commit fa222b6f65b54b310de98103f429c452070e4b86
Author: Translation commit bot <[email protected]>
Date: Tue Aug 7 04:15:29 2018 +0000
Update translations for https_everywhere
---
am/ssl-observatory.dtd | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/am/ssl-observatory.dtd b/am/ssl-observatory.dtd
index 4d070cdef..ac1c00a68 100644
--- a/am/ssl-observatory.dtd
+++ b/am/ssl-observatory.dtd
@@ -1,6 +1,6 @@
<!-- Observatory popup window -->
-<!ENTITY ssl-observatory.popup.details "Details and Privacy Information">
-<!ENTITY ssl-observatory.popup.later "Ask Me Later">
+<!ENTITY ssl-observatory.popup.details "áááá á¥á á¨áá
áá¨ááá½">
+<!ENTITY ssl-observatory.popup.later "á áá á¨á áá">
<!ENTITY ssl-observatory.popup.no "á áá°áá ">
<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks
@@ -32,7 +32,7 @@ intrusive corporate network:">
<!ENTITY ssl-observatory.prefs.alt_roots_tooltip
"It is safe (and a good idea) to enable this option, unless you use an
intrusive corporate network or Kaspersky antivirus software that monitors your
browsing with a TLS proxy and a private root Certificate Authority. If enabled
on such a network, this option might publish evidence of which https:// domains
were being visited through that proxy, because of the unique certificates it
would produce. So we leave it off by default.">
-<!ENTITY ssl-observatory.prefs.anonymous "Check certificates using Tor for
anonymity">
+<!ENTITY ssl-observatory.prefs.anonymous "á°áá²áá¬á±á á á¶á
á¨ááááµ áá°á áá« á«á¨ááá¡">
<!ENTITY ssl-observatory.prefs.anonymous_unavailable
"Check certificates using Tor for anonymity (requires Tor)">
<!ENTITY ssl-observatory.prefs.anonymous_tooltip
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits