Unit Instance
Units API.
See the Weblate's Web API documentation for detailed description of the API.
GET /api/units/35305/?format=api
https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/en/?format=api", "source": [ "The two protocols above prevent eavesdropping attacks, but not man-in-the-middle attacks. If Mallory can intercept the messages sent by Alice, he could force her to reveal :math:`H^n(P)` and then use this information to authenticate as Alice on Bob's computer. In practice, hash chains should only be used when the communicating users know that there cannot be any man-in-the-middle on their communication." ], "previous_source": "", "target": [ "The two protocols above prevent eavesdropping attacks, but not man-in-the-middle attacks. If Mallory can intercept the messages sent by Alice, he could force her to reveal :math:`H^n(P)` and then use this information to authenticate as Alice on Bob's computer. In practice, hash chains should only be used when the communicating users know that there cannot be any man-in-the-middle on their communication." ], "id_hash": 5379531306207009916, "content_hash": 5379531306207009916, "location": "../../principles/security.rst:593", "context": "", "note": "", "flags": "", "state": 100, "fuzzy": false, "translated": true, "approved": false, "position": 56, "has_suggestion": false, "has_comment": false, "has_failing_check": false, "num_words": 61, "source_unit": "https://weblate.info.ucl.ac.be/api/units/35305/?format=api", "priority": 100, "id": 35305, "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/en/?checksum=caa7ef38948fdc7c", "url": "https://weblate.info.ucl.ac.be/api/units/35305/?format=api", "explanation": "", "extra_flags": "", "pending": false, "timestamp": "2021-08-27T14:43:08.131117+02:00" }{ "translation": "