| Strings Words Characters | |||
|---|---|---|---|
| 2 152 1,013 |
|
All strings | Browse Translate Zen |
| 1 7 54 |
|
Translated strings | Browse Translate Zen |
| 1 145 959 |
|
Unfinished strings | Browse Translate Zen |
| 1 145 959 |
|
Untranslated strings | Browse Translate Zen |
| 1 145 959 |
|
Strings with suggestions | Browse Translate Zen |
Summary
| Project website | github.com/mimi89999/Authnkey | |
|---|---|---|
| Project maintainers2 |
|
|
| Translation license | MIT No Attribution | |
| Translation process |
|
|
| Source code repository |
https://github.com/mimi89999/Authnkey.git
|
|
| Repository branch | main | |
| Last remote commit |
Use canonical CBOR key order in pubKeyCredParams
e6c7dc6
Lucas authored 02/04/2026 |
|
| Last commit in Weblate |
Merge remote-tracking branch 'origin/main'
56f3c63
toolatebot authored 02/04/2026 |
|
| Weblate repository |
https://toolate.othing.xyz/git/authnkey/app/
|
|
| File mask |
fastlane/metadata/android/*
|
|
| Monolingual base language file |
fastlane/metadata/android/en-US
|
|
| Translation file |
Download
fastlane/metadata/android/es-ES
|
|
| Last change | Feb. 5, 2026, 10:20 p.m. | |
| Last change made by | Anonymous | |
| Language | Spanish | |
| Language code | es | |
| Text direction | Left to right | |
| Case sensitivity | Case-sensitive | |
| Number of speakers | 507,599,381 | |
| Number of plurals | 2 | |
| Plural type | One/other | |
| Plurals | Singular | 1 | Plural | 0, 2, 3, 4, 5, 6, 7, 8, 9, 10, … |
| Plural formula |
n != 1
|
|
02/09/2026
String statistics
| Strings percent | Hosted strings | Words percent | Hosted words | Characters percent | Hosted characters | |
|---|---|---|---|---|---|---|
| Total | 2 | 152 | 1,013 | |||
| Translated | 50% | 1 | 4% | 7 | 5% | 54 |
| Needs editing | 0% | 0 | 0% | 0 | 0% | 0 |
| Read-only | 0% | 0 | 0% | 0 | 0% | 0 |
| Failing checks | 0% | 0 | 0% | 0 | 0% | 0 |
| Strings with suggestions | 50% | 1 | 95% | 145 | 94% | 959 |
| Untranslated strings | 50% | 1 | 95% | 145 | 94% | 959 |
Quick numbers
and previous 30 days
Trends of last 30 days
+100%
Hosted words
—
+100%
Hosted strings
—
+50%
Translated
—
+100%
Contributors
—
|
Suggestion added |
|
|
Changes committed |
Changes committed
01/30/2026
|
|
Translation added |
|
|
Resource updated |
File “
fastlane/metadata/android/es-ES” was added.
01/29/2026
|
|
String added in the repository |
|
|
String added in the repository |
|
|
Language added |
Spanish
01/29/2026
|
| 2 | File in original format as translated in the repository | App store metadata files | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2 | All strings, converted files enriched with comments; suitable for offline translation | Android String Resource | CSV | JSON | JSON nested structure file | gettext PO | iOS strings | TBX | TMX | XLIFF 1.1 with gettext extensions | XLIFF 1.1 | XLSX |
| 1 | Unfinished strings, converted files enriched with comments; suitable for offline translation | Android String Resource | CSV | JSON | JSON nested structure file | gettext PO | iOS strings | TBX | TMX | XLIFF 1.1 with gettext extensions | XLIFF 1.1 | XLSX |
Android's built-in WebAuthn support has a significant gap: it does not support CTAP2 over NFC. This means you cannot use PIN-protected passkeys or discoverable credentials with NFC security keys — you're limited to basic U2F tap-to-authenticate. Authnkey fills this gap by implementing the full CTAP2 protocol.
The app registers as a credential provider, so any app or browser that supports the Android Credential Manager API will offer Authnkey as an option when passkeys are requested.
This also works on devices without Google Play Services, since Authnkey implements the CTAP2 protocol directly rather than relying on Google's FIDO2 API.
Supported features:
- Passkey creation and authentication
- PIN verification
- Discoverable credentials
- Multiple accounts per site
- NFC and USB transports
No root required.
El soporte nativo de WebAuthn en Android tiene una laguna: no cubre CTAP2 mediante NFC. Esto significa que no puede usar claves de acceso protegidas por un PIN o credenciales descubribles con llaves de seguridad NFC — esto le limita a toque-para-autenticar U2F básica.
La aplicación se registra como un proveedor de credenciales, así que cualquier aplicación o navegador que soporte la API Android Credential Manager podrá ofrecer Authnkey como una opción cuando se soliciten claves de acceso.
También funciona en dispositivos sin Google Play Services, ya que Authnkey implementa el protocolo CTAP2 directamente en vez de depender de la API FIDO2 de Google.
Funciones soportadas:
- Creación y autenticación de claves de acceso
- Verificación PIN
- Credenciales descubribles
- Múltiples cuentas para cada sitio
- Transportes NFC y USB
No requiere root.