commit 79024ce1b9dbcd666ecef34d2180a692c9a1cbd7
Author: Translation commit bot <[email protected]>
Date:   Tue Nov 26 12:15:56 2013 +0000

    Update translations for https_everywhere
---
 uk/ssl-observatory.dtd |   75 +++++++++++++++++++++++++++---------------------
 1 file changed, 42 insertions(+), 33 deletions(-)

diff --git a/uk/ssl-observatory.dtd b/uk/ssl-observatory.dtd
index d832b69..3afe519 100644
--- a/uk/ssl-observatory.dtd
+++ b/uk/ssl-observatory.dtd
@@ -1,9 +1,11 @@
 <!-- Observatory popup window -->
-<!ENTITY ssl-observatory.popup.details "">
-<!ENTITY ssl-observatory.popup.later "">
-<!ENTITY ssl-observatory.popup.no "">
+<!ENTITY ssl-observatory.popup.details "Детальна інформація 
та відомості про конфіденційність">
+<!ENTITY ssl-observatory.popup.later "Запитати пізніше">
+<!ENTITY ssl-observatory.popup.no "Ні">
 
-<!ENTITY ssl-observatory.popup.text "">
+<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks
+against your browser by sending the certificates you receive to the
+Observatory.  Turn this on?">
 
 <!--<!ENTITY ssl-observatory.popup.text 
 "EFF's SSL Observatory can detect attacks against HTTPS websites by collecting
@@ -11,40 +13,44 @@ and auditing the certificates being presented to your 
browser. Would you like
 to turn it on?">-->
 
 <!ENTITY ssl-observatory.popup.title 
-"">
+"Should HTTPS Everywhere use the SSL Observatory?">
 
-<!ENTITY ssl-observatory.popup.yes "">
+<!ENTITY ssl-observatory.popup.yes "Так">
 
 <!-- Observatory preferences dialog -->
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"">
+"It is safe to enable this, unless you use a very
+intrusive corporate network:">
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"">
+"Safe, unless you use a corporate network with secret intranet server names:">
 
 <!ENTITY ssl-observatory.prefs.alt_roots 
-"">
+"Відправити і перевірити сертифікати, 
підписані нестандартними кореневими 
центрами сертифікації">
 
 <!ENTITY ssl-observatory.prefs.alt_roots_tooltip 
-"">
+"It is safe (and a good idea) to enable this option, unless you use an 
intrusive corporate network or Kaspersky antivirus software that monitors your 
browsing with a TLS proxy and a private root Certificate Authority.  If enabled 
on such a network, this option might publish evidence of which https:// domains 
were being visited through that proxy, because of the unique certificates it 
would produce.  So we leave it off by default.">
 
-<!ENTITY ssl-observatory.prefs.anonymous "">
+<!ENTITY ssl-observatory.prefs.anonymous "Перевірити 
сертифікати використовувані Tor для 
анонімності">
 <!ENTITY ssl-observatory.prefs.anonymous_unavailable 
-"">
+"Перевірити сертифікати використовувані 
Tor для анонімності (вимагає Tor)">
 <!ENTITY ssl-observatory.prefs.anonymous_tooltip 
-"">
+"Ця опція вимагає наявності встановленого 
та включеного Tor.">
 
 <!ENTITY ssl-observatory.prefs.asn 
-"">
+"When you see a new certificate, tell the Observatory which ISP you are 
connected to">
 
 <!ENTITY ssl-observatory.prefs.asn_tooltip
-"">
+"This will fetch and send the &quot;Autonomous System number&quot; of your 
network.  This will help us locate attacks against HTTPS, and to determine 
whether we have observations from networks in places like Iran and Syria where 
attacks are comparatively common.">
 
-<!ENTITY ssl-observatory.prefs.done "">
+<!ENTITY ssl-observatory.prefs.done "Готово">
 
 <!ENTITY ssl-observatory.prefs.explanation 
-"">
+"HTTPS Everywhere can use EFF's SSL Observatory.  This does two things: (1)
+sends copies of HTTPS certificates to the Observatory, to help us
+detect 'man in the middle' attacks and improve the Web's security; and (2)
+lets us warn you about insecure connections or attacks on your browser.">
 
 <!--<!ENTITY ssl-observatory.prefs.explanation2
 "When you visit https://www.example.com, the Observatory will learn that
@@ -53,34 +59,37 @@ Mouseover the options for further details:">-->
 
 <!ENTITY ssl-observatory.prefs.explanation2
 
-"">
+"For example, when you visit https://www.something.com, the certificate
+received by the Observatory will indicate that somebody visited
+www.something.com, but not who visited the site, or what specific page they
+looked at.  Mouseover the options for further details:">
 
-<!ENTITY ssl-observatory.prefs.hide "">
+<!ENTITY ssl-observatory.prefs.hide "Приховати додаткові 
опції">
 
 <!ENTITY ssl-observatory.prefs.nonanon 
-"">
+"Check certificates even if Tor is not available">
 
 <!ENTITY ssl-observatory.prefs.nonanon_tooltip
-"">
+"We will still try to keep the data anonymous, but this option is less secure">
 
 <!ENTITY ssl-observatory.prefs.priv_dns 
-"">
+"Submit and check certificates for non-public DNS names">
 
 <!ENTITY ssl-observatory.prefs.priv_dns_tooltip
-"">
+"Unless this option is checked, the Observatory will not record certificates 
for names that it cannot resolve through the DNS system.">
 
-<!ENTITY ssl-observatory.prefs.show "">
+<!ENTITY ssl-observatory.prefs.show "Показати додаткові 
опції">
 
-<!ENTITY ssl-observatory.prefs.title "">
+<!ENTITY ssl-observatory.prefs.title "Налаштування SSL 
Observatory">
 
-<!ENTITY ssl-observatory.prefs.use "">
-<!ENTITY ssl-observatory.warning.title "">
-<!ENTITY ssl-observatory.warning.showcert "">
-<!ENTITY ssl-observatory.warning.okay "">
-<!ENTITY ssl-observatory.warning.text "">
-<!ENTITY ssl-observatory.warning.defense "">
+<!ENTITY ssl-observatory.prefs.use "Використовувати SSL 
Observatory?">
+<!ENTITY ssl-observatory.warning.title "ПОПЕРЕДЖЕННЯ від SSL 
Observatory">
+<!ENTITY ssl-observatory.warning.showcert "Показати цепочку 
сертифікатів">
+<!ENTITY ssl-observatory.warning.okay "Я розумію">
+<!ENTITY ssl-observatory.warning.text "EFF's SSL Observatory has issued a 
warning about the HTTPS certificiate(s) for this site:">
+<!ENTITY ssl-observatory.warning.defense "If you are logged in to this site, 
it may be advisable to change your password once you have a safe connection.">
 
 <!ENTITY ssl-observatory.prefs.self_signed
-"">
+"Submit and check self-signed certificates">
 <!ENTITY ssl-observatory.prefs.self_signed_tooltip
-"">
+"This is recommended; cryptographic problems are especially common in 
self-signed embedded devices">

_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to