Translation components API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/translations/cnp3-ebook/principlessecurity/fr/units/?format=api&page=5
HTTP 200 OK
Allow: GET, POST, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 107,
    "next": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/units/?format=api&page=6",
    "previous": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/units/?format=api&page=4",
    "results": [
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "From her knowledge of :math:`a` and :math:`B`, Alice can compute :math:`Secret=B^{a} \\mod p= (g^{b} \\mod p) ^{a} \\mod p=g^{a \\times b} \\mod p`"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -2870336345749087328,
            "content_hash": -2870336345749087328,
            "location": "../../principles/security.rst:935",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 83,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 23,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35332/?format=api",
            "priority": 100,
            "id": 30242,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=582a844d1dbb9ba0",
            "url": "https://weblate.info.ucl.ac.be/api/units/30242/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:08.925224+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "From is knowledge of :math:`b` and :math:`A`, Bob can compute :math:`Secret=A^{b} \\mod p=(g^{a} \\mod p) ^{b} \\mod p=g^{a \\times b} \\mod p`"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -5133349972044708236,
            "content_hash": -5133349972044708236,
            "location": "../../principles/security.rst:937",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 84,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 22,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35333/?format=api",
            "priority": 100,
            "id": 30243,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=38c2ad65e8838674",
            "url": "https://weblate.info.ucl.ac.be/api/units/30243/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:08.952511+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "The security of this protocol relies on the difficulty of computing discrete logarithms, i.e. from the knowledge of :math:`A` (resp. :math:`B`), it is very difficult to extract :math:`\\log(A)=\\log(g^{a} \\mod p)=a` (resp. :math:`\\log(B)=\\log(g^{b} \\mod p)=b`)."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5051057875328455696,
            "content_hash": 5051057875328455696,
            "location": "../../principles/security.rst:940",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 85,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 34,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35334/?format=api",
            "priority": 100,
            "id": 30244,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=c618f6603ee45410",
            "url": "https://weblate.info.ucl.ac.be/api/units/30244/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:08.979148+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "An example of the utilization of the Diffie-Hellman key exchange is shown below. Before starting the exchange, Alice and Bob agree on a modulus (:math:`p=23`) and a base (:math:`g=5`). These two numbers are public. They are typically part of the standard that defines the protocol that uses the key exchange."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -6769038604417720645,
            "content_hash": -6769038604417720645,
            "location": "../../principles/security.rst:945",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 86,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 50,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35335/?format=api",
            "priority": 100,
            "id": 30245,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=220f8b40d0c69ebb",
            "url": "https://weblate.info.ucl.ac.be/api/units/30245/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.005642+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Alice chooses a secret integer : :math:`a=8` and sends :math:`A= g^{a} \\mod p= 5^{8} \\mod 23=16` to Bob"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 6166597401468576195,
            "content_hash": 6166597401468576195,
            "location": "../../principles/security.rst:951",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 87,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 18,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35336/?format=api",
            "priority": 100,
            "id": 30246,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=d59427aa2361a1c3",
            "url": "https://weblate.info.ucl.ac.be/api/units/30246/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.032225+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Bob chooses a secret integer : :math:`b=13` and sends :math:`B= g^{b} \\mod p=5^{13} \\mod 23=21` to Alice"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 6288557607154090468,
            "content_hash": 6288557607154090468,
            "location": "../../principles/security.rst:953",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 88,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 17,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35337/?format=api",
            "priority": 100,
            "id": 30247,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=d74571d3540001e4",
            "url": "https://weblate.info.ucl.ac.be/api/units/30247/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.058799+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Alice computes :math:`S_{A}=B^{a} \\mod p= 21^{8} \\mod 23=3`"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -6005749928323971524,
            "content_hash": -6005749928323971524,
            "location": "../../principles/security.rst:955",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 89,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 8,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35338/?format=api",
            "priority": 100,
            "id": 30248,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=2ca74a42906c063c",
            "url": "https://weblate.info.ucl.ac.be/api/units/30248/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.084713+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Bob computes :math:`S_{B}=A^{b} \\mod p= 16^{13} \\mod 23=3`"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 6136980182492501001,
            "content_hash": 6136980182492501001,
            "location": "../../principles/security.rst:956",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 90,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 8,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35339/?format=api",
            "priority": 100,
            "id": 30249,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=d52aeef5fb13d409",
            "url": "https://weblate.info.ucl.ac.be/api/units/30249/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.111096+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Alice and Bob have agreed on the secret information :math:`3` without having sent it explicitly through the network. If the integers used are large enough and have good properties, then even Eve who can capture all the messages sent by Alice and Bob cannot recover the secret key that they have exchanged. There is no formal proof of the security of the algorithm, but mathematicians have tried to solve similar problems with integers during centuries without finding an efficient algorithm. As long as the integers that are used are random and large enough, the only possible attack for Eve is to test all possible integers that could have been chosen by Alice and Bob. This is computationally very expensive. This algorithm is widely used in security protocols to agree on a secret key."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 8996132240101544556,
            "content_hash": 8996132240101544556,
            "location": "../../principles/security.rst:958",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 91,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 133,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35340/?format=api",
            "priority": 100,
            "id": 30250,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=fcd8ae9bdbb1126c",
            "url": "https://weblate.info.ucl.ac.be/api/units/30250/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.129316+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Unfortunately, the Diffie-Hellman key exchange alone cannot cope with man-in-the middle attacks. Consider Mallory who sits in the middle between Alice and Bob and can easily capture and modify their messages. The modulus and the base are public. They are thus known by Mallory as well. He could then operate as follows :"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 3870312933151271782,
            "content_hash": 3870312933151271782,
            "location": "../../principles/security.rst:970",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 92,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 53,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35341/?format=api",
            "priority": 100,
            "id": 30251,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=b5b61d1b5e14eb66",
            "url": "https://weblate.info.ucl.ac.be/api/units/30251/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.164518+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Alice chooses a secret integer and sends :math:`A= g^{a} \\mod p` to Mallory"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 4683913845264745062,
            "content_hash": 4683913845264745062,
            "location": "../../principles/security.rst:976",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 93,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 13,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35342/?format=api",
            "priority": 100,
            "id": 30252,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=c1009ad3698a0266",
            "url": "https://weblate.info.ucl.ac.be/api/units/30252/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.191141+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Mallory generates a secret integer, :math:`m` and sends :math:`M=g^{m} \\mod p` to Bob"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5081824751913890814,
            "content_hash": 5081824751913890814,
            "location": "../../principles/security.rst:977",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 94,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 13,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35343/?format=api",
            "priority": 100,
            "id": 30253,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=c68644afec9d73fe",
            "url": "https://weblate.info.ucl.ac.be/api/units/30253/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.217920+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Bob chooses a secret integer and sends :math:`B=g^{b} \\mod p` to Mallory"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 2464730915989456619,
            "content_hash": 2464730915989456619,
            "location": "../../principles/security.rst:978",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 95,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 12,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35344/?format=api",
            "priority": 100,
            "id": 30254,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=a2347bb59a7986eb",
            "url": "https://weblate.info.ucl.ac.be/api/units/30254/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.261334+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Mallory computes :math:`S_{A}=A^{m} \\mod p` and :math:`S_{B}=B^{m} \\mod p`"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 3679207617348162385,
            "content_hash": 3679207617348162385,
            "location": "../../principles/security.rst:979",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 96,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 9,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35345/?format=api",
            "priority": 100,
            "id": 30255,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=b30f2bd5aef2d351",
            "url": "https://weblate.info.ucl.ac.be/api/units/30255/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.277207+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Alice computes :math:`S_{A}=M^{a} \\mod p` and uses this key to communicate with Mallory (acting as Bob)"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -7544764980238741617,
            "content_hash": -7544764980238741617,
            "location": "../../principles/security.rst:980",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 97,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 16,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35346/?format=api",
            "priority": 100,
            "id": 30256,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=174b9c396f100f8f",
            "url": "https://weblate.info.ucl.ac.be/api/units/30256/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.306669+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Bob computes :math:`S_{B}=M^{b} \\mod p` and uses this key to communicate with Mallory (acting as Alice)"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -5196070178559591676,
            "content_hash": -5196070178559591676,
            "location": "../../principles/security.rst:981",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 98,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 16,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35347/?format=api",
            "priority": 100,
            "id": 30257,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=37e3d9b3daf47b04",
            "url": "https://weblate.info.ucl.ac.be/api/units/30257/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.326125+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "When Alice sends a message, she encrypts it with :math:`S_{A}`. Mallory decrypts it with :math:`S_{A}` and encrypts the plaintext with :math:`S_{B}`. When Bob receives the message, he can decrypt it by using :math:`S_{B}`."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -3786645173073131278,
            "content_hash": -3786645173073131278,
            "location": "../../principles/security.rst:983",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 99,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 33,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35348/?format=api",
            "priority": 100,
            "id": 30258,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=4b732247108748f2",
            "url": "https://weblate.info.ucl.ac.be/api/units/30258/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.360647+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "To safely use the Diffie-Hellman key exchange, Alice and Bob must use an `authenticated` exchange. Some of the information sent by Alice or Bob must be signed with a public key known by the other user. In practice, it is often important for Alice to authenticate Bob. If Bob has a certificated signed by Ted, the authenticated key exchange could be organized as follows."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 4368572559100239457,
            "content_hash": 4368572559100239457,
            "location": "../../principles/security.rst:988",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 100,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 64,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35349/?format=api",
            "priority": 100,
            "id": 30259,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=bca04998c8b05e61",
            "url": "https://weblate.info.ucl.ac.be/api/units/30259/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.387584+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Alice chooses a secret integer : :math:`a` and sends :math:`A= g^{a} \\mod p` to Bob"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 1135664437440791903,
            "content_hash": 1135664437440791903,
            "location": "../../principles/security.rst:995",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 101,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 15,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35350/?format=api",
            "priority": 100,
            "id": 30260,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=8fc2b0c9f1b3c55f",
            "url": "https://weblate.info.ucl.ac.be/api/units/30260/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.414614+02:00"
        },
        {
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
            "source": [
                "Bob chooses a secret integer : :math:`b`, computes :math:`B= g^{b} \\mod p` and sends :math:`Cert(Bob,Bob_{pub},Ted), E_p(Bob_{priv},B)` to Alice"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 322939187572083842,
            "content_hash": 322939187572083842,
            "location": "../../principles/security.rst:997",
            "context": "",
            "note": "",
            "flags": "",
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 102,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 18,
            "source_unit": "https://weblate.info.ucl.ac.be/api/units/35351/?format=api",
            "priority": 100,
            "id": 30261,
            "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=847b4f7ae7498c82",
            "url": "https://weblate.info.ucl.ac.be/api/units/30261/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-08-27T14:43:09.446664+02:00"
        }
    ]
}