commit 72bdf054c1f0e223c64499c3623fdbb4890a3280
Author: Translation commit bot <[email protected]>
Date:   Fri Jun 29 06:15:30 2018 +0000

    Update translations for https_everywhere
---
 gu/ssl-observatory.dtd |  2 +-
 hi/ssl-observatory.dtd | 10 +++++-----
 2 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/gu/ssl-observatory.dtd b/gu/ssl-observatory.dtd
index b432a8f1d..bc967d2aa 100644
--- a/gu/ssl-observatory.dtd
+++ b/gu/ssl-observatory.dtd
@@ -50,7 +50,7 @@ intrusive corporate network:">
 <!ENTITY ssl-observatory.prefs.show_cert_warning_tooltip
 "This will check submitted certificates against known Certificate Revocation 
Lists. Unfortunately we cannot guarantee that we will flag every revoked 
certificate, but if you do see a warning there's a good chance something is 
wrong.">
 
-<!ENTITY ssl-observatory.prefs.done "Done">
+<!ENTITY ssl-observatory.prefs.done "થઈ ગયું">
 
 <!ENTITY ssl-observatory.prefs.explanation 
 "HTTPS Everywhere can use EFF's SSL Observatory.  This does two things: (1)
diff --git a/hi/ssl-observatory.dtd b/hi/ssl-observatory.dtd
index 73a383877..73b1ae5f0 100644
--- a/hi/ssl-observatory.dtd
+++ b/hi/ssl-observatory.dtd
@@ -13,21 +13,21 @@ and auditing the certificates being presented to your 
browser. Would you like
 to turn it on?">-->
 
 <!ENTITY ssl-observatory.popup.title 
-"Should HTTPS Everywhere use the SSL Observatory?">
+"क्या HTTPS Everywhere SSL Observatory का उपयोग 
करना चाहिए?">
 
 <!ENTITY ssl-observatory.popup.yes "हाँ">
 
 <!-- Observatory preferences dialog -->
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"It is safe to enable this, unless you use a very
-intrusive corporate network:">
+"यह सक्षम करने के लिए सुरक्षित 
है, जब तक आप बहुत उपयोग नहीं 
करते
+दखल कॉर्पोरेट नेटवर्क:">
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"सुरक्षित, जब तक कि आप गुप्त 
इंट्रानेट सर्वर नामों के साथ 
कॉर्पोरेट नेटवर्क का उपयोग न 
करें:">
 
 <!ENTITY ssl-observatory.prefs.alt_roots 
-"Submit and check certificates signed by non-standard root CAs">
+"गैर-मानक रूट CA द्वारा 
हस्ताक्षरित प्रमाणपत्र जमा 
करें और जांचें">
 
 <!ENTITY ssl-observatory.prefs.alt_roots_tooltip 
 "It is safe (and a good idea) to enable this option, unless you use an 
intrusive corporate network or Kaspersky antivirus software that monitors your 
browsing with a TLS proxy and a private root Certificate Authority.  If enabled 
on such a network, this option might publish evidence of which https:// domains 
were being visited through that proxy, because of the unique certificates it 
would produce.  So we leave it off by default.">

_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to