commit aa5e0af0fefb18bffe3cd3a72deaeab583974e98
Author: Translation commit bot <translat...@torproject.org>
Date:   Fri Mar 14 09:45:32 2014 +0000

    Update translations for https_everywhere
---
 es_NI/https-everywhere.dtd        |   47 ++++++++++++++++++
 es_NI/https-everywhere.properties |    8 ++++
 es_NI/ssl-observatory.dtd         |   95 +++++++++++++++++++++++++++++++++++++
 3 files changed, 150 insertions(+)

diff --git a/es_NI/https-everywhere.dtd b/es_NI/https-everywhere.dtd
new file mode 100644
index 0000000..9a63c45
--- /dev/null
+++ b/es_NI/https-everywhere.dtd
@@ -0,0 +1,47 @@
+<!ENTITY https-everywhere.about.title "About HTTPS Everywhere">
+<!ENTITY https-everywhere.about.ext_name "HTTPS Everywhere">
+<!ENTITY https-everywhere.about.ext_description "Encrypt the Web! 
Automatically use HTTPS security on many sites.">
+<!ENTITY https-everywhere.about.version "Version">
+<!ENTITY https-everywhere.about.created_by "Created by">
+<!ENTITY https-everywhere.about.librarians "Ruleset Librarians">
+<!ENTITY https-everywhere.about.thanks "Thanks to">
+<!ENTITY https-everywhere.about.contribute  "If you like HTTPS Everywhere, you 
might consider">
+<!ENTITY https-everywhere.about.donate_tor "Donating to Tor">
+<!ENTITY https-everywhere.about.tor_lang_code "en">
+<!ENTITY https-everywhere.about.donate_eff "Donating to EFF">
+
+<!ENTITY https-everywhere.menu.about "About HTTPS Everywhere">
+<!ENTITY https-everywhere.menu.observatory "SSL Observatory Preferences">
+<!ENTITY https-everywhere.menu.globalEnable "Enable HTTPS Everywhere">
+<!ENTITY https-everywhere.menu.globalDisable "Disable HTTPS Everywhere">
+<!ENTITY https-everywhere.menu.showCounter "Show Counter">
+
+<!ENTITY https-everywhere.prefs.title "HTTPS Everywhere Preferences">
+<!ENTITY https-everywhere.prefs.enable_all "Enable All">
+<!ENTITY https-everywhere.prefs.disable_all "Disable All">
+<!ENTITY https-everywhere.prefs.reset_defaults "Reset to Defaults">
+<!ENTITY https-everywhere.prefs.search "Search">
+<!ENTITY https-everywhere.prefs.site "Site">
+<!ENTITY https-everywhere.prefs.notes "Notes">
+<!ENTITY https-everywhere.prefs.list_caption "Which HTTPS redirection rules 
should apply?">
+<!ENTITY https-everywhere.prefs.enabled "Enabled">
+<!ENTITY https-everywhere.prefs.ruleset_howto "You can learn how to write your 
own rulesets (to add support for other web sites)">
+<!ENTITY https-everywhere.prefs.here_link "here">
+<!ENTITY https-everywhere.prefs.toggle "Toggle">
+<!ENTITY https-everywhere.prefs.reset_default "Reset to Default">
+<!ENTITY https-everywhere.prefs.view_xml_source "View XML Source">
+
+<!ENTITY https-everywhere.source.downloading "Downloading">
+<!ENTITY https-everywhere.source.filename "Filename">
+<!ENTITY https-everywhere.source.unable_to_download "Unable to download 
source.">
+
+<!ENTITY https-everywhere.popup.title "HTTPS Everywhere 4.0development.11 
notification">
+<!ENTITY https-everywhere.popup.paragraph1 "Oops. You were using the stable 
version of HTTPS Everywhere, but we might have accidentally upgraded you to the 
development version in our last release.">
+<!ENTITY https-everywhere.popup.paragraph2 "Would you like to go back to 
stable?">
+<!ENTITY https-everywhere.popup.paragraph3 "We'd love it if you continued 
using our development release and helped us make HTTPS Everywhere better! You 
might find there are a few more bugs here and there, which you can report to 
https-everywh...@eff.org. Sorry about the inconvenience, and thank you for 
using HTTPS Everywhere.">
+<!ENTITY https-everywhere.popup.keep "Keep me on the development version">
+<!ENTITY https-everywhere.popup.revert "Download the latest stable version">
+
+<!ENTITY https-everywhere.ruleset-tests.status_title "HTTPS Everywhere Ruleset 
Tests">
+<!ENTITY https-everywhere.ruleset-tests.status_cancel_button "Cancel">
+<!ENTITY https-everywhere.ruleset-tests.status_start_button "Start">
diff --git a/es_NI/https-everywhere.properties 
b/es_NI/https-everywhere.properties
new file mode 100644
index 0000000..21feda9
--- /dev/null
+++ b/es_NI/https-everywhere.properties
@@ -0,0 +1,8 @@
+# https-everywhere.menu.globalEnable = Enable HTTPS Everywhere
+# https-everywhere.menu.globalDisable = Disable HTTPS Everywhere
+# https-everywhere.menu.enableDisable = Enable / Disable Rules
+# https-everywhere.menu.noRules = (No Rules for This Page)
+# https-everywhere.menu.unknownRules = (Rules for This Page Unknown)
+# https-everywhere.toolbar.hint = HTTPS Everywhere is now active. You can 
toggle it on a site-by-site basis by clicking the icon in the address bar.
+# https-everywhere.migration.notification0 = In order to implement a crucial 
fix, this update resets your HTTPS Everywhere rule preferences to their default 
values.
+# https-everywhere.menu.ruleset-tests = Run HTTPS Everywhere Ruleset Tests
diff --git a/es_NI/ssl-observatory.dtd b/es_NI/ssl-observatory.dtd
new file mode 100644
index 0000000..9457a96
--- /dev/null
+++ b/es_NI/ssl-observatory.dtd
@@ -0,0 +1,95 @@
+<!-- Observatory popup window -->
+<!ENTITY ssl-observatory.popup.details "Details and Privacy Information">
+<!ENTITY ssl-observatory.popup.later "Ask Me Later">
+<!ENTITY ssl-observatory.popup.no "No">
+
+<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks
+against your browser by sending the certificates you receive to the
+Observatory.  Turn this on?">
+
+<!--<!ENTITY ssl-observatory.popup.text 
+"EFF's SSL Observatory can detect attacks against HTTPS websites by collecting
+and auditing the certificates being presented to your browser. Would you like
+to turn it on?">-->
+
+<!ENTITY ssl-observatory.popup.title 
+"Should HTTPS Everywhere use the SSL Observatory?">
+
+<!ENTITY ssl-observatory.popup.yes "Yes">
+
+<!-- Observatory preferences dialog -->
+
+<!ENTITY ssl-observatory.prefs.adv_priv_opts1
+"It is safe to enable this, unless you use a very
+intrusive corporate network:">
+
+<!ENTITY ssl-observatory.prefs.adv_priv_opts2
+"Safe, unless you use a corporate network with secret intranet server names:">
+
+<!ENTITY ssl-observatory.prefs.alt_roots 
+"Submit and check certificates signed by non-standard root CAs">
+
+<!ENTITY ssl-observatory.prefs.alt_roots_tooltip 
+"It is safe (and a good idea) to enable this option, unless you use an 
intrusive corporate network or Kaspersky antivirus software that monitors your 
browsing with a TLS proxy and a private root Certificate Authority.  If enabled 
on such a network, this option might publish evidence of which https:// domains 
were being visited through that proxy, because of the unique certificates it 
would produce.  So we leave it off by default.">
+
+<!ENTITY ssl-observatory.prefs.anonymous "Check certificates using Tor for 
anonymity">
+<!ENTITY ssl-observatory.prefs.anonymous_unavailable 
+"Check certificates using Tor for anonymity (requires Tor)">
+<!ENTITY ssl-observatory.prefs.anonymous_tooltip 
+"This option requires Tor to be installed and running">
+
+<!ENTITY ssl-observatory.prefs.asn 
+"When you see a new certificate, tell the Observatory which ISP you are 
connected to">
+
+<!ENTITY ssl-observatory.prefs.asn_tooltip
+"This will fetch and send the &quot;Autonomous System number&quot; of your 
network.  This will help us locate attacks against HTTPS, and to determine 
whether we have observations from networks in places like Iran and Syria where 
attacks are comparatively common.">
+
+<!ENTITY ssl-observatory.prefs.done "Done">
+
+<!ENTITY ssl-observatory.prefs.explanation 
+"HTTPS Everywhere can use EFF's SSL Observatory.  This does two things: (1)
+sends copies of HTTPS certificates to the Observatory, to help us
+detect 'man in the middle' attacks and improve the Web's security; and (2)
+lets us warn you about insecure connections or attacks on your browser.">
+
+<!--<!ENTITY ssl-observatory.prefs.explanation2
+"When you visit https://www.example.com, the Observatory will learn that
+somebody visited that site, but will not know who or what page they looked at.
+Mouseover the options for further details:">-->
+
+<!ENTITY ssl-observatory.prefs.explanation2
+
+"For example, when you visit https://www.something.com, the certificate
+received by the Observatory will indicate that somebody visited
+www.something.com, but not who visited the site, or what specific page they
+looked at.  Mouseover the options for further details:">
+
+<!ENTITY ssl-observatory.prefs.hide "Hide advanced options">
+
+<!ENTITY ssl-observatory.prefs.nonanon 
+"Check certificates even if Tor is not available">
+
+<!ENTITY ssl-observatory.prefs.nonanon_tooltip
+"We will still try to keep the data anonymous, but this option is less secure">
+
+<!ENTITY ssl-observatory.prefs.priv_dns 
+"Submit and check certificates for non-public DNS names">
+
+<!ENTITY ssl-observatory.prefs.priv_dns_tooltip
+"Unless this option is checked, the Observatory will not record certificates 
for names that it cannot resolve through the DNS system.">
+
+<!ENTITY ssl-observatory.prefs.show "Show advanced options">
+
+<!ENTITY ssl-observatory.prefs.title "SSL Observatory Preferences">
+
+<!ENTITY ssl-observatory.prefs.use "Use the Observatory?">
+<!ENTITY ssl-observatory.warning.title "WARNING from EFF's SSL Observatory">
+<!ENTITY ssl-observatory.warning.showcert "Show the certificate chain">
+<!ENTITY ssl-observatory.warning.okay "I understand">
+<!ENTITY ssl-observatory.warning.text "EFF's SSL Observatory has issued a 
warning about the HTTPS certificiate(s) for this site:">
+<!ENTITY ssl-observatory.warning.defense "If you are logged in to this site, 
it may be advisable to change your password once you have a safe connection.">
+
+<!ENTITY ssl-observatory.prefs.self_signed
+"Submit and check self-signed certificates">
+<!ENTITY ssl-observatory.prefs.self_signed_tooltip
+"This is recommended; cryptographic problems are especially common in 
self-signed embedded devices">

_______________________________________________
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to