summaryrefslogtreecommitdiff
path: root/docs/source/locale/ar/LC_MESSAGES/security.po
diff options
context:
space:
mode:
Diffstat (limited to 'docs/source/locale/ar/LC_MESSAGES/security.po')
-rw-r--r--docs/source/locale/ar/LC_MESSAGES/security.po46
1 files changed, 39 insertions, 7 deletions
diff --git a/docs/source/locale/ar/LC_MESSAGES/security.po b/docs/source/locale/ar/LC_MESSAGES/security.po
index 79923cda..05816266 100644
--- a/docs/source/locale/ar/LC_MESSAGES/security.po
+++ b/docs/source/locale/ar/LC_MESSAGES/security.po
@@ -8,7 +8,7 @@ msgid ""
msgstr ""
"Project-Id-Version: OnionShare 2.3\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-11-15 14:42-0800\n"
+"POT-Creation-Date: 2020-12-13 15:48-0800\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -70,8 +70,8 @@ msgid ""
"services allowed the attacker to discover private .onion addresses. If an"
" attack discovers a private OnionShare address, a password will be "
"prevent them from accessing it (unless the OnionShare user chooses to "
-"turn it off and make it public).. The password is generated by choosing "
-"two random words from a list of 6800 words, making 6800^2, or about 46 "
+"turn it off and make it public). The password is generated by choosing "
+"two random words from a list of 6800 words, making 6800², or about 46 "
"million possible passwords. Only 20 wrong guesses can be made before "
"OnionShare stops the server, preventing brute force attacks against the "
"password."
@@ -97,10 +97,10 @@ msgstr ""
#: ../../source/security.rst:24
msgid ""
"**Communicating the OnionShare address might not be anonymous.** Extra "
-"steps must be taken to ensure the OnionShare address is communicated "
-"anonymously. A new email or chat account, only accessed over Tor, can be "
-"used to share the address. This isn't necessary unless anonymity is a "
-"goal."
+"precautions must be taken to ensure the OnionShare address is "
+"communicated anonymously. A new email or chat account, only accessed over"
+" Tor, can be used to share the address. This isn't necessary unless "
+"anonymity is a goal."
msgstr ""
#~ msgid "Security design"
@@ -210,3 +210,35 @@ msgstr ""
#~ "know each other sharing work documents."
#~ msgstr ""
+#~ msgid ""
+#~ "**If an attacker learns about the "
+#~ "onion service, it still can't access "
+#~ "anything.** Prior attacks against the "
+#~ "Tor network to enumerate onion services"
+#~ " allowed the attacker to discover "
+#~ "private .onion addresses. If an attack"
+#~ " discovers a private OnionShare address,"
+#~ " a password will be prevent them "
+#~ "from accessing it (unless the OnionShare"
+#~ " user chooses to turn it off "
+#~ "and make it public).. The password "
+#~ "is generated by choosing two random "
+#~ "words from a list of 6800 words,"
+#~ " making 6800^2, or about 46 million"
+#~ " possible passwords. Only 20 wrong "
+#~ "guesses can be made before OnionShare"
+#~ " stops the server, preventing brute "
+#~ "force attacks against the password."
+#~ msgstr ""
+
+#~ msgid ""
+#~ "**Communicating the OnionShare address might"
+#~ " not be anonymous.** Extra steps must"
+#~ " be taken to ensure the OnionShare"
+#~ " address is communicated anonymously. A "
+#~ "new email or chat account, only "
+#~ "accessed over Tor, can be used to"
+#~ " share the address. This isn't "
+#~ "necessary unless anonymity is a goal."
+#~ msgstr ""
+