|  | @@ -35,17 +35,44 @@
 | 
	
		
			
			| 35 | 35 |      "Block or unblock emails with text in the subject line": "",
 | 
	
		
			
			| 36 | 36 |      "When email arrives with subject text:": "",
 | 
	
		
			
			| 37 | 37 |      "No subject was given": "",
 | 
	
		
			
			| 38 |  | -    "Change Email Filtering Rules": "",
 | 
	
		
			
			|  | 38 | +    "Email with subject $BLOCK_SUBJECT is now blocked": "",
 | 
	
		
			
			|  | 39 | +    "Email with subject $BLOCK_SUBJECT is now unblocked": "",
 | 
	
		
			
			|  | 40 | +    "Your PGP/GPG Key": "",
 | 
	
		
			
			|  | 41 | +    "Email Address: $MY_EMAIL_ADDRESS\\n\\nKey ID: $GPG_ID\\n\\nFingerprint: $GPG_FINGERPRINT\\n\\nCreated: $GPG_DATE": "",
 | 
	
		
			
			|  | 42 | +    "Publish your PGP/GPG key": "",
 | 
	
		
			
			|  | 43 | +    "Your key has now been published": "",
 | 
	
		
			
			|  | 44 | +    "Add someone's PGP/GPG key": "",
 | 
	
		
			
			|  | 45 | +    "Enter their email address below": "",
 | 
	
		
			
			|  | 46 | +    "This doesn't look like an email address": "",
 | 
	
		
			
			|  | 47 | +    "Remove someone's PGP/GPG key": "",
 | 
	
		
			
			|  | 48 | +    "It's not a good idea to remove your own encryption key": "",
 | 
	
		
			
			|  | 49 | +    "Add an ssh key for logging in": "",
 | 
	
		
			
			|  | 50 | +    "This will allow you to log into ${PROJECT_NAME} if you have an ssh key on your system, and provides much stronger security than simply using a login password.\\n\\nWARNING: If you make any mistakes here then you may not be able to log in and will need to get the administrator to clear your ssh authorized_keys file.": "",
 | 
	
		
			
			|  | 51 | +    "New ssh key added": "",
 | 
	
		
			
			|  | 52 | +    "Your ssh key has now been added": "",
 | 
	
		
			
			|  | 53 | +    "ssh key already added": "",
 | 
	
		
			
			|  | 54 | +    "That ssh key has already been added": "",
 | 
	
		
			
			|  | 55 | +    "Unrecognised ssh public key": "",
 | 
	
		
			
			|  | 56 | +    "This doesn't look like an ssh key": "",
 | 
	
		
			
			|  | 57 | +    "Remove an ssh key for logging in": "",
 | 
	
		
			
			|  | 58 | +    "Enter the ssh public key which is to be removed. This can be just the address at the end.\\n\\nWARNING: If you make any mistakes here then you may not be able to log in and will need to get the administrator to clear your ssh authorized_keys file.": "",
 | 
	
		
			
			|  | 59 | +    "Remove an ssh public key": "",
 | 
	
		
			
			|  | 60 | +    "The ssh key has been removed": "",
 | 
	
		
			
			|  | 61 | +    "Your Encryption Keys": "",
 | 
	
		
			
			| 39 | 62 |      "Choose an operation:": "",
 | 
	
		
			
			|  | 63 | +    "Show your PGP/GPG key": "",
 | 
	
		
			
			|  | 64 | +    "Publish your PGP/GPG key so that others can find it": "",
 | 
	
		
			
			|  | 65 | +    "Back to main menu": "",
 | 
	
		
			
			|  | 66 | +    "Change Email Filtering Rules": "",
 | 
	
		
			
			| 40 | 67 |      "Add yourself to a mailing list": "",
 | 
	
		
			
			| 41 | 68 |      "Add an email rule for an address": "",
 | 
	
		
			
			| 42 | 69 |      "Add an email rule for a subject": "",
 | 
	
		
			
			| 43 | 70 |      "Block or unblock an email address": "",
 | 
	
		
			
			| 44 | 71 |      "Block or unblock email with subject text": "",
 | 
	
		
			
			| 45 |  | -    "Back to main menu": "",
 | 
	
		
			
			| 46 | 72 |      "User Control Panel": "",
 | 
	
		
			
			| 47 | 73 |      "Use Email": "",
 | 
	
		
			
			| 48 |  | -    "Use Chat": "",
 | 
	
		
			
			|  | 74 | +    "Use Tox Chat": "",
 | 
	
		
			
			|  | 75 | +    "Use XMPP Chat": "",
 | 
	
		
			
			| 49 | 76 |      "Use IRC": "",
 | 
	
		
			
			| 50 | 77 |      "Exit to the command line": "",
 | 
	
		
			
			| 51 | 78 |      "Log out": ""
 |