commit b4c085237c1c297102bd747d8921922884277329
Author: Translation commit bot <[email protected]>
Date: Wed Aug 21 13:46:05 2019 +0000
Update translations for https_everywhere
---
kab/https-everywhere.dtd | 67 +++++++++++++++++++++++++++++++
kab/ssl-observatory.dtd | 101 +++++++++++++++++++++++++++++++++++++++++++++++
2 files changed, 168 insertions(+)
diff --git a/kab/https-everywhere.dtd b/kab/https-everywhere.dtd
new file mode 100644
index 000000000..ac7b8328e
--- /dev/null
+++ b/kab/https-everywhere.dtd
@@ -0,0 +1,67 @@
+<!ENTITY https-everywhere.about.title "About HTTPS Everywhere">
+<!ENTITY https-everywhere.about.ext_name "HTTPS Everywhere">
+<!ENTITY https-everywhere.about.ext_description "Encrypt the Web!
Automatically use HTTPS security on many sites.">
+<!ENTITY https-everywhere.about.version "Version">
+<!ENTITY https-everywhere.about.rulesets_version "Rulesets version for">
+<!ENTITY https-everywhere.about.add_new_rule "Add New Rule">
+
+<!ENTITY https-everywhere.menu.donate_eff_imperative "Donate to EFF">
+<!ENTITY https-everywhere.menu.observatory "SSL Observatory Preferences">
+<!ENTITY https-everywhere.menu.globalDisable "HTTPS Everywhere is OFF">
+<!ENTITY https-everywhere.menu.globalEnable "HTTPS Everywhere is ON">
+<!ENTITY https-everywhere.menu.encryptAllSitesEligibleOn "Encrypt All Sites
Eligible is ON">
+<!ENTITY https-everywhere.menu.encryptAllSitesEligibleOff "Encrypt All Sites
Eligible is OFF">
+<!ENTITY https-everywhere.menu.httpNoWhereExplainedBlocked "Unencrypted
requests are currently blocked">
+<!ENTITY https-everywhere.menu.httpNoWhereExplainedAllowed "Unencrypted
requests are currently allowed">
+<!ENTITY https-everywhere.menu.seeMore "See more">
+<!ENTITY https-everywhere.menu.seeLess "See less">
+<!ENTITY https-everywhere.menu.httpNoWhereMore "This mode blocks unencrypted
content and requests">
+<!ENTITY https-everywhere.menu.showCounter "Show Counter">
+<!ENTITY https-everywhere.menu.viewAllRules "View All Rules">
+
+<!ENTITY https-everywhere.options.settings "Settings">
+<!ENTITY https-everywhere.options.generalSettings "General Settings">
+<!ENTITY https-everywhere.options.advancedSettings "Advanced Settings">
+<!ENTITY https-everywhere.options.updateChannels "Update Channels">
+<!ENTITY https-everywhere.options.enableMixedRulesets "Enable mixed content
rulesets">
+<!ENTITY https-everywhere.options.showDevtoolsTab "Show Devtools tab">
+<!ENTITY https-everywhere.options.autoUpdateRulesets "Auto-update rulesets">
+<!ENTITY https-everywhere.options.userRulesListed "HTTPS Everywhere User
Rules">
+<!ENTITY https-everywhere.options.disabledUrlsListed "HTTPS Everywhere Sites
Disabled">
+<!ENTITY https-everywhere.options.updateChannelsWarning "Warning: Adding
update channels can cause attackers to hijack your browser. Only edit this
section if you know what you're doing!">
+<!ENTITY https-everywhere.options.addUpdateChannel "Add Update Channel">
+<!ENTITY https-everywhere.options.enterUpdateChannelName "Enter update channel
name">
+<!ENTITY https-everywhere.options.delete "Delete">
+<!ENTITY https-everywhere.options.update "Update">
+<!ENTITY https-everywhere.options.storedRulesetsVersion "Stored rulesets
version: ">
+<!ENTITY https-everywhere.options.updatesLastChecked "Updates last checked: ">
+<!ENTITY https-everywhere.options.updatesLastCheckedNever "never">
+<!ENTITY https-everywhere.options.debuggingRulesets "Debugging Rulesets
(advanced)">
+
+<!ENTITY https-everywhere.prefs.export_settings "Export Settings">
+<!ENTITY https-everywhere.prefs.reset_defaults "Reset to Defaults">
+<!ENTITY https-everywhere.prefs.reset_defaults_message "This will reset each
ruleset to its default state. Continue?">
+
+<!ENTITY https-everywhere.cancel.he_blocking_explainer "HTTPS Everywhere
noticed you were navigating to a non-HTTPS page, and tried to send you to the
HTTPS version instead. The HTTPS version is unavailable. Most likely this site
does not support HTTPS, but it is also possible that an attacker is blocking
the HTTPS version. If you wish to view the unencrypted version of this page,
you can still do so by disabling the 'Encrypt All Sites Eligible' (EASE) option
in your HTTPS Everywhere extension. Be aware that disabling this option could
make your browser vulnerable to network-based downgrade attacks on websites you
visit.">
+<!ENTITY https-everywhere.cancel.he_blocking_network "network-based downgrade
attacks">
+<!ENTITY https-everywhere.cancel.open_page "Open insecure page">
+
+<!ENTITY https-everywhere.chrome.settings_for_this_site_header "Settings for
this site">
+<!ENTITY https-everywhere.chrome.settings_for_this_site_subheader "Change your
preferences for encrypted connections">
+<!ENTITY https-everywhere.chrome.settings_for_this_site_explained "As you
browse different websites, you can change your preferences for each website">
+<!ENTITY https-everywhere.chrome.stable_rules "Stable rules">
+<!ENTITY https-everywhere.chrome.stable_rules_description "Force encrypted
connections to these websites:">
+<!ENTITY https-everywhere.chrome.experimental_rules "Experimental rules">
+<!ENTITY https-everywhere.chrome.experimental_rules_description "May cause
warnings or breakage. Disabled by default.">
+<!ENTITY https-everywhere.chrome.disable_on_this_site "Disable HTTPS
Everywhere on this site">
+<!ENTITY https-everywhere.chrome.enable_on_this_site "Enable HTTPS Everywhere
on this site">
+<!ENTITY https-everywhere.chrome.add_rule "Add a rule for this site">
+<!ENTITY https-everywhere.chrome.add_new_rule "Add a new rule for this site">
+<!ENTITY https-everywhere.chrome.always_https_for_host "Always use https for
this host">
+<!ENTITY https-everywhere.chrome.host "Host:">
+<!ENTITY https-everywhere.chrome.show_advanced "Show advanced">
+<!ENTITY https-everywhere.chrome.hide_advanced "Hide advanced">
+<!ENTITY https-everywhere.chrome.rule_name "Rule name">
+<!ENTITY https-everywhere.chrome.regex "Matching regex">
+<!ENTITY https-everywhere.chrome.redirect_to "Redirect to">
+<!ENTITY https-everywhere.chrome.status_cancel_button "Cancel">
diff --git a/kab/ssl-observatory.dtd b/kab/ssl-observatory.dtd
new file mode 100644
index 000000000..b432a8f1d
--- /dev/null
+++ b/kab/ssl-observatory.dtd
@@ -0,0 +1,101 @@
+<!-- Observatory popup window -->
+<!ENTITY ssl-observatory.popup.details "Details and Privacy Information">
+<!ENTITY ssl-observatory.popup.later "Ask Me Later">
+<!ENTITY ssl-observatory.popup.no "No">
+
+<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks
+against your browser by sending the certificates you receive to the
+Observatory. Turn this on?">
+
+<!--<!ENTITY ssl-observatory.popup.text
+"EFF's SSL Observatory can detect attacks against HTTPS websites by collecting
+and auditing the certificates being presented to your browser. Would you like
+to turn it on?">-->
+
+<!ENTITY ssl-observatory.popup.title
+"Should HTTPS Everywhere use the SSL Observatory?">
+
+<!ENTITY ssl-observatory.popup.yes "Yes">
+
+<!-- Observatory preferences dialog -->
+
+<!ENTITY ssl-observatory.prefs.adv_priv_opts1
+"It is safe to enable this, unless you use a very
+intrusive corporate network:">
+
+<!ENTITY ssl-observatory.prefs.adv_priv_opts2
+"Safe, unless you use a corporate network with secret intranet server names:">
+
+<!ENTITY ssl-observatory.prefs.alt_roots
+"Submit and check certificates signed by non-standard root CAs">
+
+<!ENTITY ssl-observatory.prefs.alt_roots_tooltip
+"It is safe (and a good idea) to enable this option, unless you use an
intrusive corporate network or Kaspersky antivirus software that monitors your
browsing with a TLS proxy and a private root Certificate Authority. If enabled
on such a network, this option might publish evidence of which https:// domains
were being visited through that proxy, because of the unique certificates it
would produce. So we leave it off by default.">
+
+<!ENTITY ssl-observatory.prefs.anonymous "Check certificates using Tor for
anonymity">
+<!ENTITY ssl-observatory.prefs.anonymous_unavailable
+"Check certificates using Tor for anonymity (requires Tor)">
+<!ENTITY ssl-observatory.prefs.anonymous_tooltip
+"This option requires Tor to be installed and running">
+
+<!ENTITY ssl-observatory.prefs.asn
+"When you see a new certificate, tell the Observatory which ISP you are
connected to">
+
+<!ENTITY ssl-observatory.prefs.asn_tooltip
+"This will fetch and send the "Autonomous System number" of your
network. This will help us locate attacks against HTTPS, and to determine
whether we have observations from networks in places like Iran and Syria where
attacks are comparatively common.">
+
+<!ENTITY ssl-observatory.prefs.show_cert_warning
+"Show a warning when the Observatory detects a revoked certificate not caught
by your browser">
+
+<!ENTITY ssl-observatory.prefs.show_cert_warning_tooltip
+"This will check submitted certificates against known Certificate Revocation
Lists. Unfortunately we cannot guarantee that we will flag every revoked
certificate, but if you do see a warning there's a good chance something is
wrong.">
+
+<!ENTITY ssl-observatory.prefs.done "Done">
+
+<!ENTITY ssl-observatory.prefs.explanation
+"HTTPS Everywhere can use EFF's SSL Observatory. This does two things: (1)
+sends copies of HTTPS certificates to the Observatory, to help us
+detect 'man in the middle' attacks and improve the Web's security; and (2)
+lets us warn you about insecure connections or attacks on your browser.">
+
+<!--<!ENTITY ssl-observatory.prefs.explanation2
+"When you visit https://www.example.com, the Observatory will learn that
+somebody visited that site, but will not know who or what page they looked at.
+Mouseover the options for further details:">-->
+
+<!ENTITY ssl-observatory.prefs.explanation2
+
+"For example, when you visit https://www.something.com, the certificate
+received by the Observatory will indicate that somebody visited
+www.something.com, but not who visited the site, or what specific page they
+looked at. Mouseover the options for further details:">
+
+<!ENTITY ssl-observatory.prefs.hide "Hide advanced options">
+
+<!ENTITY ssl-observatory.prefs.nonanon
+"Check certificates even if Tor is not available">
+
+<!ENTITY ssl-observatory.prefs.nonanon_tooltip
+"We will still try to keep the data anonymous, but this option is less secure">
+
+<!ENTITY ssl-observatory.prefs.priv_dns
+"Submit and check certificates for non-public DNS names">
+
+<!ENTITY ssl-observatory.prefs.priv_dns_tooltip
+"Unless this option is checked, the Observatory will not record certificates
for names that it cannot resolve through the DNS system.">
+
+<!ENTITY ssl-observatory.prefs.show "Show advanced options">
+
+<!ENTITY ssl-observatory.prefs.title "SSL Observatory Preferences">
+
+<!ENTITY ssl-observatory.prefs.use "Use the Observatory?">
+<!ENTITY ssl-observatory.warning.title "WARNING from EFF's SSL Observatory">
+<!ENTITY ssl-observatory.warning.showcert "Show the certificate chain">
+<!ENTITY ssl-observatory.warning.okay "I understand">
+<!ENTITY ssl-observatory.warning.text "EFF's SSL Observatory has issued a
warning about the HTTPS certificate(s) for this site:">
+<!ENTITY ssl-observatory.warning.defense "If you are logged in to this site,
it may be advisable to change your password once you have a safe connection.
(These warnings can be disabled in the "SSL Observatory" tab of the
HTTPS Everywhere preferences dialog.)">
+
+<!ENTITY ssl-observatory.prefs.self_signed
+"Submit and check self-signed certificates">
+<!ENTITY ssl-observatory.prefs.self_signed_tooltip
+"This is recommended; cryptographic problems are especially common in
self-signed embedded devices">
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits