commit 86ae660b3dd84082538c954aa1e3242fd653979b
Author: Translation commit bot <[email protected]>
Date: Mon Jul 9 13:19:27 2018 +0000
Update translations for support-https
---
sv.json | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/sv.json b/sv.json
index 625e41dd5..f3fb3e43e 100644
--- a/sv.json
+++ b/sv.json
@@ -2,7 +2,7 @@
"https-1": {
"id": "#https-1",
"control": "https-1",
- "title": "When I'm using Tor, can eavesdroppers still see the
information I share with websites, like login information and things I type
into forms?",
+ "title": "När jag använder Tor, kan tjuvlyssnare fortfarande se
information som jag delar med webbsidor, till exempel inloggningsinformation
och information som skrivs in i formulär?",
"description": "<p class=\"mb-3\">Tor protects eavesdroppers from
learning sites that you visit. However, information sent unencrypted over the
internet using plain HTTP can still be intercepted by exit relay operators or
anyone observing the traffic between your exit relay and your destination
website. If the site you are visiting uses HTTPS, then the traffic leaving your
exit relay will be encrypted, and won't be visible to eavesdroppers.</p><div
class=\"row\"><div class=\"col-md-6\"><div class=\"card\"><img
class=\"card-img-top\" src=\"/static/images/image2.png\" alt=\"https\"><div
class=\"card-body\"><h4 class=\"card-title\">If you are using HTTPS, your
website URL will begin with \"âhttps://\".</h4></div></div></div><div
class=\"col-md-6\"><div class=\"card\"><img class=\"card-img-top\"
src=\"/static/images/image6.png\" alt=\"https\"><div class=\"card-body\"><h4
class=\"card-title\">This visualization shows what information is visible to
eavesdroppers with and without Tor Br
owser and HTTPS encryption.</h4></div></div></div></div>"
}
}
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits