560 |
|
All strings — 30,953 words | Browse Translate Zen |
---|---|---|---|
560 |
|
Translated strings — 30,953 words | Browse Translate Zen |
Other components
Component | Translated | Unfinished | Unfinished words | Unfinished characters | Untranslated | Checks | Suggestions | Comments | |
---|---|---|---|---|---|---|---|---|---|
resources | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
earsandeyes | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
threats.contribute | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
earsandeyes.contribute | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
threats.about | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
earsandeyes.about | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
core | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
resources.contribute | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
threats.tutorial | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
core.editorial-policy | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
Overview
Project website | notrace.how |
---|---|
Instructions for translators | See this page. |
Project maintainers | ntp |
Translation license | Proprietary |
Translation process |
|
File mask | threats/*.json |
Monolingual base language file | threats/en.json |
Translation file |
Download
threats/fr.json
|
Last change | Nov. 15, 2024, 8:36 p.m. |
Last author | No Trace Project |
String statistics
Strings percent | Hosted strings | Words percent | Hosted words | Characters percent | Hosted characters | |
---|---|---|---|---|---|---|
Total | 560 | 30,953 | 222,815 | |||
Translated | 100% | 560 | 100% | 30,953 | 100% | 222,815 |
Needs editing | 0% | 0 | 0% | 0 | 0% | 0 |
Read-only | 0% | 0 | 0% | 0 | 0% | 0 |
Failing checks | 0% | 0 | 0% | 0 | 0% | 0 |
Strings with suggestions | 0% | 0 | 0% | 0 | 0% | 0 |
Untranslated strings | 0% | 0 | 0% | 0 | 0% | 0 |
Quick numbers
and previous 30 days
Trends of last 30 days
+1%
Hosted words
+100%
+2%
Hosted strings
+100%
—
Translated
+100%
+50%
Contributors
+100%
ntp
Translation changed |
|
ntp
Translation changed |
|
ntp
Translation changed |
|
ntp
Translation changed |
|
ntp
Translation changed |
|
ntp
Translation changed |
|
ntp
Source string changed |
|
ntp
Translation changed |
|
ntp
Translation changed |
|
ntp
Translation changed |
|
560 | File in original format as translated in the repository | JSON nested structure file | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
560 | All strings, converted files enriched with comments; suitable for offline translation | Android String Resource | CSV | JSON | gettext PO | iOS strings | TBX | TMX | XLIFF 1.1 with gettext extensions | XLIFF 1.1 | XLSX |
Malware can be installed on a device:
- Remotely, typically through phishing[^https://en.wikipedia.org/wiki/Phishing] via email or text-based messages (SMS, etc.) To be effective, phishing often requires the target to open a malicious file or link.
- By [physical accessing](tl://techniques/targeted-digital-surveillance/physical-access.html) the device.
See the ["Targeted malware" topic](res://#topic=targeted-malware).
Un logiciel malveillant peut être installé sur un appareil :
- À distance, typiquement grâce au phishing[^https://fr.wikipedia.org/wiki/Hameçonnage] par email ou messages (SMS, etc.) Pour être efficace, le phishing nécessite souvent que la cible ouvre un fichier ou un lien malveillant.
- En [accédant physiquement](tl://techniques/targeted-digital-surveillance/physical-access.html) à l'appareil.
Voir le [sujet "Logiciels malveillants ciblés"](res://#topic=targeted-malware).