Unit Instance
Units API.
See the Weblate's Web API documentation for detailed description of the API.
GET /api/units/30171/?format=api
https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api", "source": [ "Eavesdropping and pervasive monitoring are not the only possible attacks against a network. Another type of attacker is the active attacker. In the literature, these attacks are often called `Man in the middle` or `MITM` attacks. Such attacks occur when one user, let us call him `Mallory`, has managed to configure the network so that he can both capture and modify the packets exchanged by two users. The simplest scenario is when Mallory controls a router that is on the path used by both Alice and Bob. For example, Alice could be connected to a WiFi access router controlled by Mallory and Bob would be a regular server on the Internet." ], "previous_source": "", "target": [ "" ], "id_hash": -1772842527446963395, "content_hash": -1772842527446963395, "location": "../../principles/security.rst:155", "context": "", "note": "", "flags": "", "state": 0, "fuzzy": false, "translated": false, "approved": false, "position": 12, "has_suggestion": false, "has_comment": false, "has_failing_check": false, "num_words": 111, "source_unit": "https://weblate.info.ucl.ac.be/api/units/35261/?format=api", "priority": 100, "id": 30171, "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=6765991d3cd16b3d", "url": "https://weblate.info.ucl.ac.be/api/units/30171/?format=api", "explanation": "", "extra_flags": "", "pending": false, "timestamp": "2021-08-27T14:43:06.772873+02:00" }{ "translation": "