Build docs

This commit is contained in:
Micah Lee 2021-09-10 12:35:44 -07:00
parent 429126698a
commit 631e76661f
No known key found for this signature in database
GPG key ID: 403C2657CD994F73
25 changed files with 193 additions and 53 deletions

View file

@ -7,7 +7,7 @@ msgid ""
msgstr ""
"Project-Id-Version: OnionShare 2.3\n"
"Report-Msgid-Bugs-To: onionshare-dev@lists.riseup.net\n"
"POT-Creation-Date: 2021-09-09 19:15-0700\n"
"POT-Creation-Date: 2021-09-10 12:35-0700\n"
"PO-Revision-Date: 2020-12-16 00:29+0000\n"
"Last-Translator: mv87 <mv87@dismail.de>\n"
"Language: de\n"
@ -94,7 +94,7 @@ msgid ""
"services allowed the attacker to discover private ``.onion`` addresses. "
"If an attack discovers a private OnionShare address, they will also need "
"to guess the private key used for client authentication in order to "
"access it (unless the OnionShare user chooses make their serivce public "
"access it (unless the OnionShare user chooses make their service public "
"by turning off the private key -- see :ref:`turn_off_private_key`)."
msgstr ""
@ -111,10 +111,10 @@ msgid ""
"through an email message monitored by an attacker), an eavesdropper can "
"tell that OnionShare is being used. If the eavesdropper loads the address"
" in Tor Browser while the service is still up, they can access it. To "
"avoid this, the address must be communicateed securely, via encrypted "
"text message (probably with disappearing messages enabled), encrypted "
"email, or in person. This isn't necessary when using OnionShare for "
"something that isn't secret."
"avoid this, the address must be communicated securely, via encrypted text"
" message (probably with disappearing messages enabled), encrypted email, "
"or in person. This isn't necessary when using OnionShare for something "
"that isn't secret."
msgstr ""
"**Das Teilen der OnionShare-Adresse könnte nicht sicher geschehen.** Die "
"Weitergabe der OnionShare-Adresse an andere liegt in der Verantwortung "
@ -394,3 +394,20 @@ msgstr ""
#~ " public - see :ref:`turn_off_private_key`)."
#~ msgstr ""
#~ msgid ""
#~ "**If an attacker learns about the "
#~ "onion service, it still can't access "
#~ "anything.** Prior attacks against the "
#~ "Tor network to enumerate onion services"
#~ " allowed the attacker to discover "
#~ "private ``.onion`` addresses. If an "
#~ "attack discovers a private OnionShare "
#~ "address, they will also need to "
#~ "guess the private key used for "
#~ "client authentication in order to access"
#~ " it (unless the OnionShare user "
#~ "chooses make their serivce public by "
#~ "turning off the private key -- see"
#~ " :ref:`turn_off_private_key`)."
#~ msgstr ""

View file

@ -7,7 +7,7 @@ msgid ""
msgstr ""
"Project-Id-Version: OnionShare 2.3\n"
"Report-Msgid-Bugs-To: onionshare-dev@lists.riseup.net\n"
"POT-Creation-Date: 2021-09-09 19:15-0700\n"
"POT-Creation-Date: 2021-09-10 12:35-0700\n"
"PO-Revision-Date: 2020-12-31 19:29+0000\n"
"Last-Translator: george k <norhorn@gmail.com>\n"
"Language: el\n"
@ -94,7 +94,7 @@ msgid ""
"services allowed the attacker to discover private ``.onion`` addresses. "
"If an attack discovers a private OnionShare address, they will also need "
"to guess the private key used for client authentication in order to "
"access it (unless the OnionShare user chooses make their serivce public "
"access it (unless the OnionShare user chooses make their service public "
"by turning off the private key -- see :ref:`turn_off_private_key`)."
msgstr ""
@ -111,10 +111,10 @@ msgid ""
"through an email message monitored by an attacker), an eavesdropper can "
"tell that OnionShare is being used. If the eavesdropper loads the address"
" in Tor Browser while the service is still up, they can access it. To "
"avoid this, the address must be communicateed securely, via encrypted "
"text message (probably with disappearing messages enabled), encrypted "
"email, or in person. This isn't necessary when using OnionShare for "
"something that isn't secret."
"avoid this, the address must be communicated securely, via encrypted text"
" message (probably with disappearing messages enabled), encrypted email, "
"or in person. This isn't necessary when using OnionShare for something "
"that isn't secret."
msgstr ""
"**Η γνωστοποίηση της διεύθυνσης OnionShare ενδέχεται να μην είναι "
"ασφαλής.** Η γνωστοποίηση της διεύθυνσης OnionShare είναι ευθύνη του "
@ -309,3 +309,20 @@ msgstr ""
#~ " public - see :ref:`turn_off_private_key`)."
#~ msgstr ""
#~ msgid ""
#~ "**If an attacker learns about the "
#~ "onion service, it still can't access "
#~ "anything.** Prior attacks against the "
#~ "Tor network to enumerate onion services"
#~ " allowed the attacker to discover "
#~ "private ``.onion`` addresses. If an "
#~ "attack discovers a private OnionShare "
#~ "address, they will also need to "
#~ "guess the private key used for "
#~ "client authentication in order to access"
#~ " it (unless the OnionShare user "
#~ "chooses make their serivce public by "
#~ "turning off the private key -- see"
#~ " :ref:`turn_off_private_key`)."
#~ msgstr ""

View file

@ -8,7 +8,7 @@ msgid ""
msgstr ""
"Project-Id-Version: OnionShare 2.3\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2021-09-09 19:15-0700\n"
"POT-Creation-Date: 2021-09-10 12:35-0700\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@ -70,7 +70,7 @@ msgid ""
"services allowed the attacker to discover private ``.onion`` addresses. "
"If an attack discovers a private OnionShare address, they will also need "
"to guess the private key used for client authentication in order to "
"access it (unless the OnionShare user chooses make their serivce public "
"access it (unless the OnionShare user chooses make their service public "
"by turning off the private key -- see :ref:`turn_off_private_key`)."
msgstr ""
@ -86,10 +86,10 @@ msgid ""
"through an email message monitored by an attacker), an eavesdropper can "
"tell that OnionShare is being used. If the eavesdropper loads the address"
" in Tor Browser while the service is still up, they can access it. To "
"avoid this, the address must be communicateed securely, via encrypted "
"text message (probably with disappearing messages enabled), encrypted "
"email, or in person. This isn't necessary when using OnionShare for "
"something that isn't secret."
"avoid this, the address must be communicated securely, via encrypted text"
" message (probably with disappearing messages enabled), encrypted email, "
"or in person. This isn't necessary when using OnionShare for something "
"that isn't secret."
msgstr ""
#: ../../source/security.rst:24
@ -310,3 +310,41 @@ msgstr ""
#~ " public - see :ref:`turn_off_private_key`)."
#~ msgstr ""
#~ msgid ""
#~ "**If an attacker learns about the "
#~ "onion service, it still can't access "
#~ "anything.** Prior attacks against the "
#~ "Tor network to enumerate onion services"
#~ " allowed the attacker to discover "
#~ "private ``.onion`` addresses. If an "
#~ "attack discovers a private OnionShare "
#~ "address, they will also need to "
#~ "guess the private key used for "
#~ "client authentication in order to access"
#~ " it (unless the OnionShare user "
#~ "chooses make their serivce public by "
#~ "turning off the private key -- see"
#~ " :ref:`turn_off_private_key`)."
#~ msgstr ""
#~ msgid ""
#~ "**Communicating the OnionShare address and "
#~ "private key might not be secure.** "
#~ "Communicating the OnionShare address to "
#~ "people is the responsibility of the "
#~ "OnionShare user. If sent insecurely "
#~ "(such as through an email message "
#~ "monitored by an attacker), an "
#~ "eavesdropper can tell that OnionShare is"
#~ " being used. If the eavesdropper "
#~ "loads the address in Tor Browser "
#~ "while the service is still up, "
#~ "they can access it. To avoid this,"
#~ " the address must be communicateed "
#~ "securely, via encrypted text message "
#~ "(probably with disappearing messages enabled),"
#~ " encrypted email, or in person. This"
#~ " isn't necessary when using OnionShare "
#~ "for something that isn't secret."
#~ msgstr ""

View file

@ -7,7 +7,7 @@ msgid ""
msgstr ""
"Project-Id-Version: OnionShare 2.3\n"
"Report-Msgid-Bugs-To: onionshare-dev@lists.riseup.net\n"
"POT-Creation-Date: 2021-09-09 19:15-0700\n"
"POT-Creation-Date: 2021-09-10 12:35-0700\n"
"PO-Revision-Date: 2020-12-16 00:29+0000\n"
"Last-Translator: Zuhualime Akoochimoya <zakooch@protonmail.ch>\n"
"Language: es\n"
@ -93,7 +93,7 @@ msgid ""
"services allowed the attacker to discover private ``.onion`` addresses. "
"If an attack discovers a private OnionShare address, they will also need "
"to guess the private key used for client authentication in order to "
"access it (unless the OnionShare user chooses make their serivce public "
"access it (unless the OnionShare user chooses make their service public "
"by turning off the private key -- see :ref:`turn_off_private_key`)."
msgstr ""
@ -110,10 +110,10 @@ msgid ""
"through an email message monitored by an attacker), an eavesdropper can "
"tell that OnionShare is being used. If the eavesdropper loads the address"
" in Tor Browser while the service is still up, they can access it. To "
"avoid this, the address must be communicateed securely, via encrypted "
"text message (probably with disappearing messages enabled), encrypted "
"email, or in person. This isn't necessary when using OnionShare for "
"something that isn't secret."
"avoid this, the address must be communicated securely, via encrypted text"
" message (probably with disappearing messages enabled), encrypted email, "
"or in person. This isn't necessary when using OnionShare for something "
"that isn't secret."
msgstr ""
"**Comunicar la dirección OnionShare podría no ser seguro.** Comunicar la "
"dirección OnionShare a las personas es la responsibalidad del usuario de "
@ -391,3 +391,20 @@ msgstr ""
#~ " public - see :ref:`turn_off_private_key`)."
#~ msgstr ""
#~ msgid ""
#~ "**If an attacker learns about the "
#~ "onion service, it still can't access "
#~ "anything.** Prior attacks against the "
#~ "Tor network to enumerate onion services"
#~ " allowed the attacker to discover "
#~ "private ``.onion`` addresses. If an "
#~ "attack discovers a private OnionShare "
#~ "address, they will also need to "
#~ "guess the private key used for "
#~ "client authentication in order to access"
#~ " it (unless the OnionShare user "
#~ "chooses make their serivce public by "
#~ "turning off the private key -- see"
#~ " :ref:`turn_off_private_key`)."
#~ msgstr ""

View file

@ -7,7 +7,7 @@ msgid ""
msgstr ""
"Project-Id-Version: OnionShare 2.3\n"
"Report-Msgid-Bugs-To: onionshare-dev@lists.riseup.net\n"
"POT-Creation-Date: 2021-09-09 19:15-0700\n"
"POT-Creation-Date: 2021-09-10 12:35-0700\n"
"PO-Revision-Date: 2021-04-01 18:26+0000\n"
"Last-Translator: Alexander Tarasenko <alexound.login@gmail.com>\n"
"Language: ru\n"
@ -95,7 +95,7 @@ msgid ""
"services allowed the attacker to discover private ``.onion`` addresses. "
"If an attack discovers a private OnionShare address, they will also need "
"to guess the private key used for client authentication in order to "
"access it (unless the OnionShare user chooses make their serivce public "
"access it (unless the OnionShare user chooses make their service public "
"by turning off the private key -- see :ref:`turn_off_private_key`)."
msgstr ""
@ -112,10 +112,10 @@ msgid ""
"through an email message monitored by an attacker), an eavesdropper can "
"tell that OnionShare is being used. If the eavesdropper loads the address"
" in Tor Browser while the service is still up, they can access it. To "
"avoid this, the address must be communicateed securely, via encrypted "
"text message (probably with disappearing messages enabled), encrypted "
"email, or in person. This isn't necessary when using OnionShare for "
"something that isn't secret."
"avoid this, the address must be communicated securely, via encrypted text"
" message (probably with disappearing messages enabled), encrypted email, "
"or in person. This isn't necessary when using OnionShare for something "
"that isn't secret."
msgstr ""
"**Передача адреса серсвиса OnionShare может быть небезопасной.** "
"Ответственность за передачу адреса сервиса OnionShare возлагается на "
@ -334,3 +334,20 @@ msgstr ""
#~ " public - see :ref:`turn_off_private_key`)."
#~ msgstr ""
#~ msgid ""
#~ "**If an attacker learns about the "
#~ "onion service, it still can't access "
#~ "anything.** Prior attacks against the "
#~ "Tor network to enumerate onion services"
#~ " allowed the attacker to discover "
#~ "private ``.onion`` addresses. If an "
#~ "attack discovers a private OnionShare "
#~ "address, they will also need to "
#~ "guess the private key used for "
#~ "client authentication in order to access"
#~ " it (unless the OnionShare user "
#~ "chooses make their serivce public by "
#~ "turning off the private key -- see"
#~ " :ref:`turn_off_private_key`)."
#~ msgstr ""

View file

@ -7,7 +7,7 @@ msgid ""
msgstr ""
"Project-Id-Version: OnionShare 2.3\n"
"Report-Msgid-Bugs-To: onionshare-dev@lists.riseup.net\n"
"POT-Creation-Date: 2021-09-09 19:15-0700\n"
"POT-Creation-Date: 2021-09-10 12:35-0700\n"
"PO-Revision-Date: 2020-12-31 19:29+0000\n"
"Last-Translator: Oğuz Ersen <oguzersen@protonmail.com>\n"
"Language: tr\n"
@ -94,7 +94,7 @@ msgid ""
"services allowed the attacker to discover private ``.onion`` addresses. "
"If an attack discovers a private OnionShare address, they will also need "
"to guess the private key used for client authentication in order to "
"access it (unless the OnionShare user chooses make their serivce public "
"access it (unless the OnionShare user chooses make their service public "
"by turning off the private key -- see :ref:`turn_off_private_key`)."
msgstr ""
@ -111,10 +111,10 @@ msgid ""
"through an email message monitored by an attacker), an eavesdropper can "
"tell that OnionShare is being used. If the eavesdropper loads the address"
" in Tor Browser while the service is still up, they can access it. To "
"avoid this, the address must be communicateed securely, via encrypted "
"text message (probably with disappearing messages enabled), encrypted "
"email, or in person. This isn't necessary when using OnionShare for "
"something that isn't secret."
"avoid this, the address must be communicated securely, via encrypted text"
" message (probably with disappearing messages enabled), encrypted email, "
"or in person. This isn't necessary when using OnionShare for something "
"that isn't secret."
msgstr ""
"**OnionShare adresinin iletilmesi güvenli olmayabilir.** OnionShare "
"adresini kişilere iletmek, OnionShare kullanıcısının sorumluluğundadır. "
@ -335,3 +335,20 @@ msgstr ""
#~ " public - see :ref:`turn_off_private_key`)."
#~ msgstr ""
#~ msgid ""
#~ "**If an attacker learns about the "
#~ "onion service, it still can't access "
#~ "anything.** Prior attacks against the "
#~ "Tor network to enumerate onion services"
#~ " allowed the attacker to discover "
#~ "private ``.onion`` addresses. If an "
#~ "attack discovers a private OnionShare "
#~ "address, they will also need to "
#~ "guess the private key used for "
#~ "client authentication in order to access"
#~ " it (unless the OnionShare user "
#~ "chooses make their serivce public by "
#~ "turning off the private key -- see"
#~ " :ref:`turn_off_private_key`)."
#~ msgstr ""

View file

@ -7,7 +7,7 @@ msgid ""
msgstr ""
"Project-Id-Version: OnionShare 2.3\n"
"Report-Msgid-Bugs-To: onionshare-dev@lists.riseup.net\n"
"POT-Creation-Date: 2021-09-09 19:15-0700\n"
"POT-Creation-Date: 2021-09-10 12:35-0700\n"
"PO-Revision-Date: 2021-07-08 02:32+0000\n"
"Last-Translator: Ihor Hordiichuk <igor_ck@outlook.com>\n"
"Language: uk\n"
@ -93,7 +93,7 @@ msgid ""
"services allowed the attacker to discover private ``.onion`` addresses. "
"If an attack discovers a private OnionShare address, they will also need "
"to guess the private key used for client authentication in order to "
"access it (unless the OnionShare user chooses make their serivce public "
"access it (unless the OnionShare user chooses make their service public "
"by turning off the private key -- see :ref:`turn_off_private_key`)."
msgstr ""
@ -110,10 +110,10 @@ msgid ""
"through an email message monitored by an attacker), an eavesdropper can "
"tell that OnionShare is being used. If the eavesdropper loads the address"
" in Tor Browser while the service is still up, they can access it. To "
"avoid this, the address must be communicateed securely, via encrypted "
"text message (probably with disappearing messages enabled), encrypted "
"email, or in person. This isn't necessary when using OnionShare for "
"something that isn't secret."
"avoid this, the address must be communicated securely, via encrypted text"
" message (probably with disappearing messages enabled), encrypted email, "
"or in person. This isn't necessary when using OnionShare for something "
"that isn't secret."
msgstr ""
"**Зв’язок з адресою OnionShare може бути ненадійним.** Відповідальність "
"за передавання адреси OnionShare людям покладено на користувача "
@ -380,3 +380,20 @@ msgstr ""
#~ " public - see :ref:`turn_off_private_key`)."
#~ msgstr ""
#~ msgid ""
#~ "**If an attacker learns about the "
#~ "onion service, it still can't access "
#~ "anything.** Prior attacks against the "
#~ "Tor network to enumerate onion services"
#~ " allowed the attacker to discover "
#~ "private ``.onion`` addresses. If an "
#~ "attack discovers a private OnionShare "
#~ "address, they will also need to "
#~ "guess the private key used for "
#~ "client authentication in order to access"
#~ " it (unless the OnionShare user "
#~ "chooses make their serivce public by "
#~ "turning off the private key -- see"
#~ " :ref:`turn_off_private_key`)."
#~ msgstr ""