Units
Translation components API.
See the Weblate's Web API documentation for detailed description of the API.
GET /api/translations/cnp3-ebook/principlessecurity/fr/units/?format=api&page=6
https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/units/?format=api&page=5", "results": [ { "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api", "source": [ "Alice checks the signature (with :math:`Bob_{pub}`) and the certificate and computes :math:`S_{A}=B^{a} \\mod p`" ], "previous_source": "", "target": [ "" ], "id_hash": 1681241781242670102, "content_hash": 1681241781242670102, "location": "../../principles/security.rst:1000", "context": "", "note": "", "flags": "", "state": 0, "fuzzy": false, "translated": false, "approved": false, "position": 103, "has_suggestion": false, "has_comment": false, "has_failing_check": false, "num_words": 14, "source_unit": "https://weblate.info.ucl.ac.be/api/units/35352/?format=api", "priority": 100, "id": 30262, "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=9754f87e1083ac16", "url": "https://weblate.info.ucl.ac.be/api/units/30262/?format=api", "explanation": "", "extra_flags": "", "pending": false, "timestamp": "2021-08-27T14:43:09.475273+02:00" }, { "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api", "source": [ "Bob computes :math:`S_{B}=A^{b} \\mod p`" ], "previous_source": "", "target": [ "" ], "id_hash": -5468862357237084228, "content_hash": -5468862357237084228, "location": "../../principles/security.rst:1002", "context": "", "note": "", "flags": "", "state": 0, "fuzzy": false, "translated": false, "approved": false, "position": 104, "has_suggestion": false, "has_comment": false, "has_failing_check": false, "num_words": 5, "source_unit": "https://weblate.info.ucl.ac.be/api/units/35353/?format=api", "priority": 100, "id": 30263, "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=341ab2a94f60cfbc", "url": "https://weblate.info.ucl.ac.be/api/units/30263/?format=api", "explanation": "", "extra_flags": "", "pending": false, "timestamp": "2021-08-27T14:43:09.502244+02:00" }, { "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api", "source": [ "This prevents the attack mentioned above since Mallory cannot create a fake certificate and cannot sign a value by using Bob's private key. Given the risk of man-in-the-middle attacks, the Diffie-Hellman key exchange mechanism should never be used without authentication." ], "previous_source": "", "target": [ "" ], "id_hash": 359760008064716201, "content_hash": 359760008064716201, "location": "../../principles/security.rst:1006", "context": "", "note": "", "flags": "", "state": 0, "fuzzy": false, "translated": false, "approved": false, "position": 105, "has_suggestion": false, "has_comment": false, "has_failing_check": false, "num_words": 40, "source_unit": "https://weblate.info.ucl.ac.be/api/units/35354/?format=api", "priority": 100, "id": 30264, "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=84fe1fd23d16cda9", "url": "https://weblate.info.ucl.ac.be/api/units/30264/?format=api", "explanation": "", "extra_flags": "", "pending": false, "timestamp": "2021-08-27T14:43:09.520238+02:00" }, { "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api", "source": [ "Footnotes" ], "previous_source": "", "target": [ "Notes de pied de page" ], "id_hash": 4927974446680086946, "content_hash": 4927974446680086946, "location": "../../principles/security.rst:1015", "context": "", "note": "", "flags": "", "state": 20, "fuzzy": false, "translated": true, "approved": false, "position": 106, "has_suggestion": false, "has_comment": false, "has_failing_check": true, "num_words": 1, "source_unit": "https://weblate.info.ucl.ac.be/api/units/35355/?format=api", "priority": 100, "id": 30265, "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=c463aea6549199a2", "url": "https://weblate.info.ucl.ac.be/api/units/30265/?format=api", "explanation": "", "extra_flags": "", "pending": false, "timestamp": "2021-08-27T14:43:09.555161+02:00" }, { "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api", "source": [ "The wikipedia page on passwords provides many of these references : https://en.wikipedia.org/wiki/Password_strength" ], "previous_source": "", "target": [ "" ], "id_hash": -2543740200516408233, "content_hash": -2543740200516408233, "location": "../../principles/security.rst:1016", "context": "", "note": "", "flags": "", "state": 0, "fuzzy": false, "translated": false, "approved": false, "position": 107, "has_suggestion": false, "has_comment": false, "has_failing_check": false, "num_words": 12, "source_unit": "https://weblate.info.ucl.ac.be/api/units/35356/?format=api", "priority": 100, "id": 30266, "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=5cb2d1c3d356ac57", "url": "https://weblate.info.ucl.ac.be/api/units/30266/?format=api", "explanation": "", "extra_flags": "", "pending": false, "timestamp": "2021-08-27T14:43:09.581413+02:00" }, { "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api", "source": [ "A detailed explanation of the operation of the RSA algorithm is outside the scope of this e-book. Various tutorials such as the `RSA page <https://en.wikipedia.org/wiki/RSA_(cryptosystem)>`_ on wikipedia provide examples and tutorial information." ], "previous_source": "", "target": [ "" ], "id_hash": -5254417733483323644, "content_hash": -5254417733483323644, "location": "../../principles/security.rst:1019", "context": "", "note": "", "flags": "", "state": 0, "fuzzy": false, "translated": false, "approved": false, "position": 108, "has_suggestion": false, "has_comment": false, "has_failing_check": false, "num_words": 32, "source_unit": "https://weblate.info.ucl.ac.be/api/units/35357/?format=api", "priority": 100, "id": 30267, "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=37148ee916369f04", "url": "https://weblate.info.ucl.ac.be/api/units/30267/?format=api", "explanation": "", "extra_flags": "", "pending": false, "timestamp": "2021-08-27T14:43:09.599419+02:00" }, { "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api", "source": [ "A detailed explanation of the ECC cryptosystems is outside the scope of this e-book. A simple introduction may be found on `Andrea Corbellini's blog <http://andrea.corbellini.name/2015/05/17/elliptic-curve-cryptography-a-gentle-introduction/>`_. There have been deployments of ECC recently because ECC schemes usually require shorter keys than RSA and consume less CPU." ], "previous_source": "", "target": [ "" ], "id_hash": 1393446415003295341, "content_hash": 1393446415003295341, "location": "../../principles/security.rst:1024", "context": "", "note": "", "flags": "", "state": 0, "fuzzy": false, "translated": false, "approved": false, "position": 109, "has_suggestion": false, "has_comment": false, "has_failing_check": false, "num_words": 45, "source_unit": "https://weblate.info.ucl.ac.be/api/units/35358/?format=api", "priority": 100, "id": 30268, "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=93568421b3d01e6d", "url": "https://weblate.info.ucl.ac.be/api/units/30268/?format=api", "explanation": "", "extra_flags": "", "pending": false, "timestamp": "2021-08-27T14:43:09.638164+02:00" } ] }{ "count": 107, "next": null, "previous": "