Units API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/units/30175/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/fr/?format=api",
    "source": [
        "When designing network protocols and applications that will be deployed on a large scale, it is important to take those DDoS attacks into account. Attackers use different strategies to launch DDoS attacks. Some have managed to gain control of a large number of sources by injecting malware on them. Others, and this is where protocol designers have an important role to play, simply exploit design flaws in some protocols. Consider a simple request-response protocol where the client sends a request and the server replies with a response. Often the response is larger or much larger than the request sent by the client. Consider that such a simple protocol is used over a datagram network. When Alice sends a datagram to Bob containing her request, Bob extracts both the request and Alice's address from the packet. He then sends his response in a single packet destined to Alice. Mallory would like to create a DoS attack against Alice without being identified. Since he has studied the specification of this protocol, he can send a request to Bob inside a packet having Alice's address as its source address. Bob will process the request and send his (large) response to Alice. If the response has the same size as the request, Mallory is producing a `reflection attack` since his packets are reflected by Bob. Alice would think that she is attacked by Bob. If there are many servers that operate the same service as Bob, Mallory could hide behind a large number of such reflectors. Unfortunately, the reflection attack can also become an amplification attack. This happens when the response sent by Bob is larger than the request that it has received. If the response is :math:`k` times larger than the request, then when Mallory consumes 1 Gbps of bandwidth to send requests, his victim receives :math:`k` Gbps of attack traffic. Such amplification attacks are a very important problem and protocol designers should ensure that they never send a large response before having received the proof that the request that they have received originated from the source indicated in the request."
    ],
    "previous_source": "",
    "target": [
        ""
    ],
    "id_hash": 4925863820556685177,
    "content_hash": 4925863820556685177,
    "location": "../../principles/security.rst:213",
    "context": "",
    "note": "",
    "flags": "",
    "state": 0,
    "fuzzy": false,
    "translated": false,
    "approved": false,
    "position": 16,
    "has_suggestion": false,
    "has_comment": false,
    "has_failing_check": false,
    "num_words": 348,
    "source_unit": "https://weblate.info.ucl.ac.be/api/units/35265/?format=api",
    "priority": 100,
    "id": 30175,
    "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/fr/?checksum=c45c2f0be43acf79",
    "url": "https://weblate.info.ucl.ac.be/api/units/30175/?format=api",
    "explanation": "",
    "extra_flags": "",
    "pending": false,
    "timestamp": "2021-08-27T14:43:06.933455+02:00"
}