Translation components API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/translations/tails/cold_boot_attacks/en/changes/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 7,
    "next": null,
    "previous": null,
    "results": [
        {
            "unit": "https://translate.tails.boum.org/api/units/672237/?format=api",
            "component": "https://translate.tails.boum.org/api/components/tails/cold_boot_attacks/?format=api",
            "translation": "https://translate.tails.boum.org/api/translations/tails/cold_boot_attacks/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2024-02-27T15:30:47.433369Z",
            "action": 13,
            "target": "<p>See how we implement this [[memory\nerasure|contribute/design/memory_erasure]], for example, if you want to\nimplement this feature outside of Tails.</p>\n",
            "id": 3258096,
            "action_name": "Source string added",
            "url": "https://translate.tails.boum.org/api/changes/3258096/?format=api"
        },
        {
            "unit": "https://translate.tails.boum.org/api/units/672235/?format=api",
            "component": "https://translate.tails.boum.org/api/components/tails/cold_boot_attacks/?format=api",
            "translation": "https://translate.tails.boum.org/api/translations/tails/cold_boot_attacks/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2024-02-27T15:30:47.412678Z",
            "action": 13,
            "target": "<div class=\"next\">\n",
            "id": 3258095,
            "action_name": "Source string added",
            "url": "https://translate.tails.boum.org/api/changes/3258095/?format=api"
        },
        {
            "unit": "https://translate.tails.boum.org/api/units/672233/?format=api",
            "component": "https://translate.tails.boum.org/api/components/tails/cold_boot_attacks/?format=api",
            "translation": "https://translate.tails.boum.org/api/translations/tails/cold_boot_attacks/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2024-02-27T15:30:47.398593Z",
            "action": 13,
            "target": "</div>\n",
            "id": 3258094,
            "action_name": "Source string added",
            "url": "https://translate.tails.boum.org/api/changes/3258094/?format=api"
        },
        {
            "unit": "https://translate.tails.boum.org/api/units/672231/?format=api",
            "component": "https://translate.tails.boum.org/api/components/tails/cold_boot_attacks/?format=api",
            "translation": "https://translate.tails.boum.org/api/translations/tails/cold_boot_attacks/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2024-02-27T15:30:47.371042Z",
            "action": 13,
            "target": "<p>In a <a\nhref=\"https://www.forensicfocus.com/stable/wp-content/uploads/2011/08/cold_boot_attack_for_forensiscs1.pdf\">research\nreport from 2011</a>, Defense Research and Development Canada concluded that\ncold boot attacks can be useful in some cases to acquire data in memory but are\nnot a panacea and have many drawbacks dictated by the laws of physics, which\ncannot be overcome by the technique. The authors recommend to only use cold\nboot attacks as a last resort when all other avenues have been exhausted.</p>\n",
            "id": 3258093,
            "action_name": "Source string added",
            "url": "https://translate.tails.boum.org/api/changes/3258093/?format=api"
        },
        {
            "unit": "https://translate.tails.boum.org/api/units/672229/?format=api",
            "component": "https://translate.tails.boum.org/api/components/tails/cold_boot_attacks/?format=api",
            "translation": "https://translate.tails.boum.org/api/translations/tails/cold_boot_attacks/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2024-02-27T15:30:47.306853Z",
            "action": 13,
            "target": "<p>As far as we know, cold boot attacks are not a common procedure for\ndata recovery.</p>\n",
            "id": 3258092,
            "action_name": "Source string added",
            "url": "https://translate.tails.boum.org/api/changes/3258092/?format=api"
        },
        {
            "unit": "https://translate.tails.boum.org/api/units/672227/?format=api",
            "component": "https://translate.tails.boum.org/api/components/tails/cold_boot_attacks/?format=api",
            "translation": "https://translate.tails.boum.org/api/translations/tails/cold_boot_attacks/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2024-02-27T15:30:47.287978Z",
            "action": 13,
            "target": "<div class=\"attack\">\n",
            "id": 3258091,
            "action_name": "Source string added",
            "url": "https://translate.tails.boum.org/api/changes/3258091/?format=api"
        },
        {
            "unit": "https://translate.tails.boum.org/api/units/672225/?format=api",
            "component": "https://translate.tails.boum.org/api/components/tails/cold_boot_attacks/?format=api",
            "translation": "https://translate.tails.boum.org/api/translations/tails/cold_boot_attacks/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2024-02-27T15:30:47.271958Z",
            "action": 13,
            "target": "After a computer is powered off, the data in RAM disappears rapidly, but it can remain in RAM up to several minutes after shutdown. An attacker having access to a computer before the data in RAM disappears completely could recover important data from your session.",
            "id": 3258090,
            "action_name": "Source string added",
            "url": "https://translate.tails.boum.org/api/changes/3258090/?format=api"
        }
    ]
}