commit a5b2ea16ba9a8d90bdf53bace49474dc3e11e84a
Author: Translation commit bot <>
Date:   Sat Apr 14 08:20:22 2018 +0000

    Update translations for support-https
 ru.json | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/ru.json b/ru.json
index 625e41dd5..10777ef6a 100644
--- a/ru.json
+++ b/ru.json
@@ -2,7 +2,7 @@
     "https-1": {
        "id": "#https-1",
        "control": "https-1",
-       "title": "When I'm using Tor, can eavesdroppers still see the 
information I share with websites, like login information and things I type 
into forms?",
+       "title": "Когда я использую Tor, могут ли 
посторонние устройства видеть информацию, 
которую я предиставляю веб-сайтам, 
например данные входа в систему и то, что я 
ввожу в формы?",
        "description": "<p class=\"mb-3\">Tor protects eavesdroppers from 
learning sites that you visit. However, information sent unencrypted over the 
internet using plain HTTP can still be intercepted by exit relay operators or 
anyone observing the traffic between your exit relay and your destination 
website. If the site you are visiting uses HTTPS, then the traffic leaving your 
exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div 
class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img 
class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div 
class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your 
website URL will begin with \"​https://\";.</h4></div></div></div><div 
class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\" 
src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4 
class=\"card-title\">This visualization shows what information is visible to 
eavesdroppers with and without Tor Br
 owser and HTTPS encryption.</h4></div></div></div></div>"

tor-commits mailing list

Reply via email to