[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy/po can-you-trust.nl.po
From: |
Tom Uijldert |
Subject: |
www/philosophy/po can-you-trust.nl.po |
Date: |
Wed, 07 Nov 2012 18:38:45 +0000 |
CVSROOT: /webcvs/www
Module name: www
Changes by: Tom Uijldert <tuijldert> 12/11/07 18:38:45
Added files:
philosophy/po : can-you-trust.nl.po
Log message:
Initial GNUN conversion.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.nl.po?cvsroot=www&rev=1.1
Patches:
Index: can-you-trust.nl.po
===================================================================
RCS file: can-you-trust.nl.po
diff -N can-you-trust.nl.po
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ can-you-trust.nl.po 7 Nov 2012 18:38:44 -0000 1.1
@@ -0,0 +1,522 @@
+# Dutch translation of http://www.gnu.org/philosophy/can-you-trust.html
+# Copyright (C) YEAR Free Software Foundation, Inc.
+# This file is distributed under the same license as the original article.
+# FIRST AUTHOR <address@hidden>, YEAR.
+#
+msgid ""
+msgstr ""
+"Project-Id-Version: \n"
+"POT-Creation-Date: \n"
+"PO-Revision-Date: \n"
+"Last-Translator: Tom Uijldert <address@hidden>\n"
+"Language-Team: \n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=iso-8859-1\n"
+"Content-Transfer-Encoding: 8bit\n"
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <title>
+#| msgid ""
+#| "Can You Trust Your Computer? - GNU Project - Free Software Foundation "
+#| "(FSF)"
+msgid "Can You Trust Your Computer? - GNU Project - Free Software Foundation
(FSF)"
+msgstr "Kun je je Computer Vertrouwen? - GNU Project - Free Software
Foundation (FSF)"
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <h2>
+#| msgid "Can You Trust Your Computer?"
+msgid "Can You Trust Your Computer?"
+msgstr "Kun je je Computer Vertrouwen?"
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <p>
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgstr "door <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+
+# | Who should your computer take its orders from? Most people think their
+# | computers should obey them, not obey someone else. With a plan they call
+# | “trusted computing”, large media corporations (including the
+# | movie companies and record companies), together with computer companies
+# | such as Microsoft and Intel, are planning to make your computer obey them
+# | instead of you. (Microsoft's version of this scheme is called
+# | [-“Palladium”.)-] {+Palladium.)+} Proprietary programs have
+# | included malicious features before, but this plan would make it universal.
+#. type: Content of: <p>
+#| msgid ""
+#| "Who should your computer take its orders from? Most people think their "
+#| "computers should obey them, not obey someone else. With a plan they call "
+#| "“trusted computing”, large media corporations (including the "
+#| "movie companies and record companies), together with computer companies "
+#| "such as Microsoft and Intel, are planning to make your computer obey them "
+#| "instead of you. (Microsoft's version of this scheme is called “"
+#| "Palladium”.) Proprietary programs have included malicious features "
+#| "before, but this plan would make it universal."
+msgid "Who should your computer take its orders from? Most people think their
computers should obey them, not obey someone else. With a plan they call
“trusted computing”, large media corporations (including the movie
companies and record companies), together with computer companies such as
Microsoft and Intel, are planning to make your computer obey them instead of
you. (Microsoft's version of this scheme is called Palladium.) Proprietary
programs have included malicious features before, but this plan would make it
universal."
+msgstr "Naar wie zou je computer moeten luisteren? De meeste mensen vinden dat
computers naar hen moeten luisteren en niet naar anderen. Grote mediabedrijven
(ook filmmaatschappijen en muziekuitgevers), samen met computerondernemingen
als Microsoft en Intel, hebben het plan, getiteld “trusted
computing”, opgevat om te zorgen dat jou computer naar hun luistert en
niet meer naar jou. (Bij Microsoft staat dit plan bekend als Palladium).
Private programma's hebben al eerder kwaadwillende functies bevat maar met dit
plan zou het algemeen worden ingevoerd."
+
+# | Proprietary software means, fundamentally, that you don't control what it
+# | does; you can't study the source code, or change it. It's not surprising
+# | that clever businessmen find ways to use their control to put you at a
+# | disadvantage. Microsoft has done this several times: one version of
+# | Windows was designed to report to Microsoft all the software on your hard
+# | disk; a recent “security” upgrade in Windows Media Player
+# | required users to agree to new restrictions. But Microsoft is not alone:
+# | the KaZaa music-sharing software is designed so that KaZaa's business
+# | partner can rent out the use of your computer to [-their-] {+its+}
+# | clients. These malicious features are often secret, but even once you
+# | know about them it is hard to remove them, since you don't have the source
+# | code.
+#. type: Content of: <p>
+#| msgid ""
+#| "Proprietary software means, fundamentally, that you don't control what it "
+#| "does; you can't study the source code, or change it. It's not surprising "
+#| "that clever businessmen find ways to use their control to put you at a "
+#| "disadvantage. Microsoft has done this several times: one version of "
+#| "Windows was designed to report to Microsoft all the software on your hard "
+#| "disk; a recent “security” upgrade in Windows Media Player "
+#| "required users to agree to new restrictions. But Microsoft is not alone: "
+#| "the KaZaa music-sharing software is designed so that KaZaa's business "
+#| "partner can rent out the use of your computer to their clients. These "
+#| "malicious features are often secret, but even once you know about them it "
+#| "is hard to remove them, since you don't have the source code."
+msgid "Proprietary software means, fundamentally, that you don't control what
it does; you can't study the source code, or change it. It's not surprising
that clever businessmen find ways to use their control to put you at a
disadvantage. Microsoft has done this several times: one version of Windows
was designed to report to Microsoft all the software on your hard disk; a
recent “security” upgrade in Windows Media Player required users to
agree to new restrictions. But Microsoft is not alone: the KaZaa music-sharing
software is designed so that KaZaa's business partner can rent out the use of
your computer to its clients. These malicious features are often secret, but
even once you know about them it is hard to remove them, since you don't have
the source code."
+msgstr "Een privaat programma houdt vooral in dat je geen controle hebt over
wat het doet: je kunt de broncode niet bekijken, noch veranderen. Het hoeft je
niet te verbazen dat geslepen zakenmensen die controle zullen gebruiken om jou
in een nadelige positie te manoeuvreren. Microsoft heeft dit meerdere malen
gedaan: een bepaalde versie van Windows was zo ontworpen dat het terug
rapporteerde aan Microsoft welke software je allemaal op je schijf had staan;
een recente “ beveiligings”-update in Windows Media Player vereiste
dat de gebruiker akkoord ging met nieuwe beperkende maatregelen. Maar niet
alleen Microsoft doet dit: KaZaa, het programma om muziek te delen, is dusdanig
ontworpen dat KaZaa de computercapaciteit van zijn gebruikers kan verhuren aan
zakelijke klanten. Dit soort kwaadwillende functies zijn vaak geheim maar zelfs
al weet je er van, dan nog zijn ze moeilijk te verwijderen omdat je de broncode
niet hebt."
+
+# | In the past, these were isolated incidents. “Trusted
+# | computing” would make [-it-] {+the practice+} pervasive.
+# | “Treacherous computing” is a more appropriate name, because
+# | the plan is designed to make sure your computer will systematically
+# | disobey you. In fact, it is designed to stop your computer from
+# | functioning as a general-purpose computer. Every operation may require
+# | explicit permission.
+#. type: Content of: <p>
+#| msgid ""
+#| "In the past, these were isolated incidents. “Trusted "
+#| "computing” would make it pervasive. “Treacherous "
+#| "computing” is a more appropriate name, because the plan is designed "
+#| "to make sure your computer will systematically disobey you. In fact, it "
+#| "is designed to stop your computer from functioning as a general-purpose "
+#| "computer. Every operation may require explicit permission."
+msgid "In the past, these were isolated incidents. “Trusted
computing” would make the practice pervasive. “Treacherous
computing” is a more appropriate name, because the plan is designed to
make sure your computer will systematically disobey you. In fact, it is
designed to stop your computer from functioning as a general-purpose computer.
Every operation may require explicit permission."
+msgstr "Dit kwam sporadisch voor in het verleden. Met “Trusted
computing” zou het gemeengoed worden. “Treacherous computing”
is hier meer op zijn plaats omdat dit plan er voor zorgt dat je systeem
systematisch <em>niet</em> naar je zal luisteren. Het is feitelijk ontworpen om
ervoor te zorgen dat je computer geen algemeen bruikbaar apparaat meer is.
Iedere functie die je uit wilt voeren zou expliciete toestemming nodig kunnen
hebben."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <p>
+#| msgid ""
+#| "The technical idea underlying treacherous computing is that the computer "
+#| "includes a digital encryption and signature device, and the keys are kept "
+#| "secret from you. Proprietary programs will use this device to control "
+#| "which other programs you can run, which documents or data you can access, "
+#| "and what programs you can pass them to. These programs will continually "
+#| "download new authorization rules through the Internet, and impose those "
+#| "rules automatically on your work. If you don't allow your computer to "
+#| "obtain the new rules periodically from the Internet, some capabilities "
+#| "will automatically cease to function."
+msgid "The technical idea underlying treacherous computing is that the
computer includes a digital encryption and signature device, and the keys are
kept secret from you. Proprietary programs will use this device to control
which other programs you can run, which documents or data you can access, and
what programs you can pass them to. These programs will continually download
new authorization rules through the Internet, and impose those rules
automatically on your work. If you don't allow your computer to obtain the new
rules periodically from the Internet, some capabilities will automatically
cease to function."
+msgstr "Technisch betekent het dat je computer wordt uitgevoerd met een
digitaal apparaatje wat kan versleutelen en handtekeningen herkennen, waarbij
de sleutels voor jou geheim blijven. Private programma's zullen dit apparaatje
gebruiken om te bepalen welke programma's je mag draaien, welke brieven en
andere gegevens je mag benaderen en aan welke programma's je die door mag
geven. Deze programma's zullen continu nieuwe autorisatieregels van het
Internet inladen en deze automatisch toepassen op jouw werk. Wanneer je die
programma's een tijdje blokkeert van het Internet zullen bepaalde functies
automatisch worden uitgeschakeld."
+
+# | Of course, Hollywood and the record companies plan to use treacherous
+# | computing for [-“DRM” (Digital-] {+Digital+} Restrictions
+# | [-Management),-] {+Management (DRM),+} so that downloaded videos and music
+# | can be played only on one specified computer. Sharing will be entirely
+# | impossible, at least using the authorized files that you would get from
+# | those companies. You, the public, ought to have both the freedom and the
+# | ability to share these things. (I expect that someone will find a way to
+# | produce unencrypted versions, and to upload and share them, so DRM will
+# | not entirely succeed, but that is no excuse for the system.)
+#. type: Content of: <p>
+#| msgid ""
+#| "Of course, Hollywood and the record companies plan to use treacherous "
+#| "computing for “DRM” (Digital Restrictions Management), so "
+#| "that downloaded videos and music can be played only on one specified "
+#| "computer. Sharing will be entirely impossible, at least using the "
+#| "authorized files that you would get from those companies. You, the "
+#| "public, ought to have both the freedom and the ability to share these "
+#| "things. (I expect that someone will find a way to produce unencrypted "
+#| "versions, and to upload and share them, so DRM will not entirely succeed, "
+#| "but that is no excuse for the system.)"
+msgid "Of course, Hollywood and the record companies plan to use treacherous
computing for Digital Restrictions Management (DRM), so that downloaded videos
and music can be played only on one specified computer. Sharing will be
entirely impossible, at least using the authorized files that you would get
from those companies. You, the public, ought to have both the freedom and the
ability to share these things. (I expect that someone will find a way to
produce unencrypted versions, and to upload and share them, so DRM will not
entirely succeed, but that is no excuse for the system.)"
+msgstr "Uiteraard zullen Hollywood en de muziekindustrie dit gaan gebruiken
voor Digital Restrictions Management (DRM - digitaal toegangsbeheer) zodat
verstuurde video's en muziek maar op één bepaalde computer af
kunnen worden gespeeld. Delen met anderen zal volledig onmogelijk worden
gemaakt met de bestanden die je van die bedrijven betrekt. Jij, het publiek,
zou de vrijheid en mogelijkheid moeten hebben om dit te delen met anderen. (Ik
verwacht dat individuen ongetwijfeld een manier zullen vinden om dit te kraken
om zo onbeveiligde versies te kunnen delen, waar DRM dus niet zal werken, maar
dat is nog geen rechtvaardiging voor het systeem)."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <p>
+#| msgid ""
+#| "Making sharing impossible is bad enough, but it gets worse. There are "
+#| "plans to use the same facility for email and documents—resulting in "
+#| "email that disappears in two weeks, or documents that can only be read on "
+#| "the computers in one company."
+msgid "Making sharing impossible is bad enough, but it gets worse. There are
plans to use the same facility for email and documents—resulting in email
that disappears in two weeks, or documents that can only be read on the
computers in one company."
+msgstr "Het onmogelijk maken dingen te delen is al erg genoeg maar het wordt
nog erger. Men wil ook email en documenten hieraan onderwerpen—met als
resultaat emails die na twee weken verdwijnen, of documenten die alleen kunnen
worden gelezen door computers in één bedrijf."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <p>
+#| msgid ""
+#| "Imagine if you get an email from your boss telling you to do something "
+#| "that you think is risky; a month later, when it backfires, you can't use "
+#| "the email to show that the decision was not yours. “Getting it in "
+#| "writing” doesn't protect you when the order is written in "
+#| "disappearing ink."
+msgid "Imagine if you get an email from your boss telling you to do something
that you think is risky; a month later, when it backfires, you can't use the
email to show that the decision was not yours. “Getting it in
writing” doesn't protect you when the order is written in disappearing
ink."
+msgstr "Stel je voor dat je een email krijgt van je baas die je vraagt iets
-wellicht- riskants te doen; een maand later, als alles uitkomt, sta je met
lege handen omdat de email die bewijst dat het een beslissing van je baas was,
is verdwenen. Iets “zwart op wit” krijgen is weinig waard wanneer
het <em>verdwijninkt</em> is."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <p>
+#| msgid ""
+#| "Imagine if you get an email from your boss stating a policy that is "
+#| "illegal or morally outrageous, such as to shred your company's audit "
+#| "documents, or to allow a dangerous threat to your country to move forward "
+#| "unchecked. Today you can send this to a reporter and expose the "
+#| "activity. With treacherous computing, the reporter won't be able to read "
+#| "the document; her computer will refuse to obey her. Treacherous "
+#| "computing becomes a paradise for corruption."
+msgid "Imagine if you get an email from your boss stating a policy that is
illegal or morally outrageous, such as to shred your company's audit documents,
or to allow a dangerous threat to your country to move forward unchecked.
Today you can send this to a reporter and expose the activity. With
treacherous computing, the reporter won't be able to read the document; her
computer will refuse to obey her. Treacherous computing becomes a paradise for
corruption."
+msgstr "Stel dat je een email krijgt van je baas waarin beleid wordt
voorgeschreven wat illegaal is of moreel verwerpelijk, bijvoorbeeld het
vernietigen van boekhoudkundige gegevens of een oogje toeknijpen bij zaken die
een bedreiging voor je land vormen. In de huidige situatie kun je dergelijk
gedrag aan de kaak stellen door de gegevens door te sturen naar een journalist
en de zaak aan de grote klok te hangen. Met “treacherous computing”
zou de journalist niet in staat zijn de gegevens te lezen; de computer zal niet
gehoorzamen aan de opdrachten van de journalist. “Treacherous
computing” wordt een paradijs voor corruptie."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <p>
+#| msgid ""
+#| "Word processors such as Microsoft Word could use treacherous computing "
+#| "when they save your documents, to make sure no competing word processors "
+#| "can read them. Today we must figure out the secrets of Word format by "
+#| "laborious experiments in order to make free word processors read Word "
+#| "documents. If Word encrypts documents using treacherous computing when "
+#| "saving them, the free software community won't have a chance of "
+#| "developing software to read them—and if we could, such programs "
+#| "might even be forbidden by the Digital Millennium Copyright Act."
+msgid "Word processors such as Microsoft Word could use treacherous computing
when they save your documents, to make sure no competing word processors can
read them. Today we must figure out the secrets of Word format by laborious
experiments in order to make free word processors read Word documents. If Word
encrypts documents using treacherous computing when saving them, the free
software community won't have a chance of developing software to read
them—and if we could, such programs might even be forbidden by the
Digital Millennium Copyright Act."
+msgstr "Tekstverwerkers als Microsoft Word zouden “treacherous
computing” kunnen gebruiken bij het opslaan van documenten, om zich ervan
te verzekeren dat een concurrerende tekstverwerker ze niet kan lezen. Op dit
moment moeten we het formaat van deze documenten achterhalen via geduldig
zoekwerk om ze te kunnen lezen in vrije tekstverwerkers. Wanneer Word voortaan
via “treacherous computing” alles opslaat zal de vrije software
gemeenschap helemaal geen kans meer hebben deze documenten via vrije
tekstverwerkers in te lezen—en zelfs wanneer we dit wel zouden kunnen zou
het verboden worden door de “Digital Millennium Copyright Act”."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <p>
+#| msgid ""
+#| "Programs that use treacherous computing will continually download new "
+#| "authorization rules through the Internet, and impose those rules "
+#| "automatically on your work. If Microsoft, or the US government, does not "
+#| "like what you said in a document you wrote, they could post new "
+#| "instructions telling all computers to refuse to let anyone read that "
+#| "document. Each computer would obey when it downloads the new "
+#| "instructions. Your writing would be subject to 1984-style retroactive "
+#| "erasure. You might be unable to read it yourself."
+msgid "Programs that use treacherous computing will continually download new
authorization rules through the Internet, and impose those rules automatically
on your work. If Microsoft, or the US government, does not like what you said
in a document you wrote, they could post new instructions telling all computers
to refuse to let anyone read that document. Each computer would obey when it
downloads the new instructions. Your writing would be subject to 1984-style
retroactive erasure. You might be unable to read it yourself."
+msgstr "Programma;s die gebruikmaken van “treacherous computing”
zullen voortdurend nieuwe regels inladen via Internet en deze automatisch
toepassen op je werk. Wanneer het Microsoft, of de regering, niet aanstaat wat
je schrijft in een document, kunnen ze nieuwe regels uitvaardigen die computers
instrueren dit document niet te openen. Iedere computer die deze nieuwe
instructies inlaadt zou hieraan gehoorzamen. En aldus zou je document, op
Orwelliaanse manier met terugwerkende kracht verdwijnen. Je zou het zelfs zelf
niet meer kunnen lezen."
+
+# | You might think you can find out what nasty things a treacherous[-
+# | -]{+-+}computing application does, study how painful they are, and decide
+# | whether to accept them. [-It-] {+Even if you can find this out, it+}
+# | would be [-short-sighted and-] foolish to [-accept, but-] {+accept+} the
+# | [-point is that-] {+deal, but you can't even expect+} the deal [-you think
+# | you are making won't-] {+to+} stand still. Once you come to depend on
+# | using the program, you are hooked and they know it; then they can change
+# | the deal. Some applications will automatically download upgrades that
+# | will do something different—and they won't give you a choice about
+# | whether to upgrade.
+#. type: Content of: <p>
+#| msgid ""
+#| "You might think you can find out what nasty things a treacherous "
+#| "computing application does, study how painful they are, and decide "
+#| "whether to accept them. It would be short-sighted and foolish to accept, "
+#| "but the point is that the deal you think you are making won't stand "
+#| "still. Once you come to depend on using the program, you are hooked and "
+#| "they know it; then they can change the deal. Some applications will "
+#| "automatically download upgrades that will do something different—"
+#| "and they won't give you a choice about whether to upgrade."
+msgid "You might think you can find out what nasty things a
treacherous-computing application does, study how painful they are, and decide
whether to accept them. Even if you can find this out, it would be foolish to
accept the deal, but you can't even expect the deal to stand still. Once you
come to depend on using the program, you are hooked and they know it; then they
can change the deal. Some applications will automatically download upgrades
that will do something different—and they won't give you a choice about
whether to upgrade."
+msgstr "Wellicht denk je dat je erachter kunt komen wat een toepassing met
“treacherous computing” doet, onderzoeken hoe schadelijk dit is en
vervolgens een beslissing nemen of je de gevolgen acceptabel vindt of niet. Het
zou dom en kortzichtig zijn ze te accepteren omdat wat jij denkt te accepteren
in deze transactie zal veranderen. Op een gegeven moment zul je afhankelijk
worden van die toepassing in je werk en dat weten ze; dan veranderen ze de
spelregels. Sommige toepassingen zullen automatisch updates inladen die iets
anders doen—en je zult hierbij geen keuze hebben."
+
+# | Today you can avoid being restricted by proprietary software by not using
+# | it. If you run GNU/Linux or another free operating system, and if you
+# | avoid installing proprietary applications on it, then you are in charge of
+# | what your computer does. If a free program has a malicious feature, other
+# | developers in the community will take it out, and you can use the
+# | corrected version. You can also run free application programs and tools
+# | on non[---]free operating systems; this falls short of fully giving you
+# | freedom, but many users do it.
+#. type: Content of: <p>
+#| msgid ""
+#| "Today you can avoid being restricted by proprietary software by not using "
+#| "it. If you run GNU/Linux or another free operating system, and if you "
+#| "avoid installing proprietary applications on it, then you are in charge "
+#| "of what your computer does. If a free program has a malicious feature, "
+#| "other developers in the community will take it out, and you can use the "
+#| "corrected version. You can also run free application programs and tools "
+#| "on non-free operating systems; this falls short of fully giving you "
+#| "freedom, but many users do it."
+msgid "Today you can avoid being restricted by proprietary software by not
using it. If you run GNU/Linux or another free operating system, and if you
avoid installing proprietary applications on it, then you are in charge of what
your computer does. If a free program has a malicious feature, other
developers in the community will take it out, and you can use the corrected
version. You can also run free application programs and tools on nonfree
operating systems; this falls short of fully giving you freedom, but many users
do it."
+msgstr "Op dit moment kun je de beperkingen van private software omzeilen door
deze niet te gebruiken. Wanneer je GNU/Linux gebruikt, of een ander vrij
besturingssysteem en het vermijdt om daarop private toepassingen te installeren
dan heb je volledige zeggenschap over je systeem. Wanneer je vrije programma
een kwaadwillende functie bevat zullen andere ontwikkelaars in de gemeenschap
deze eruit halen en kun je de gewijzigde versie gebruiken. Je kunt ook vrije
toepassingen draaien op private besturingssystemen; dit geeft je niet je
volledige vrijheid terug maar veel gebruikers doen dit."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <p>
+#| msgid ""
+#| "Treacherous computing puts the existence of free operating systems and "
+#| "free applications at risk, because you may not be able to run them at "
+#| "all. Some versions of treacherous computing would require the operating "
+#| "system to be specifically authorized by a particular company. Free "
+#| "operating systems could not be installed. Some versions of treacherous "
+#| "computing would require every program to be specifically authorized by "
+#| "the operating system developer. You could not run free applications on "
+#| "such a system. If you did figure out how, and told someone, that could "
+#| "be a crime."
+msgid "Treacherous computing puts the existence of free operating systems and
free applications at risk, because you may not be able to run them at all.
Some versions of treacherous computing would require the operating system to be
specifically authorized by a particular company. Free operating systems could
not be installed. Some versions of treacherous computing would require every
program to be specifically authorized by the operating system developer. You
could not run free applications on such a system. If you did figure out how,
and told someone, that could be a crime."
+msgstr "“Treacherous computing” vormt een gevaar voor vrije
programma's en besturingssystemen omdat je ze wellicht niet eens kunt draaien.
Sommige versies van “treacherous computing” zouden vereisen dat een
besturingssysteem alleen op apparatuur kan draaien wanneer daarvoor toestemming
is verkregen van een bepaald bedrijf. Vrije besturingssystemen zouden daar niet
op kunnen worden geïnstalleerd. Sommige versies van “treacherous
computing” zouden vereisen dat er alleen toepassingen op het
besturingssysteem kunnen draaien die de toestemming hebben van de ontwikkelaar
van het besturingssysteem. Je zou daar geen vrije toepassingen op kunnen
draaien. En als je toch een manier vindt om dat te doen, en je dit anderen
verteld, zou dat een misdaad zijn."
+
+# | There are proposals already for US laws that would require all computers
+# | to support treacherous computing, and to prohibit connecting old computers
+# | to the Internet. The CBDTPA (we call it the Consume But Don't Try
+# | Programming Act) is one of them. But even if they don't legally force you
+# | to switch to treacherous computing, the pressure to accept it may be
+# | enormous. Today people often use Word format for communication, although
+# | this causes several sorts of problems (see <a
+# | href=\"/philosophy/no-word-attachments.html\">“We Can Put an End to
+# | Word Attachments”</a>). If only a treacherous[- -]{+-+}computing
+# | machine can read the latest Word documents, many people will switch to it,
+# | if they view the situation only in terms of individual action (take it or
+# | leave it). To oppose treacherous computing, we must join together and
+# | confront the situation as a collective choice.
+#. type: Content of: <p>
+#| msgid ""
+#| "There are proposals already for US laws that would require all computers "
+#| "to support treacherous computing, and to prohibit connecting old "
+#| "computers to the Internet. The CBDTPA (we call it the Consume But Don't "
+#| "Try Programming Act) is one of them. But even if they don't legally "
+#| "force you to switch to treacherous computing, the pressure to accept it "
+#| "may be enormous. Today people often use Word format for communication, "
+#| "although this causes several sorts of problems (see <a href=\"/philosophy/"
+#| "no-word-attachments.html\">“We Can Put an End to Word "
+#| "Attachments”</a>). If only a treacherous computing machine can "
+#| "read the latest Word documents, many people will switch to it, if they "
+#| "view the situation only in terms of individual action (take it or leave "
+#| "it). To oppose treacherous computing, we must join together and confront "
+#| "the situation as a collective choice."
+msgid "There are proposals already for US laws that would require all
computers to support treacherous computing, and to prohibit connecting old
computers to the Internet. The CBDTPA (we call it the Consume But Don't Try
Programming Act) is one of them. But even if they don't legally force you to
switch to treacherous computing, the pressure to accept it may be enormous.
Today people often use Word format for communication, although this causes
several sorts of problems (see <a
href=\"/philosophy/no-word-attachments.html\">“We Can Put an End to Word
Attachments”</a>). If only a treacherous-computing machine can read the
latest Word documents, many people will switch to it, if they view the
situation only in terms of individual action (take it or leave it). To oppose
treacherous computing, we must join together and confront the situation as a
collective choice."
+msgstr "Er zijn al Amerikaanse wetsvoorstellen die vereisen dat alle computers
“treacherous computing” ondersteunen en het verbieden oude
computers op het Internet aan te sluiten. De CBDTPA (wij noemen dit de
“Consume But Don't Try Programming Act”) is daar één
van. Maar ook al zullen ze je niet dwingen om over te schakelen op
“treacherous computing”, dan nog zal de druk enorm zijn.
Tegenwoordig gebruiken veel mensen het Word formaat voor hun communicatie ook
al brengt dit allerlei problemen met zich mee (zie <a
href=\"/philosophy/no-word-attachments.nl.html\">“We kunnen een einde
maken aan Word bijlagen”</a>). Als alleen een computer, uitgerust met
“treacherous computing” nog Word documenten kan lezen zullen velen
dit accepteren voor hun individuele behoeften (slikken of stikken). Om echte
weerstand te geven aan “treacherous computing” zullen we ons met
zijn allen sterk moeten maken en het probleem moeten benaderen als een
gemeenschappelijke keuze."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <p>
+#| msgid ""
+#| "For further information about treacherous computing, see <a href=\"http://"
+#| "www.cl.cam.ac.uk/users/rja14/tcpa-faq.html\">http://www.cl.cam.ac.uk/"
+#| "users/rja14/tcpa-faq.html</a>."
+msgid "For further information about treacherous computing, see <a
href=\"http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html\">http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html</a>."
+msgstr "Voor meer informatie over “treacherous computing”, zie <a
href=\"http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html\">http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html</a>."
+
+#. type: Content of: <p>
+msgid "To block treacherous computing will require large numbers of citizens
to organize. We need your help! Please support <a
href=\"http://DefectiveByDesign.org\">Defective by Design</a>, the FSF's
campaign against Digital Restrictions Management."
+msgstr "We hebben veel mensen in georganiseerd verband nodig om de
verspreiding van verraderlijke software tegen te gaan. We hebben je steun
nodig! Steun de FSF campagne <a href=\"http://DefectiveByDesign.org\">Defective
by Design</a>, tegen Digital Restrictions Management."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <h3>
+#| msgid "Postscripts"
+msgid "Postscripts"
+msgstr "Naschrift"
+
+#. type: Content of: <ol><li>
+msgid "The computer security field uses the term “trusted
computing” in a different way—beware of confusion between the two
meanings."
+msgstr "Beveiligingsexperts gebruiken de term “trusted computing”
voor iets anders—verwar beide betekenissen niet."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <ol><li>
+#| msgid ""
+#| "The GNU Project distributes the GNU Privacy Guard, a program that "
+#| "implements public-key encryption and digital signatures, which you can "
+#| "use to send secure and private email. It is useful to explore how GPG "
+#| "differs from treacherous computing, and see what makes one helpful and "
+#| "the other so dangerous."
+msgid "The GNU Project distributes the GNU Privacy Guard, a program that
implements public-key encryption and digital signatures, which you can use to
send secure and private email. It is useful to explore how GPG differs from
treacherous computing, and see what makes one helpful and the other so
dangerous."
+msgstr "Het GNU project distribueert het programma GNU Privacy Guard. Een
programma dat kan versleutelen met publieke sleutels en digitale handtekeningen
ondersteund, zodat je beveiligde en privé email kunt versturen. Het is
nuttig om te zien hoe dit programma verschilt van “treacherous
computing” en wat het één nuttig maakt en het ander
gevaarlijk."
+
+# | When someone uses GPG to send you an encrypted document, and you use GPG
+# | to decode it, the result is an unencrypted document that you can read,
+# | forward, copy, and even re[---]encrypt to send it securely to someone
+# | else. A treacherous[- -]{+-+}computing application would let you read the
+# | words on the screen, but would not let you produce an unencrypted document
+# | that you could use in other ways. GPG, a free software package, makes
+# | security features available to the users; [-they-] {+<em>they</em>+} use
+# | [-it.-] {+<em>it</em>.+} Treacherous computing is designed to impose
+# | restrictions on the users; [-it-] {+<em>it</em>+} uses [-them.-]
+# | {+<em>them</em>.+}
+#. type: Content of: <ol><li><p>
+#| msgid ""
+#| "When someone uses GPG to send you an encrypted document, and you use GPG "
+#| "to decode it, the result is an unencrypted document that you can read, "
+#| "forward, copy, and even re-encrypt to send it securely to someone else. "
+#| "A treacherous computing application would let you read the words on the "
+#| "screen, but would not let you produce an unencrypted document that you "
+#| "could use in other ways. GPG, a free software package, makes security "
+#| "features available to the users; they use it. Treacherous computing is "
+#| "designed to impose restrictions on the users; it uses them."
+msgid "When someone uses GPG to send you an encrypted document, and you use
GPG to decode it, the result is an unencrypted document that you can read,
forward, copy, and even reencrypt to send it securely to someone else. A
treacherous-computing application would let you read the words on the screen,
but would not let you produce an unencrypted document that you could use in
other ways. GPG, a free software package, makes security features available to
the users; <em>they</em> use <em>it</em>. Treacherous computing is designed to
impose restrictions on the users; <em>it</em> uses <em>them</em>."
+msgstr "Wanneer iemand GPG gebruikt om je een versleuteld dokument te sturen
en jij dit op je beurt gebruikt om het weer te decoderen dan heb je weer het
originele document wat je kunt lezen, doorsturen, kopiëren of wederom
versleutelen om het veilig naar iemand anders te versturen. Een
“treacherous computing ” toepassing zou het je op je scherm laten
lezen maar je niet toestaan het als gedecodeerd document op andere wijze te
gebruiken. GPG, een vrij programma, stelt beveiligingsfuncties ter beschikking
aan de gebruiker; ze gebruiken het. “Treacherous computing” is
ontworpen om gebruikers in hun vrijheid te beperken, <em>het gebruikt de
gebruikers</em>."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <ol><li>
+#| msgid ""
+#| "The supporters of treacherous computing focus their discourse on its <a "
+#| "name=\"beneficial\">beneficial uses</a>. What they say is often correct, "
+#| "just not important."
+msgid "The supporters of treacherous computing focus their discourse on its <a
name=\"beneficial\">beneficial uses</a>. What they say is often correct, just
not important."
+msgstr "Voorstanders van “treacherous computing” wijzen vaak op de
<a name=\"beneficial\">nuttige toepassingen</a>. Wat ze daarbij opnoemen is
vaak wel juist maar niet belangrijk."
+
+# | Like most hardware, treacherous[- -]{+-+}computing hardware can be used
+# | for purposes which are not harmful. But these [-uses-] {+features+} can
+# | be implemented in other ways, without treacherous[- -]{+-+}computing
+# | hardware. The principal difference that treacherous computing makes for
+# | users is the nasty consequence: rigging your computer to work against you.
+#. type: Content of: <ol><li><p>
+#| msgid ""
+#| "Like most hardware, treacherous computing hardware can be used for "
+#| "purposes which are not harmful. But these uses can be implemented in "
+#| "other ways, without treacherous computing hardware. The principal "
+#| "difference that treacherous computing makes for users is the nasty "
+#| "consequence: rigging your computer to work against you."
+msgid "Like most hardware, treacherous-computing hardware can be used for
purposes which are not harmful. But these features can be implemented in other
ways, without treacherous-computing hardware. The principal difference that
treacherous computing makes for users is the nasty consequence: rigging your
computer to work against you."
+msgstr "Net als alle hardware kan ook hardware met “treacherous
computing” erin gebruikt worden voor onschuldige doeleinden. Maar deze
toepassingen kunnen ook met andere middelen, zonder deze hardware. Het
belangrijkste verschil zit hem in de nare gevolgen: je computer zodanig
optuigen dat hij tegen je gebruikt kan worden."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <ol><li><p>
+#| msgid ""
+#| "What they say is true, and what I say is true. Put them together and "
+#| "what do you get? Treacherous computing is a plan to take away our "
+#| "freedom, while offering minor benefits to distract us from what we would "
+#| "lose."
+msgid "What they say is true, and what I say is true. Put them together and
what do you get? Treacherous computing is a plan to take away our freedom,
while offering minor benefits to distract us from what we would lose."
+msgstr "Wat zij zeggen is waar en wat ik zeg is waar. Combineer dat en wat
krijg je dan? “Treacherous computing” is een plan om ons onze
vrijheid te ontnemen overgoten met een sausje van wat nuttige toepassingen om
ons af te leiden van wat we zullen verliezen."
+
+# | Microsoft presents [-p-]{+P+}alladium as a security measure, and claims
+# | that it will protect against viruses, but this claim is evidently false.
+# | A presentation by Microsoft Research in October 2002 stated that one of
+# | the specifications of [-p-]{+P+}alladium is that existing operating
+# | systems and applications will continue to run; therefore, viruses will
+# | continue to be able to do all the things that they can do today.
+#. type: Content of: <ol><li>
+#| msgid ""
+#| "Microsoft presents palladium as a security measure, and claims that it "
+#| "will protect against viruses, but this claim is evidently false. A "
+#| "presentation by Microsoft Research in October 2002 stated that one of the "
+#| "specifications of palladium is that existing operating systems and "
+#| "applications will continue to run; therefore, viruses will continue to be "
+#| "able to do all the things that they can do today."
+msgid "Microsoft presents Palladium as a security measure, and claims that it
will protect against viruses, but this claim is evidently false. A
presentation by Microsoft Research in October 2002 stated that one of the
specifications of Palladium is that existing operating systems and applications
will continue to run; therefore, viruses will continue to be able to do all the
things that they can do today."
+msgstr "Microsoft stelt Palladium voor als een beveiligingsmaatregel en
beweerd dat het zal beschermen tegen computervirussen maar dit is niet waar.
Een presentatie van Microsoft Research in oktober 2002 stelde dat een onderdeel
van de Palladium-specificaties is dat bestaande besturingssystemen en
toepassingen kunnen blijven draaien; en dus dat ook de virussen kunnen blijven
doen wat ze nu al doen."
+
+# | When Microsoft [-speaks-] {+employees speak+} of “security” in
+# | connection with [-p-]{+P+}alladium, they do not mean what we normally mean
+# | by that word: protecting your machine from things you do not want. They
+# | mean protecting your copies of data on your machine from access by you in
+# | ways others do not want. A slide in the presentation listed several types
+# | of secrets [-p-]{+P+}alladium could be used to keep, including
+# | “third party secrets” and “user secrets”—but
+# | it put “user secrets” in quotation marks, recognizing that
+# | this {+is+} somewhat of an absurdity in the context of [-p-]{+P+}alladium.
+#. type: Content of: <ol><li><p>
+#| msgid ""
+#| "When Microsoft speaks of “security” in connection with "
+#| "palladium, they do not mean what we normally mean by that word: "
+#| "protecting your machine from things you do not want. They mean "
+#| "protecting your copies of data on your machine from access by you in ways "
+#| "others do not want. A slide in the presentation listed several types of "
+#| "secrets palladium could be used to keep, including “third party "
+#| "secrets” and “user secrets”—but it put “"
+#| "user secrets” in quotation marks, recognizing that this somewhat of "
+#| "an absurdity in the context of palladium."
+msgid "When Microsoft employees speak of “security” in connection
with Palladium, they do not mean what we normally mean by that word: protecting
your machine from things you do not want. They mean protecting your copies of
data on your machine from access by you in ways others do not want. A slide in
the presentation listed several types of secrets Palladium could be used to
keep, including “third party secrets” and “user
secrets”—but it put “user secrets” in quotation marks,
recognizing that this is somewhat of an absurdity in the context of Palladium."
+msgstr "Wanneer werknemers van Microsoft het hebben over
“beveiliging” in verband met Palladium dan hebben ze het niet over
het beveiligen van je machine zodat wordt voorkomen dat die iets doet wat je
niet wilt. Ze hebben het dan over het beveiligen van kopieën van data op
jouw machine waarvan ze niet willen dat jij die op een andere manier benaderd.
Eén slide van die presentatie bevatte een lijst van geheimen die
Palladium zou kunnen bewaren, met daarin “geheimen van derden” maar
ook “gebruikersgeheimen” maar dan tussen aanhalingstekens, hiermee
aangevend dat dit een absurde gedachte was in de context van Palladium."
+
+# | The presentation made frequent use of other terms that we frequently
+# | associate with the context of security, such as “attack”,
+# | “malicious code”, “spoofing”, as well as
+# | “trusted”. None of them means what it normally means.
+# | “Attack” doesn't mean someone trying to hurt you, it means you
+# | trying to copy music. “Malicious code” means code installed
+# | by you to do what someone else doesn't want your machine to do.
+# | “Spoofing” doesn't mean [-someone-] {+someone's+} fooling you,
+# | it means you{+r+} fooling [-p-]{+P+}alladium. And so on.
+#. type: Content of: <ol><li><p>
+#| msgid ""
+#| "The presentation made frequent use of other terms that we frequently "
+#| "associate with the context of security, such as “attack”, "
+#| "“malicious code”, “spoofing”, as well as “"
+#| "trusted”. None of them means what it normally means. “"
+#| "Attack” doesn't mean someone trying to hurt you, it means you "
+#| "trying to copy music. “Malicious code” means code installed "
+#| "by you to do what someone else doesn't want your machine to do. “"
+#| "Spoofing” doesn't mean someone fooling you, it means you fooling "
+#| "palladium. And so on."
+msgid "The presentation made frequent use of other terms that we frequently
associate with the context of security, such as “attack”,
“malicious code”, “spoofing”, as well as
“trusted”. None of them means what it normally means.
“Attack” doesn't mean someone trying to hurt you, it means you
trying to copy music. “Malicious code” means code installed by you
to do what someone else doesn't want your machine to do.
“Spoofing” doesn't mean someone's fooling you, it means your
fooling Palladium. And so on."
+msgstr "De hele presentatie was doorspekt met beveiligings-termen die hier
iets anders betekenden dat het algemeen geaccepteerde. Woorden als
“aanval”, niet bedoeld als iemand die je probeert pijn te doen maar
iemand die probeert muziek te kopiëren. “Kwaadaardige code” is
hier code die jij installeert om iets te doen wat anderen niet willen dat je
doet. “Spoofing ” (bedriegen, je voordoen als een andere computer)
betekent hier niet je als iemand anders voordoen maar dat jij Palladium
bedriegt. Enzovoorts."
+
+# | A previous statement by the [-p-]{+P+}alladium developers stated the basic
+# | premise that whoever developed or collected information should have total
+# | control of how you use it. This would represent a revolutionary overturn
+# | of past ideas of ethics and of the legal system, and create an
+# | unprecedented system of control. The specific problems of these systems
+# | are no accident; they result from the basic goal. It is the goal we must
+# | reject.
+#. type: Content of: <ol><li>
+#| msgid ""
+#| "A previous statement by the palladium developers stated the basic premise "
+#| "that whoever developed or collected information should have total control "
+#| "of how you use it. This would represent a revolutionary overturn of past "
+#| "ideas of ethics and of the legal system, and create an unprecedented "
+#| "system of control. The specific problems of these systems are no "
+#| "accident; they result from the basic goal. It is the goal we must reject."
+msgid "A previous statement by the Palladium developers stated the basic
premise that whoever developed or collected information should have total
control of how you use it. This would represent a revolutionary overturn of
past ideas of ethics and of the legal system, and create an unprecedented
system of control. The specific problems of these systems are no accident;
they result from the basic goal. It is the goal we must reject."
+msgstr "Een eerdere uitspraak van de ontwikkelaars van Palladium
veronderstelde dat degene die informatie ontwikkeld of vergaart daar totale
zeggenschap over hoort te hebben. Dit zou een revolutionaire omkering zijn van
de huidig gangbare ethiek en het rechtssysteem en zou een ongeëvenaard
systeem van toezicht creëren. De specifieke problemen met dit soort
systemen zijn geen toeval; ze zijn het resultaat van een fout uitgangspunt. We
moeten het uitgangspunt verwerpen."
+
+# | This essay is published in <a [-href=\"/doc/book13.html\"><cite>Free-]
+# |
{+href=\"http://shop.fsf.org/product/free-software-free-society/\"><cite>Free+}
+# | Software, Free Society: The Selected Essays of Richard M.
+# | Stallman</cite></a>
+#. type: Content of: <h4>
+#| msgid ""
+#| "This essay is published in <a href=\"/doc/book13.html\"><cite>Free "
+#| "Software, Free Society: The Selected Essays of Richard M. Stallman</"
+#| "cite></a>"
+msgid "This essay is published in <a
href=\"http://shop.fsf.org/product/free-software-free-society/\"><cite>Free
Software, Free Society: The Selected Essays of Richard M. Stallman</cite></a>"
+msgstr "Dit artikel is gepubliceerd in <a
href=\"http://shop.fsf.org/product/free-software-free-society/\"><cite>Free
Software, Free Society: The Selected Essays of Richard M. Stallman</cite></a>"
+
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
+#. type: Content of: <div>
+msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
+msgstr "*GNUN-SLOT: TRANSLATOR'S NOTES*"
+
+# type: Content of: <div><p>
+#. type: Content of: <div><p>
+msgid "Please send FSF & GNU inquiries to <a
href=\"mailto:address@hidden"><address@hidden></a>. There are also <a
href=\"/contact/\">other ways to contact</a> the FSF."
+msgstr "Gelieve vragen over FSF & GNU te sturen naar <a
href=\"mailto:address@hidden"><address@hidden></a>. Er zijn ook nog <a
href=\"/contact/\">andere manieren om in contact te komen</a> met de FSF."
+
+# type: Content of: <div><p>
+#. type: Content of: <div><p>
+msgid "Please send broken links and other corrections or suggestions to <a
href=\"mailto:address@hidden"><address@hidden></a>."
+msgstr "Gelieve meldingen van verkeerde links en andere verbeteringen (of
suggesties) te sturen aan: <a
href=\"mailto:address@hidden"><address@hidden></a>."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <div><p>
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and submitting "
+#| "translations of this article."
+msgid "Please see the <a
href=\"/server/standards/README.translations.html\">Translations README</a> for
information on coordinating and submitting translations of this article."
+msgstr "Zie <a
href=\"/server/standards/README.translations.html\">Translations README</a>
voor nadere informatie over het eventueel vertalen van dit artikel."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <div><p>
+#| msgid "Copyright © 2002, 2007 Richard Stallman"
+msgid "Copyright © 2002, 2007 Richard Stallman"
+msgstr "Copyright © 2002, 2007 Richard Stallman"
+
+#. type: Content of: <div><p>
+msgid "This page is licensed under a <a rel=\"license\"
href=\"http://creativecommons.org/licenses/by-nd/3.0/us/\">Creative Commons
Attribution-NoDerivs 3.0 United States License</a>."
+msgstr "Deze pagina valt onder de <a rel=\"license\"
href=\"http://creativecommons.org/licenses/by-nd/3.0/us/\">Creative Commons
Attribution-NoDerivs 3.0 United States Licentie</a>."
+
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.
+#. type: Content of: <div><div>
+msgid "*GNUN-SLOT: TRANSLATOR'S CREDITS*"
+msgstr "*GNUN-SLOT: TRANSLATOR'S CREDITS*"
+
+# type: Content of: <div><p>
+#. timestamp start
+#. type: Content of: <div><p>
+msgid "Updated:"
+msgstr "Bijgewerkt:"
+
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy/po can-you-trust.nl.po,
Tom Uijldert <=