commit 3282fc0571154be8bcb051b82ffe26cc7179fff2
Author: Translation commit bot <[email protected]>
Date: Sat Jan 3 18:15:19 2015 +0000
Update translations for https_everywhere
---
az/ssl-observatory.dtd | 16 ++++++++--------
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/az/ssl-observatory.dtd b/az/ssl-observatory.dtd
index a8a2898..aa56f95 100644
--- a/az/ssl-observatory.dtd
+++ b/az/ssl-observatory.dtd
@@ -3,9 +3,9 @@
<!ENTITY ssl-observatory.popup.later "MÉndÉn Daha Sonra SoruÅ">
<!ENTITY ssl-observatory.popup.no "Xeyr">
-<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks
-against your browser by sending the certificates you receive to the
-Observatory. Turn this on?">
+<!ENTITY ssl-observatory.popup.text "HÉr yerdÉ HTTPS sÉnin MüÅahidÉ
mÉntÉqÉnÉ
+setifikatları göndÉrmÉklÉ sÉnin brauzerinÉ qarÅı hücumları
müÉyyÉnlÉÅdirÉ
+bilir. Bunu aktivlÉÅdirirsÉn?">
<!--<!ENTITY ssl-observatory.popup.text
"EFF's SSL Observatory can detect attacks against HTTPS websites by collecting
@@ -13,21 +13,21 @@ and auditing the certificates being presented to your
browser. Would you like
to turn it on?">-->
<!ENTITY ssl-observatory.popup.title
-"Should HTTPS Everywhere use the SSL Observatory?">
+"HÉr yerdÉ HTTPS SSL MüÅahidÉ mÉntÉqÉsini istifadÉ etsin?">
<!ENTITY ssl-observatory.popup.yes "BÉli">
<!-- Observatory preferences dialog -->
<!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"It is safe to enable this, unless you use a very
-intrusive corporate network:">
+"SÉn zÉhlÉtökÉn korporativ ÅÉbÉkÉ istifadÉ etdikcÉ
+bunu aktivlÉÅdirmÉk olar:">
<!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"TÉhlükÉsiz, sÉn sirli intranet server adları ilÉ korporativ ÅÉbÉkÉ
istifadÉ etdiyin müddÉtdÉ:">
<!ENTITY ssl-observatory.prefs.alt_roots
-"Submit and check certificates signed by non-standard root CAs">
+"Qeyri-standart köklü CA-lar tÉrÉfindÉn imzalanmıŠsertifikatları
daxil edib yoxla">
<!ENTITY ssl-observatory.prefs.alt_roots_tooltip
"It is safe (and a good idea) to enable this option, unless you use an
intrusive corporate network or Kaspersky antivirus software that monitors your
browsing with a TLS proxy and a private root Certificate Authority. If enabled
on such a network, this option might publish evidence of which https:// domains
were being visited through that proxy, because of the unique certificates it
would produce. So we leave it off by default.">
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits