Unit Instance
Units API.
See the Weblate's Web API documentation for detailed description of the API.
GET /api/units/35298/?format=api
https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/en/?format=api", "source": [ "We can now combine the cryptographic operations described in the previous section to build some protocols to securely exchange information. Let us first go back to the problem of authenticating Alice on Bob's computer. We have shown earlier that using a simple password for this purpose is insecure in the presence of attackers." ], "previous_source": "", "target": [ "We can now combine the cryptographic operations described in the previous section to build some protocols to securely exchange information. Let us first go back to the problem of authenticating Alice on Bob's computer. We have shown earlier that using a simple password for this purpose is insecure in the presence of attackers." ], "id_hash": -4614313006029320827, "content_hash": -4614313006029320827, "location": "../../principles/security.rst:471", "context": "", "note": "", "flags": "", "state": 100, "fuzzy": false, "translated": true, "approved": false, "position": 49, "has_suggestion": false, "has_comment": false, "has_failing_check": false, "num_words": 53, "source_unit": "https://weblate.info.ucl.ac.be/api/units/35298/?format=api", "priority": 100, "id": 35298, "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/en/?checksum=3ff6aac4c9284d85", "url": "https://weblate.info.ucl.ac.be/api/units/35298/?format=api", "explanation": "", "extra_flags": "", "pending": false, "timestamp": "2021-08-27T14:43:07.881409+02:00" }{ "translation": "