commit 3acc44ab5c26ab14a1d53514299029f868e212a4
Author: Translation commit bot <[email protected]>
Date: Sat May 6 15:45:22 2017 +0000
Update translations for https_everywhere
---
es_AR/https-everywhere.dtd | 4 ++--
es_AR/ssl-observatory.dtd | 16 ++++++++--------
2 files changed, 10 insertions(+), 10 deletions(-)
diff --git a/es_AR/https-everywhere.dtd b/es_AR/https-everywhere.dtd
index e9edfbc..180a315 100644
--- a/es_AR/https-everywhere.dtd
+++ b/es_AR/https-everywhere.dtd
@@ -1,5 +1,5 @@
-<!ENTITY https-everywhere.about.title "Acerca de HTTPS en todos lados">
-<!ENTITY https-everywhere.about.ext_name "HTTPS en todos lados">
+<!ENTITY https-everywhere.about.title "Acerca de HTTPS Everywhere">
+<!ENTITY https-everywhere.about.ext_name "HTTPS Everywhere">
<!ENTITY https-everywhere.about.ext_description "Encriptar la Web! Usar
seguridad HTTPS automáticamente en la mayorÃa de los sitios.">
<!ENTITY https-everywhere.about.version "Versión">
<!ENTITY https-everywhere.about.created_by "Creado por">
diff --git a/es_AR/ssl-observatory.dtd b/es_AR/ssl-observatory.dtd
index 9dabb39..77478ef 100644
--- a/es_AR/ssl-observatory.dtd
+++ b/es_AR/ssl-observatory.dtd
@@ -30,7 +30,7 @@ se encuentre en una red corporativa muy invasiva:">
"Aplicar y verificar los certificados firmados por CAs no estandar">
<!ENTITY ssl-observatory.prefs.alt_roots_tooltip
-"It is safe (and a good idea) to enable this option, unless you use an
intrusive corporate network or Kaspersky antivirus software that monitors your
browsing with a TLS proxy and a private root Certificate Authority. If enabled
on such a network, this option might publish evidence of which https:// domains
were being visited through that proxy, because of the unique certificates it
would produce. So we leave it off by default.">
+"Es seguro (y una buena idea) habilitar esta opción, a menos que uses una red
corporativa intrusiva o el antivirus Kaspersky que monitorea tu navegación con
un proxy TLS y un Certificado de Autoridad de raÃz privado. Si se habilita en
dicha red, esta opción puede presentar evidencia de que dominios https://
estaban siendo visitados a través del proxy, debido a los certificados únicos
que producirÃa. Por eso lo dejamos apagado por defecto.">
<!ENTITY ssl-observatory.prefs.anonymous "Compruebe certificados usando Tor
para el anonimato">
<!ENTITY ssl-observatory.prefs.anonymous_unavailable
@@ -39,13 +39,13 @@ se encuentre en una red corporativa muy invasiva:">
"Esta opción requiere Tor para ser instalado y en ejecución">
<!ENTITY ssl-observatory.prefs.asn
-"When you see a new certificate, tell the Observatory which ISP you are
connected to">
+"Cuando veas un nuevo certificado, avisale al Observatorio a que ISP estás
conectado">
<!ENTITY ssl-observatory.prefs.asn_tooltip
"This will fetch and send the "Autonomous System number" of your
network. This will help us locate attacks against HTTPS, and to determine
whether we have observations from networks in places like Iran and Syria where
attacks are comparatively common.">
<!ENTITY ssl-observatory.prefs.show_cert_warning
-"Show a warning when the Observatory detects a revoked certificate not caught
by your browser">
+"Mostrar una advertencia cuando el Observatorio detecte un certificado
revocado no atrapado por tu navegador">
<!ENTITY ssl-observatory.prefs.show_cert_warning_tooltip
"This will check submitted certificates against known Certificate Revocation
Lists. Unfortunately we cannot guarantee that we will flag every revoked
certificate, but if you do see a warning there's a good chance something is
wrong.">
@@ -73,13 +73,13 @@ looked at. Mouseover the options for further details:">
<!ENTITY ssl-observatory.prefs.hide "Ocultar opciones avanzadas">
<!ENTITY ssl-observatory.prefs.nonanon
-"Check certificates even if Tor is not available">
+"Comprobar certificados aunque Tor no esté disponible">
<!ENTITY ssl-observatory.prefs.nonanon_tooltip
"We will still try to keep the data anonymous, but this option is less secure">
<!ENTITY ssl-observatory.prefs.priv_dns
-"Submit and check certificates for non-public DNS names">
+"Enviar y comprobar certificados para nombres DNS no-públicos">
<!ENTITY ssl-observatory.prefs.priv_dns_tooltip
"Unless this option is checked, the Observatory will not record certificates
for names that it cannot resolve through the DNS system.">
@@ -88,9 +88,9 @@ looked at. Mouseover the options for further details:">
<!ENTITY ssl-observatory.prefs.title "Preferencias del Observatorio SSL">
-<!ENTITY ssl-observatory.prefs.use "Use the Observatory?">
-<!ENTITY ssl-observatory.warning.title "WARNING from EFF's SSL Observatory">
-<!ENTITY ssl-observatory.warning.showcert "Show the certificate chain">
+<!ENTITY ssl-observatory.prefs.use "¿Usar el Observatorio?">
+<!ENTITY ssl-observatory.warning.title "ADVERTENCIA del Observatorio SSL de
EFF">
+<!ENTITY ssl-observatory.warning.showcert "Mostrar la cadena de certificado">
<!ENTITY ssl-observatory.warning.okay "I understand">
<!ENTITY ssl-observatory.warning.text "EFF's SSL Observatory has issued a
warning about the HTTPS certificiate(s) for this site:">
<!ENTITY ssl-observatory.warning.defense "If you are logged in to this site,
it may be advisable to change your password once you have a safe connection.
(These warnings can be disabled in the "SSL Observatory" tab of the
HTTPS Everywhere preferences dialog.)">
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits