Overview
Project website | www.torproject.org | |
---|---|---|
Instructions for translators | All the contributions to the Tor Project are bound by our Code of Conduct: https://gitweb.torproject.org/community/policies.git/plain/code_of_conduct.txt To share skills and solve any doubts, please join the Tor Localization community: https://gitlab.torproject.org/tpo/community/l10n/-/wikis/Localization-for-translators Please see our language statistics at https://tpo.pages.torproject.net/community/l10n/stats.html with up to date information about translation priorities. Remember that your name and email will appear on some translation files.We encourage the use of pseudonyms! |
|
Project maintainers |
![]() ![]() |
|
Language | English | |
Language code | en | |
Text direction | Left to right | |
Case sensitivity | Case-sensitive | |
Number of speakers | 1,728,900,209 |
String statistics
Strings percent | Hosted strings | Words percent | Hosted words | Characters percent | Hosted characters | |
---|---|---|---|---|---|---|
Total | 9,824 | 129,097 | 846,854 | |||
Approved | 0% | 0 | 0% | 0 | 0% | 0 |
Waiting for review | 1% | 56 | 0% | 121 | 1% | 939 |
Translated | 100% | 9,824 | 100% | 129,097 | 100% | 846,854 |
Needs editing | 0% | 0 | 0% | 0 | 0% | 0 |
Read-only | 99% | 9,768 | 99% | 128,976 | 99% | 845,915 |
Failing checks | 10% | 1,050 | 9% | 12,604 | 10% | 87,248 |
Strings with suggestions | 0% | 0 | 0% | 0 | 0% | 0 |
Untranslated strings | 0% | 0 | 0% | 0 | 0% | 0 |
Quick numbers
Trends of last 30 days
![]() Comment added |
|
![]() Comment added |
Not sure about the /fr after the website domain name. Pas sur du /fr après le nom de domaine du site. 3 days ago |
![]() Comment added |
To me the source string suggests that the spyware isntalled on localhost was used to target other devices. But the HuggingChat AI says it was otherwise: Pegasus spyware by NSO Group was designed to target and infect a local device, allowing the attackers to access the device's data, microphone, camera, and other features. Once infected, the device could be used to spy on its owner, but it was not designed to target other mobile phone users directly from the infected device. Instead, the attackers would use the infected device to gather information, which could then be used to target other individuals. Is the source sting correct or can be clarified? 4 days ago |
![]() String removed |
|
![]() String removed |
|
![]() String removed |
|
![]() String removed |
|
![]() String removed |
|
![]() String removed |
|
![]() String removed |
|
Please mention some context or use different/full word.
3 days ago