Merge pull request #13 from iftas-org/l10n_main2

New Crowdin updates
This commit is contained in:
Jaz-Michael King 2024-11-27 13:31:15 -05:00 committed by GitHub
commit a60f1fe515
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
37 changed files with 41 additions and 7 deletions

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

View file

@ -1,3 +1,3 @@
Account Takeover 帐户盗用
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. 指未经许可的用户通过黑客攻击、网络钓鱼或购买泄露的凭证等手段获得账户控制权的情形。

View file

@ -1,3 +1,3 @@
Astroturfing 水军
Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. 指由个人或少数不明来源资助、策划与推动的有组织活动,旨在制造对特定议题或组织广泛而真实的群体支持或反对的假象。

View file

@ -1,5 +1,5 @@
Brigading 集体刷屏
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. 指协调一致的,通常有预先计划的大规模在线活动,旨在影响某条内容、某个帐户或整个社区或留言板。
Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. 例子包括:协调一致地顶/踩某条帖文以影响其传播;集体举报某个帐户(通常是虚假举报)的滥用行为,试图让服务提供商暂停该帐户;或向企业发送大量好评或差评。

View file

@ -0,0 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

View file

@ -0,0 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.