3D Balkendiagramm
 3rd party,Adjective,[Signal] As in “Use a 3rd party application.”,
 :,Conjunction,"Punctuation, not a conjunction, however “punctionation” is 
not an option in Transifex",:
@@ -24,7 +24,7 @@ A security-oriented operating system,Noun,[Qubes OS],Ein 
sicherheitsorientiertes
 ADIDS,Noun,what is that?,
 API,Noun,"Application Programming Interface: ""In computer programming, an 
application programming interface (API) is a set of subroutine definitions, 
protocols, and tools for building application software."" - Wikipedia",API
 APK,Noun,"""Android application package (APK) is the package file format used 
to distribute and install application software and middleware onto Google's 
Android operating system and sometimes on the BlackBerry OS 10."" 
https://en.wikipedia.org/wiki/Android_application_package",APK
-About,Noun,,
+About,Noun,,Über
 Alice,,[Briar],
 American Apparel,,,
 Android,Noun,[Signal] [Orbot] Operating system,Android
@@ -33,73 +33,73 @@ App Store,Noun,Apple App Store [Signal],App Store
 AppVM,Noun,"[Qubes OS] ""Application Virtual Machine""A VM which is intended 
for running software applications.",
 Apt.,,,
 Ativistas,,,
-Autocrypt Setup Message,Noun,[Enigmail] [OpenKeychain],
-Autonomous System number,Noun,,
+Autocrypt Setup Message,Noun,[Enigmail] [OpenKeychain],Autocrypt 
Installations-Nachricht
+Autonomous System number,Noun,,AS-Nummer
 BCC,Noun,"""Blind carbon copy""",BCC
-Back,Adverb,,
-Back to,,,
+Back,Adverb,,Zurück
+Back to,,,Zurück zu
 Backup Key File,Noun,[Martus] Also: key backup,Sicherungsschlüsseldatei
 Benetech,Noun,Company name which should not be translated or transcribed.,
 BitTorrent,,,
 Bitcoin,,,
-Blow the Whistle,Noun,[Globaleaks],
+Blow the Whistle,Noun,[Globaleaks],Hinweise geben
 Blow the Whistle,Verb,[Globaleaks] GlobaLeaks catch phrase,Hinweise geben
 Bob,,[Briar],
-Bug,,,
+Bug,,,Fehler
 C&C,Noun,"A command and control server (C&C or C2) is a computer that gives 
orders to malware-infected devices and receives information from those devices. 
Some C&C servers control millions of devices.
 Synonyms: Command and control server, C2.
-Source EFF.",
+Source EFF.","C&C (Kommando und Kontroll-Server, kontrolliert infizierte 
Computer)"
 C2,Noun,"A command and control server (C&C or C2) is a computer that gives 
orders to malware-infected devices and receives information from those devices. 
Some C&C servers control millions of devices.
 Synonyms: Command and control server, C2.
-Source EFF.",
-CFC program,,,
+Source EFF.","C2 (Kommando und Kontroll-Server, kontrolliert infizierte 
Computer)"
+CFC program,,,CFC-Programm
 CIDR,Noun,Classless inter-domain routing,
 CPU,Noun,,
 CSR,Noun,Certificate Signing Request,
 CSRF,Noun,,
 CVC,,,
-Cancel,Verb,,
-Card Number,,,
+Cancel,Verb,,Abbrechen
+Card Number,,,Kartennummber
 Carol,,[Briar],
-Certificate Signing Request,Noun,,
+Certificate Signing Request,Noun,,CSR (Zertifikat-Signierungs-Anfrage)
 ChatSecure,Noun,Application Name,
 Chrome App,Noun,[Signal],
 Chrome OS,Noun,,
 Chrome Web Store,Noun,,
-Circuit Display,Noun,[Tor],
-Clear,Noun,,
-Clearnet,Noun,,Sichtbare Internet
-Client User Interface,Noun,,Client-Benutzeroberfläche
+Circuit Display,Noun,[Tor],Kanal-Anzeige
+Clear,Noun,,Löschen
+Clearnet,Noun,,Sichtbares Internet
+Client User Interface,Noun,,Programm-Benutzeroberfläche
 ClockVM,Noun,,
-Combined Federal Campaign,,,
+Combined Federal Campaign,,,kombinierte behördliche Kampagne
 Command-line tool,Noun,"The ""command line"" is an ancient way of giving a 
computer a series of small, self-contained orders (think of those science 
fiction movies where teenage geniuses type long strings of green text onto 
black screens). To use a command line tool, the user types a command into a 
window called a terminal emulator, hits the return or enter key, and then 
receives a textual response in the same window. Windows, Linux and Apple 
desktop computers still let you run software using this interface, and even 
some mobile phones can do the same with the right app. The command line can be 
used to run software pre-packaged with your operating system. Some downloadable 
programs, especially technical utilities, use the command line instead of a 
more familiar ""icons and buttons"" user interface. The command line needn't be 
scary, but it does require you to type in exactly the right set of letters and 
numbers to get the correct result, and it's often unclear what to do if the resp
 onses don't match your expectations.
 Source EFF.",Befehlszeilenwerkzeug
-Comments,,,
+Comments,,,Kommentare
 Commit,Noun,,
 Commit,Verb,,
-Company,,,
-Contributions,,,
-Contributors,Noun,,
-Core,,,
+Company,,,Firma
+Contributions,,,Beiträge
+Contributors,Noun,,Mitwirkende
+Core,,,Kern
 Courier,Noun,"App name. Do not translate the app name. If necessary, 
transcribe the name into translation language and place in parentheses after 
the original name. Ex: Courier (كوريور)",
-"Credit Card, credit card",,,
-Cross-site scripting,Noun,,
-Crowdfunding,,,
-Crypto,Adjective,,
-Crypto,Noun,This is an abbreviation of “cryptography.”,
-Customization Template Files (*.mct),Noun,[Martus],
+"Credit Card, credit card",,,Kreditkarte
+Cross-site scripting,Noun,,Seiten übergreifende Skripte
+Crowdfunding,,,Schwarmfinanzierung
+Crypto,Adjective,,crypto
+Crypto,Noun,This is an abbreviation of “cryptography.”,Crypto
+Customization Template Files (*.mct),Noun,[Martus],angepasste Vorlagen-Dateien 
(*.mct)
 DD,Noun,,
 DDoS,Noun,"A method for taking a website or other Internet service offline, by 
co-ordinating many different computers to request or send data to it 
simultaneously. Usually the computers used to conduct such an attack are 
remotely controlled by criminals, who have taken over the machines by breaking 
into them, or infecting them with malware.
 Synonyms: distributed denial of service
-Source EFF",
+Source EFF",verteilte Dienstblockade (DdoS)
 DDoS (distributed denial of service),Noun,"A method for taking a website or 
other Internet service offline, by co-ordinating many different computers to 
request or send data to it simultaneously. Usually the computers used to 
conduct such an attack are remotely controlled by criminals, who have taken 
over the machines by breaking into them, or infecting them with malware. 
(Synonyms: DDoS) (Source EFF)",
-DHT,Noun,,
-DNS,Noun,[Orbot],DNS
-DNS record,Noun,,
+DHT,Noun,,verteilte Streuwerttabelle (DHT)
+DNS,Noun,Domain Name Server,
+DNS record,Noun,,DNS-Eintrag
 DVM,Noun,"[Qubes] An abbreviation of DispVM, typically used to refer to DVM 
Templates.",
 DVM Template,Noun,[Qubes] TemplateBasedVMs on which DispVMs are based.,
 Darknet,Noun,,
-Data Retention Strategy,Noun,,
+Data Retention Strategy,Noun,,Datenspeicherungsstrategie
 Data Source Grid,Noun,,
 Data-Driven Dropdown (Field),Noun,[Matus],
 Date,Noun,,
@@ -365,7 +365,7 @@ Newsletter,Noun,,Infobrief
 Next,Noun,“Next” button,
 No,Noun,,
 Node,Noun,,Knotenpunkt
-Non-Tor,Noun,,
+Non-Tor,Noun,,Nicht-Tor
 Notes,,,
 OK,Noun,[Signal] “OK” button which can also be translated as “Accept”,
 OPML,Noun,"Outline Processor Markup Language
@@ -378,13 +378,13 @@ Observatory,Noun,,Beobachtungsstelle
 Off,Adjective,,Aus
 Off-the-Record,Noun,"[Orbot] Messaging systems are often unencrypted. OTR is a 
way of adding encryption to them, so that you can keep using familiar networks 
like Facebook chat, Google Chat or Hangouts but with your messages more 
resistant to surveillance. The OTR cryptographic protocol provides strong 
encryption for  messaging conversations. (Synonyms : OTR) (Source EFF)",
 Oil pipeline,Noun,,
-On,Adjective,,
+On,Adjective,,An
 One-time password,Noun,"Passwords are usually semi-permanent: once you set 
them up, you can keep using them until you manually change or reset them. 
One-time passwords only work once. Some one-time password systems work by 
having a tool or program that can create many different one-time passwords, 
that you use in turn. This is useful if you're afraid that there may be a 
key-logger on a system where you have to type in a password.
 Source EFF.",
 Onion,Noun,[Tor],
-Onion Address,Noun,[Tor],
+Onion Address,Noun,[Tor],Onion-Adresse
 Onion Browser,Noun,[Tor],
-Onion Circuits,Noun,[Tor],
+Onion Circuits,Noun,[Tor],Onion-Kanäle
 Onion routing,Noun,[Tor],
 Open Observatory of Network Interference,,,
 Open Observatory of Network Interference (OONI) ,,,
@@ -613,7 +613,7 @@ TRIM,Noun,"[VeraCrypt] ""A trim command (known as TRIM in 
the ATA command set, a
 TRIM command,Noun,"[VeraCrypt] ""A trim command (known as TRIM in the ATA 
command set, and UNMAP in the SCSI command set) allows an operating system to 
inform a solid-state drive (SSD) which blocks of data are no longer considered 
in use and can be wiped internally."" 
https://en.wikipedia.org/wiki/Trim_(computing)",
 TTL,Noun,,
 Tails,Noun,Name of the organization and tool.,Tails
-Tails Installer,Noun,Tails = The Amnesic Incognito Live System,
+Tails Installer,Noun,Tails = The Amnesic Incognito Live 
System,Tails-Installateur
 Take a stand,,,
 Tamanho,,,
 TemplateBasedHVM,Noun,"[QubesOS] ""Template-Based Hardware Virtual 
Machine""Any HVM that depends on a TemplateVM for its root filesystem.",
@@ -623,8 +623,8 @@ TemplateVM,Noun,"[QubesOS] ""Template Virtual Machine.""Any 
VM which supplies it
 Terms & Privacy Policy,Noun,[Signal],
 Text message,Noun,Synonym: SMS,
 Thanks You,,,
-Threat,Noun,"In computer security, a threat is a potential event that could 
undermine your efforts to defend your data. Threats can be intentional 
(conceived by attackers), or they could be accidental (you might leave your 
computer turned on and unguarded). (Source EFF)",
-Threat model,Verb,,
+Threat,Noun,"In computer security, a threat is a potential event that could 
undermine your efforts to defend your data. Threats can be intentional 
(conceived by attackers), or they could be accidental (you might leave your 
computer turned on and unguarded). (Source EFF)",Gefahr
+Threat model,Verb,,Gefahrenmodell
 Threat modeling,Noun,"A way of narrowly thinking about the sorts of protection 
you want for your data. It's impossible to protect against every kind of trick 
or attacker, so you should concentrate on which people might want your data, 
what they might want from it, and how they might get it. Coming up with a set 
of possible attacks you plan to protect against is called threat modeling. Once 
you have a threat model, you can conduct a risk analysis. (Synonyms: Threat 
model) (Source EFF)",
 Throwaway,Noun,"A phone that is not connected to your identity, is only used 
for a small set of calls or activities, and can be discarded if and when it is 
suspected of being tracked or compromised. Burner phones are often pre-paid 
mobile phones bought with cash. (Synonyms: Burner phone) (Source EFF)",
 Throwaway address,Noun,"An email address you use once, and never again. Used 
to sign up to Internet services without revealing an email address connected to 
your identity.
@@ -648,12 +648,12 @@ Tor Project,Noun,[Orbot] Organization name. Do not 
translate. Name can be transc
 Tor bridge,Noun,,Tor-Brücke
 Tor messenger,Noun,[The Tor Project],
 Tor network,Noun,,Tor-Netzwerk
-Tor relay,Noun,[Tor] [Orbot],Tor-Relais
+Tor relay,Noun,[Tor] [Orbot],Tor-Relay
 Torbutton,Noun,,
 Touch ID,Noun,[Signal] Specific to iOS,
 Trademark,Noun,,
 Twitter,,,
-Two-Factor,Noun,,
+Two-Factor,Noun,,Zwei-Faktor
 UI,Noun,user interface,
 URL,Noun,,URL
 US $,,,
@@ -667,15 +667,15 @@ VM,Noun,"""virtual machine""",
 VPN,,,
 VPN,Noun,"A virtual private network is a method for connecting your computer 
securely to the network of an organization on the other side of the Internet. 
When you use a VPN, all of your computer's Internet communications is packaged 
together, encrypted and then relayed to this other organization, where it is 
decrypted, unpacked, and then sent on to its destination. To the organization's 
network, or any other computer on the wider Internet, it looks like your 
computer's request is coming from inside the organization, not from your 
location. VPNs are used by businesses to provide secure access to internal 
resources (like file servers or printers). They are also used by individuals to 
bypass local censorship, or defeat local surveillance.
 Synonyms: Virtual Private Network
-Source: EFF",
-VPNs,,,
-Vanilla Bridges,,,
+Source: EFF",Virtuelles Privates Netzwerk (VPN)
+VPNs,,,Virtuelle Private Netzwerke (VPNs)
+Vanilla Bridges,,,Standard-Brücken
 Vidalia,Noun,,
-Virtual Machine (VM),Noun,"A software implementation of a machine (for 
example, a computer) which executes programs like a physical machine.",
+Virtual Machine (VM),Noun,"A software implementation of a machine (for 
example, a computer) which executes programs like a physical 
machine.",Virtuelle Maschine (VM)
 Virtual Private Network (VPN),Noun,"A virtual private network is a method for 
connecting your computer securely to the network of an organization on the 
other side of the Internet. When you use a VPN, all of your computer's Internet 
communications is packaged together, encrypted and then relayed to this other 
organization, where it is decrypted, unpacked, and then sent on to its 
destination. To the organization's network, or any other computer on the wider 
Internet, it looks like your computer's request is coming from inside the 
organization, not from your location. VPNs are used by businesses to provide 
secure access to internal resources (like file servers or printers). They are 
also used by individuals to bypass local censorship, or defeat local 
surveillance. (Synonyms: VPN) (Source: EFF)",
 "Virtual Private Network, VPN",Noun,"[Orbot] A virtual private network is a 
method for connecting your computer securely to the network of an organization 
on the other side of the Internet. When you use a VPN, all of your computer's 
Internet communications is packaged together, encrypted and then relayed to 
this other organization, where it is decrypted, unpacked, and then sent on to 
its destination. To the organization's network, or any other computer on the 
wider Internet, it looks like your computer's request is coming from inside the 
organization, not from your location. VPNs are used by businesses to provide 
secure access to internal resources (like file servers or printers). They are 
also used by individuals to bypass local censorship, or defeat local 
surveillance. (Synonyms: Virtual Private Network) (Source: EFF)",
 Virtual Private Server (VPS),Noun,Virtual Private Server,
-VoIP Call,Noun,,
+VoIP Call,Noun,,VoIP-Anruf
 Voice over IP (VoIP),Noun,"Any technology that allows you to use the Internet 
for voice communication with other VoIP users or receive telephone calls over 
the Internet.
 Synonyms: VoIP.
 Source EFF.",
@@ -868,9 +868,9 @@ box,Noun,,Kästchen
 break in,Noun,,Einbruch
 bridge,Noun,[Orbot] [Tor],Brücke
 bridge,Verb,[Tor],überbrücken
-bridge line,Noun,[Tor] a line with the bridge configuration,
-bridge relay,Noun,[Tor],
-bridge type,Noun,[Tor],
+bridge line,Noun,[Tor] a line with the bridge 
configuration,Brücken-Konfiguration
+bridge relay,Noun,[Tor],Brücken-Relais
+bridge type,Noun,[Tor],Brücken-Typ
 broad range,,,
 broadcast,Verb,[Signal],
 browse,Verb,[Orbot],durchsuchen
@@ -884,31 +884,31 @@ bug,Noun,,Fehler
 bug report,Noun,[Signal],Fehlermeldung
 bundle,Noun,,Bündel
 bundled,Adjective,,gebündelt
-burden,,,
+burden,,,Last
 burner phone,Noun,"A phone that is not connected to your identity, is only 
used for a small set of calls or activities, and can be discarded if and when 
it is suspected of being tracked or compromised. Burner phones are often 
pre-paid mobile phones bought with cash. (Synonyms: Throwaway)
 (Source: EFF)",Wegwerfhandy
 button,Noun,,Schaltfläche
-by,Adverb,,
+by,Adverb,,von
 bypass,Verb,,vorbeikommen
 bytes,Noun,[Globaleaks],Bytes
 cache,Noun,,
 cache,Verb,,
 cache-busting,Noun,,
-calendar,Noun,,
-camera,Noun,,
-cams,,,
-can,Verb,,
+calendar,Noun,,Kalender
+camera,Noun,,Kamera
+cams,,,Kameras
+can,Verb,,kann
 cancel,Verb,[Signal],abbrechen
-cannot,Verb,,
+cannot,Verb,,kann nicht
 capability,Noun,"The capability of an attacker (in the context of an attack) 
is what it is able to do to achieve its aims. For example, a country's security 
services might have the capability to listen to telephone calls while a 
neighbor may have the capability to watch you from their window. To say that an 
attacker “has"" a capability does not mean that they will necessarily use 
that capability. It does mean that you should consider and prepare for the 
possibility.
-Source EFF.",
-car documents,Noun,[Umbrella],
-carjacking,Noun,,
-carry,,,
-case management,Noun,[GlobaLeaks],
-cash,,,
+Source EFF.",Fähigkeit
+car documents,Noun,[Umbrella],KFZ-Brief
+carjacking,Noun,,KFZ-Dienstahl
+carry,,,tragen
+case management,Noun,[GlobaLeaks],Fall-Verwaltung
+cash,,,Bargeld
 cc,Noun,“carbon copy”,
-censor,,,
+censor,,,Zensor
 censored,,,
 censored,Adjective,,
 censorship,,,
@@ -921,12 +921,12 @@ certificate chain,Noun,[Globaleaks],Zertifikatskette
 certificate chain file,Noun,[Globaleaks],
 certificates,Noun,"Is it needed, the plural form defined here? The singular 
already exists.",Zertifikate
 chain,Noun,,Kette
-change,Verb,,
-change log,Noun,,
-charges,,,
+change,Verb,,Änderung
+change log,Noun,,Changelog
+charges,,,Anklage
 chart,Noun,,
 chat,Noun,[Signal],Unterhaltung
-chat,Verb,[Signal],
+chat,Verb,[Signal],reden
 check,Verb,,überprüfen
 checking,,,
 checkpoint,Noun,,
@@ -937,11 +937,11 @@ choker,Noun,,
 choose,Verb,,
 choose ,Verb,,
 chronic stress,Noun,,
-cipher,Noun,,
+cipher,Noun,,Code
 ciphertext,Noun,,Geheimtext
-circuit,Noun,[Orbot],Schaltkreis
-circuits,,,
-circuits,Noun,,
+circuit,Noun,[Orbot],Kanal
+circuits,,,Kanäle
+circuits,Noun,,Kanäle
 circumvent,Verb,[Orbot],umgehen
 circumvention,Noun,[Signal] [Orbot],Umgehung
 clear,Verb,[Signal] [Orbot],Löschen
@@ -1129,20 +1129,20 @@ discouraged,,,
 discussion,Noun,,
 disk,Noun,"In most contexts in Martus, ""disk"" refers to any sort of 
removable storage device (USB, CD, floppy disk etc.)",
 diversify,,,
-document,Noun,[Signal],
+document,Noun,[Signal],Dokument
 domain,Noun,An area or set of activities in one's digital life that has 
certain security requirements and therefore involves the use of certain 
qube.,Domain
 domain name,Noun,"The address, in words, of a website or Internet service; for 
example: ssd.eff.org. (Source: EFF)",
-domestic violence survivors,,,
-donating,,,
-donation,,,
-donations,,,
+domestic violence survivors,,,Überlebende häuslicher Gewalt
+donating,,,spenden
+donation,,,Spende
+donations,,,Spenden
 donations,Noun,"feminine noun, otherwise a (V) verb. 
 eu doo
 tu doas
 ele doa
 nós doamos
 vós doais
-eles doam",
+eles doam",Spenden
 donations options,,,
 donor,Noun,,
 download,,,
@@ -1194,16 +1194,16 @@ exchange,Verb,,
 excited,,,
 executable,Noun,,
 exercised,,,
-exit,Noun,,
+exit,Noun,,Ausgang
 exit,Verb,,verlassen
-exit relay,,,
+exit relay,,,Exit-Server
 exit relay,Noun,,Exit-Server
-exited,Verb,,Verlassen
-experience,Verb,,
-expiration,Noun,,
+exited,Verb,,verlassen
+experience,Verb,,Erfahrung
+expiration,Noun,,Ablauf
 expiration date,Noun,,Ablaufdatum
-expire,Verb,[Signal],
-expired,Noun,,
+expire,Verb,[Signal],ablaufen
+expired,Noun,,abgelaufen
 expiry,Noun,[Globaleaks],Ablauf
 expiry,Verb,[Signal],
 export,Noun,[Signal],
@@ -1288,16 +1288,16 @@ goal,Noun,,
 grants,,,
 guard,Noun,,Wächter
 guard relay,Noun,[The Tor Project],Wächterrelais
-guidelines,Noun,,
-handshake,Noun,Signal exchange process between pieces of equipment until they 
are synchronized. Transmitting and receiving communication can then take place.,
+guidelines,Noun,,Richtlinien
+handshake,Noun,Signal exchange process between pieces of equipment until they 
are synchronized. Transmitting and receiving communication can then take 
place.,Handschlag
 hardware,,,
-header,Noun,,
+header,Noun,,Kopfzeilen
 help,Noun,,Hilfe
 help,Verb,,helfen
-helper link,Noun,,
+helper link,Noun,,Hilfe-Verweis
 helper link ,Noun,,
-hidden service,Noun,,
-hidden services,,,
+hidden service,Noun,[Tor],Onion-Dienst
+hidden services,,[Tor],Onion-Dienste
 hidden volume,Noun,[VeraCrypt],
 hide,Verb,,verstecken
 high bandwidth,Noun,,
@@ -1473,7 +1473,7 @@ meta search engine,,,
 metadata,Noun,"Metadata (or ""data about data"") is everything about a piece 
of information, apart from the information itself. So the content of a message 
is not metadata, but who sent it, when, where from, and to whom, are all 
examples of metadata. Legal systems often protect content more than metadata: 
for instance, in the United States, law enforcement needs a warrant to listen 
to a person's telephone calls, but claims the right to obtain the list of who 
you have called far more easily. However, metadata can often reveal a great 
deal, and will often need to be protected as carefully as the data it 
describes. (Source EFF) [Signal]",Meta-Daten
 method,,,
 microphone,Noun,[Signal],
-middle relay,Noun,,
+middle relay,Noun,,Mittel-Relais
 migrate,Verb,[Signal],
 miniLock,Noun,,miniLock
 minimize,Verb,Minimize a window,
@@ -1527,20 +1527,20 @@ notify,Verb,,
 obfuscate,Verb,"[Orbot] Transforming of a section of code or program to make 
it totally unintelligible to a human reader, even if helped by software 
tools.",verschleiern
 obfuscation,Noun,"Transformation of a section of code or program to make it 
totally unintelligible to a human reader, even if helped by software tools.",
 obfuscation layer,Noun,"Related to data transmission
-[Tor]",
+[Tor]",Verschleierungs-Schicht
 offline,Adjective,[Signal],
-onboarding,Noun,,
-once,,,
+onboarding,Noun,,Begrüßung
+once,,,ein Mai
 onion service,Noun,[Tor],Onion-Dienst
 online,,,
 online,Adjective,[Signal],
-open,Adjective,,
+open,Adjective,,offen
 open,Verb,,öffnen
-open source,Noun,[Orbot],
+open source,Noun,[Orbot],quelloffen
 open-source,Adjective,[Orbot],Open Source
 opened,Verb,,geöffnet
-operate,,,
-operator,Noun,,
+operate,,,betreiben
+operator,Noun,,betreibende Person
 opt,,,
 optical,Adjective,,optisch
 optimization,Noun,[Orbot],
@@ -1709,17 +1709,17 @@ referral code,Noun,,
 refund,,,
 refunded,,,
 register,Verb,,Benutzerkonto anlegen
-regular,Adjective,,
-regular expression,Noun,,
-reinstall,Verb,[Signal],
-reject,,,
-relay,,,
-relay,Noun,[Orbot],Relais
+regular,Adjective,,gewöhnlich
+regular expression,Noun,,regulärer Ausdruck
+reinstall,Verb,[Signal],neu installieren
+reject,,,ablehnen
+relay,,,Relay
+relay,Noun,[Orbot],Relay
 relay,Verb,[Signal],weiterleiten / umleiten
-relay directory,Noun,,
-relay node,Noun,[Orbot],
-relays,,,
-relays,Noun,,
+relay directory,Noun,,Relay-Verzeichnis
+relay node,Noun,[Orbot],Relay-Knoten
+relays,,,Relays
+relays,Noun,,Relays
 release,Noun,,Veröffentlichung
 release,Verb,,
 release candidate,Noun,,



_______________________________________________
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to