Changes
Translation components API.
See the Weblate's Web API documentation for detailed description of the API.
GET /api/translations/tails/cold_boot_attacks/en/changes/?format=api
https://translate.tails.net/api/units/483288/?format=api", "component": "https://translate.tails.net/api/components/tails/cold_boot_attacks/?format=api", "translation": "https://translate.tails.net/api/translations/tails/cold_boot_attacks/en/?format=api", "user": "https://translate.tails.net/api/users/sajolida/?format=api", "author": "https://translate.tails.net/api/users/ignifugo/?format=api", "timestamp": "2024-07-30T20:52:59.710400Z", "action": 65, "target": "", "id": 3329756, "action_name": "Comment resolved", "url": "https://translate.tails.net/api/changes/3329756/?format=api" }, { "unit": "https://translate.tails.net/api/units/688674/?format=api", "component": "https://translate.tails.net/api/components/tails/cold_boot_attacks/?format=api", "translation": "https://translate.tails.net/api/translations/tails/cold_boot_attacks/en/?format=api", "user": null, "author": null, "timestamp": "2024-05-27T22:25:37.032919Z", "action": 13, "target": "This can be achieved using a technique called [[!wikipedia cold boot attack]]. To prevent such attacks, the data in RAM is overwritten by random data when you shut down Tails.", "id": 3319824, "action_name": "Source string added", "url": "https://translate.tails.net/api/changes/3319824/?format=api" }, { "unit": "https://translate.tails.net/api/units/672237/?format=api", "component": "https://translate.tails.net/api/components/tails/cold_boot_attacks/?format=api", "translation": "https://translate.tails.net/api/translations/tails/cold_boot_attacks/en/?format=api", "user": null, "author": null, "timestamp": "2024-02-27T15:30:47.433369Z", "action": 13, "target": "<p>See how we implement this [[memory\nerasure|contribute/design/memory_erasure]], for example, if you want to\nimplement this feature outside of Tails.</p>\n", "id": 3258096, "action_name": "Source string added", "url": "https://translate.tails.net/api/changes/3258096/?format=api" }, { "unit": "https://translate.tails.net/api/units/672235/?format=api", "component": "https://translate.tails.net/api/components/tails/cold_boot_attacks/?format=api", "translation": "https://translate.tails.net/api/translations/tails/cold_boot_attacks/en/?format=api", "user": null, "author": null, "timestamp": "2024-02-27T15:30:47.412678Z", "action": 13, "target": "<div class=\"next\">\n", "id": 3258095, "action_name": "Source string added", "url": "https://translate.tails.net/api/changes/3258095/?format=api" }, { "unit": "https://translate.tails.net/api/units/672233/?format=api", "component": "https://translate.tails.net/api/components/tails/cold_boot_attacks/?format=api", "translation": "https://translate.tails.net/api/translations/tails/cold_boot_attacks/en/?format=api", "user": null, "author": null, "timestamp": "2024-02-27T15:30:47.398593Z", "action": 13, "target": "</div>\n", "id": 3258094, "action_name": "Source string added", "url": "https://translate.tails.net/api/changes/3258094/?format=api" }, { "unit": "https://translate.tails.net/api/units/672231/?format=api", "component": "https://translate.tails.net/api/components/tails/cold_boot_attacks/?format=api", "translation": "https://translate.tails.net/api/translations/tails/cold_boot_attacks/en/?format=api", "user": null, "author": null, "timestamp": "2024-02-27T15:30:47.371042Z", "action": 13, "target": "<p>In a <a\nhref=\"https://www.forensicfocus.com/stable/wp-content/uploads/2011/08/cold_boot_attack_for_forensiscs1.pdf\">research\nreport from 2011</a>, Defense Research and Development Canada concluded that\ncold boot attacks can be useful in some cases to acquire data in memory but are\nnot a panacea and have many drawbacks dictated by the laws of physics, which\ncannot be overcome by the technique. The authors recommend to only use cold\nboot attacks as a last resort when all other avenues have been exhausted.</p>\n", "id": 3258093, "action_name": "Source string added", "url": "https://translate.tails.net/api/changes/3258093/?format=api" }, { "unit": "https://translate.tails.net/api/units/672229/?format=api", "component": "https://translate.tails.net/api/components/tails/cold_boot_attacks/?format=api", "translation": "https://translate.tails.net/api/translations/tails/cold_boot_attacks/en/?format=api", "user": null, "author": null, "timestamp": "2024-02-27T15:30:47.306853Z", "action": 13, "target": "<p>As far as we know, cold boot attacks are not a common procedure for\ndata recovery.</p>\n", "id": 3258092, "action_name": "Source string added", "url": "https://translate.tails.net/api/changes/3258092/?format=api" }, { "unit": "https://translate.tails.net/api/units/672227/?format=api", "component": "https://translate.tails.net/api/components/tails/cold_boot_attacks/?format=api", "translation": "https://translate.tails.net/api/translations/tails/cold_boot_attacks/en/?format=api", "user": null, "author": null, "timestamp": "2024-02-27T15:30:47.287978Z", "action": 13, "target": "<div class=\"attack\">\n", "id": 3258091, "action_name": "Source string added", "url": "https://translate.tails.net/api/changes/3258091/?format=api" }, { "unit": "https://translate.tails.net/api/units/672225/?format=api", "component": "https://translate.tails.net/api/components/tails/cold_boot_attacks/?format=api", "translation": "https://translate.tails.net/api/translations/tails/cold_boot_attacks/en/?format=api", "user": null, "author": null, "timestamp": "2024-02-27T15:30:47.271958Z", "action": 13, "target": "After a computer is powered off, the data in RAM disappears rapidly, but it can remain in RAM up to several minutes after shutdown. An attacker having access to a computer before the data in RAM disappears completely could recover important data from your session.", "id": 3258090, "action_name": "Source string added", "url": "https://translate.tails.net/api/changes/3258090/?format=api" } ] }{ "count": 9, "next": null, "previous": null, "results": [ { "unit": "