[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy po/surveillance-vs-democracy.ru....
From: |
GNUN |
Subject: |
www/philosophy po/surveillance-vs-democracy.ru.... |
Date: |
Sun, 23 Feb 2014 15:59:45 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 14/02/23 15:59:45
Modified files:
philosophy/po : surveillance-vs-democracy.ru.po
surveillance-vs-democracy.translist
Added files:
philosophy : surveillance-vs-democracy.ru.html
philosophy/po : surveillance-vs-democracy.ru-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ru.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.translist?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru-en.html?cvsroot=www&rev=1.1
Patches:
Index: po/surveillance-vs-democracy.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ru.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/surveillance-vs-democracy.ru.po 23 Feb 2014 15:26:18 -0000 1.3
+++ po/surveillance-vs-democracy.ru.po 23 Feb 2014 15:59:45 -0000 1.4
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"Outdated-Since: 2014-01-22 19:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -45,25 +44,6 @@
"takes-for-democracy-to-survive-surveillance/\"> УайеÑед</a>."
#. type: Content of: <p>
-# | Thanks to Edward Snowden's disclosures, we know that the current level of
-# | general surveillance in society is incompatible with human rights. The
-# | repeated harassment and prosecution of dissidents, sources, and
-# | journalists {+in the US and elsewhere+} provides confirmation. We need to
-# | reduce the level of general surveillance, but how far? Where exactly is
-# | the <em>maximum tolerable level of surveillance</em>, {+which we must
-# | ensure is not exceeded? It is the level+} beyond which [-it becomes
-# | oppressive? That happens when-] surveillance [-interferes-] {+starts to
-# | interfere+} with the functioning of [-democracy: when-] {+democracy, in
-# | that+} whistleblowers (such as Snowden) are likely to be caught.
-#| msgid ""
-#| "Thanks to Edward Snowden's disclosures, we know that the current level of "
-#| "general surveillance in society is incompatible with human rights. The "
-#| "repeated harassment and prosecution of dissidents, sources, and "
-#| "journalists provides confirmation. We need to reduce the level of "
-#| "general surveillance, but how far? Where exactly is the <em>maximum "
-#| "tolerable level of surveillance</em>, beyond which it becomes oppressive? "
-#| "That happens when surveillance interferes with the functioning of "
-#| "democracy: when whistleblowers (such as Snowden) are likely to be caught."
msgid ""
"Thanks to Edward Snowden's disclosures, we know that the current level of "
"general surveillance in society is incompatible with human rights. The "
@@ -78,12 +58,12 @@
"ÐлагодаÑÑ ÑакÑам, ÑÑавÑим извеÑÑнÑм
благодаÑÑ ÐдÑаÑÐ´Ñ Ð¡Ð½Ð¾ÑденÑ, Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, "
"ÑÑо ÑовÑеменнÑй ÑÑÐ¾Ð²ÐµÐ½Ñ Ð¾Ð±Ñей Ñлежки в
обÑеÑÑве неÑовмеÑÑим Ñ Ð¿Ñавами "
"Ñеловека. ÐеоднокÑаÑное запÑгивание и
пÑеÑледование диÑÑиденÑов, "
-"инÑоÑмаÑоÑов и жÑÑналиÑÑов в СШРи дÑÑгиÑ
ÑÑÑанаÑ
подÑвеÑÐ¶Ð´Ð°ÐµÑ ÑÑо. Ðам нÑжно
ÑнизиÑÑ ÑÑÐ¾Ð²ÐµÐ½Ñ Ð¾Ð±Ñей "
-"Ñлежки, но до какиÑ
пÑеделов? Ðаков в
ÑоÑноÑÑи <em>макÑималÑнÑй допÑÑÑимÑй "
-"ÑÑÐ¾Ð²ÐµÐ½Ñ Ñлежки</em>, за пÑÐµÐ´ÐµÐ»Ñ ÐºÐ¾ÑоÑого мÑ
гаÑанÑиÑованно не Ð´Ð¾Ð»Ð¶Ð½Ñ "
-"вÑÑ
одиÑÑ? ÐÑо ÑÑовенÑ, пÑи пÑевÑÑении
коÑоÑого "
-"Ñлежка наÑÐ¸Ð½Ð°ÐµÑ Ð²Ð¼ÐµÑиваÑÑÑÑ Ð²
ÑÑнкÑиониÑование демокÑаÑии, когда
оÑведомиÑелей "
-"(ÑакиÑ
как СноÑден), как пÑавило,
оÑлавливаÑÑ."
+"инÑоÑмаÑоÑов и жÑÑналиÑÑов в СШРи дÑÑгиÑ
ÑÑÑанаÑ
подÑвеÑÐ¶Ð´Ð°ÐµÑ ÑÑо. Ðам "
+"нÑжно ÑнизиÑÑ ÑÑÐ¾Ð²ÐµÐ½Ñ Ð¾Ð±Ñей Ñлежки, но до
какиÑ
пÑеделов? Ðаков в ÑоÑноÑÑи "
+"<em>макÑималÑнÑй допÑÑÑимÑй ÑÑовенÑ
Ñлежки</em>, за пÑÐµÐ´ÐµÐ»Ñ ÐºÐ¾ÑоÑого Ð¼Ñ "
+"гаÑанÑиÑованно не Ð´Ð¾Ð»Ð¶Ð½Ñ Ð²ÑÑ
одиÑÑ? ÐÑо
ÑÑовенÑ, пÑи пÑевÑÑении коÑоÑого "
+"Ñлежка наÑÐ¸Ð½Ð°ÐµÑ Ð²Ð¼ÐµÑиваÑÑÑÑ Ð²
ÑÑнкÑиониÑование демокÑаÑии, когда "
+"оÑведомиÑелей (ÑакиÑ
как СноÑден), как
пÑавило, оÑлавливаÑÑ."
#. type: Content of: <p>
msgid ""
@@ -95,40 +75,14 @@
"whistleblowers know they are safe."
msgstr ""
"Ð ÑÑловиÑÑ
гоÑÑдаÑÑÑвенной ÑÐ°Ð¹Ð½Ñ Ð¼Ñ,
наÑод, завиÑим Ð¾Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑи "
-"оÑведомиÑелей <a "
-"href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">
ÑаÑÑказÑваÑÑ "
-"нам о Ñом, ÑÑо Ð´ÐµÐ»Ð°ÐµÑ Ð³Ð¾ÑÑдаÑÑÑво</a>.
Ðднако нÑнеÑнÑÑ Ñлежка оÑпÑÐ³Ð¸Ð²Ð°ÐµÑ "
-"поÑенÑиалÑнÑÑ
оÑведомиÑелей, а ÑÑо
знаÑиÑ, ÑÑо она ÑеÑеÑÑÑÑ ÑилÑна. ЧÑÐ¾Ð±Ñ "
-"воÑÑÑановиÑÑ Ð´ÐµÐ¼Ð¾ÐºÑаÑиÑеÑкий конÑÑолÑ
наÑода над гоÑÑдаÑÑÑвом, Ð¼Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ "
-"ÑокÑаÑиÑÑ ÑÐ»ÐµÐ¶ÐºÑ Ð´Ð¾ велиÑинÑ, пÑи коÑоÑой
оÑведомиÑели бÑдÑÑ Ð·Ð½Ð°ÑÑ, ÑÑо они в "
-"безопаÑноÑÑи."
-
-#. type: Content of: <p>
-# | Using free/libre software, <a
-# |
[-href=\"http://www.wired.com/opinion/2013/09/why-free-software-is-more-important-now-than-ever-before/\">-]
-# | {+href=\"/philosophy/free-software-even-more-important.html\">+} as I've
-# | advocated for 30 years</a>, is the first step in taking control of our
-# | digital [-lives.-] {+lives, and that includes preventing surveillance.+}
-# | We can't trust nonfree software; the NSA <a
-# |
href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">
-# | uses</a> and even <a
-# |
href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">
-# | creates</a> security weaknesses in nonfree software to invade our own
-# | computers and routers. Free software gives us control of our own
-# | computers, but <a href=\"http://www.wired.com/opinion/2013/10/149481/\">
-# | that won't protect our privacy once we set foot on the Internet</a>.
-#| msgid ""
-#| "Using free/libre software, <a href=\"http://www.wired.com/opinion/2013/09/"
-#| "why-free-software-is-more-important-now-than-ever-before/\"> as I've "
-#| "advocated for 30 years</a>, is the first step in taking control of our "
-#| "digital lives. We can't trust nonfree software; the NSA <a href=\"http://"
-#| "blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-"
-#| "ever-trust-microsoft-again/index.htm\"> uses</a> and even <a href="
-#| "\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-"
-#| "security\"> creates</a> security weaknesses in nonfree software to invade "
-#| "our own computers and routers. Free software gives us control of our own "
-#| "computers, but <a href=\"http://www.wired.com/opinion/2013/10/149481/\"> "
-#| "that won't protect our privacy once we set foot on the Internet</a>."
+"оÑведомиÑелей <a
href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama"
+"\"> ÑаÑÑказÑваÑÑ Ð½Ð°Ð¼ о Ñом, ÑÑо делаеÑ
гоÑÑдаÑÑÑво</a>. Ðднако нÑнеÑнÑÑ "
+"Ñлежка оÑпÑÐ³Ð¸Ð²Ð°ÐµÑ Ð¿Ð¾ÑенÑиалÑнÑÑ
оÑведомиÑелей, а ÑÑо знаÑиÑ, ÑÑо она "
+"ÑеÑеÑÑÑÑ ÑилÑна. ЧÑÐ¾Ð±Ñ Ð²Ð¾ÑÑÑановиÑÑ
демокÑаÑиÑеÑкий конÑÑÐ¾Ð»Ñ Ð½Ð°Ñода над "
+"гоÑÑдаÑÑÑвом, Ð¼Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ ÑокÑаÑиÑÑ ÑлежкÑ
до велиÑинÑ, пÑи коÑоÑой "
+"оÑведомиÑели бÑдÑÑ Ð·Ð½Ð°ÑÑ, ÑÑо они в
безопаÑноÑÑи."
+
+#. type: Content of: <p>
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\"> as I've advocated for 30 years</a>, is the first step in "
@@ -142,17 +96,16 @@
"but <a href=\"http://www.wired.com/opinion/2013/10/149481/\"> that won't "
"protect our privacy once we set foot on the Internet</a>."
msgstr ""
-"ÐÑименение ÑвободнÑÑ
пÑогÑамм, <a
href=\"/philosophy/"
-"free-software-is-more-important.html/\"> "
-"за ÑÑо Ñ Ð²ÑÑÑÑÐ¿Ð°Ñ Ñже ÑÑидÑаÑÑ
леÑ</a> — пеÑвÑй Ñаг к конÑÑÐ¾Ð»Ñ "
-"над ÑиÑÑовой ÑÑоÑоной наÑей жизни, ÑÑо
подÑазÑÐ¼ÐµÐ²Ð°ÐµÑ Ð¿ÑоÑиводейÑÑвие "
-"Ñлежке. ÐовеÑÑÑÑ Ð½ÐµÑвободнÑм пÑогÑаммам
нелÑзÑ; "
-"<a href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-"
-"can-any-company-ever-trust-microsoft-again/index.htm\"> ÐгенÑÑÑво "
-"наÑионалÑной безопаÑноÑÑи полÑзÑеÑÑÑ Ð¸
даже ÑÐ¾Ð·Ð´Ð°ÐµÑ ÑлабÑе меÑÑа</a> в "
-"неÑвободнÑÑ
пÑогÑаммаÑ
Ð´Ð»Ñ <a
href=\"http://www.theguardian.com/world/2013/"
-"sep/05/nsa-gchq-encryption-codes-security\"> вÑоÑÐ¶ÐµÐ½Ð¸Ñ Ð½Ð° наÑи
компÑÑÑеÑÑ</"
-"a> и маÑÑÑÑÑизаÑоÑÑ. СвободнÑе пÑогÑаммÑ
даÑÑ Ð½Ð°Ð¼ конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ наÑими "
+"ÐÑименение ÑвободнÑÑ
пÑогÑамм, <a
href=\"/philosophy/free-software-is-more-"
+"important.html/\"> за ÑÑо Ñ Ð²ÑÑÑÑÐ¿Ð°Ñ Ñже ÑÑидÑаÑÑ
леÑ</a> — "
+"пеÑвÑй Ñаг к конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ÑиÑÑовой
ÑÑоÑоной наÑей жизни, ÑÑо подÑазÑÐ¼ÐµÐ²Ð°ÐµÑ "
+"пÑоÑиводейÑÑвие Ñлежке. ÐовеÑÑÑÑ
неÑвободнÑм пÑогÑаммам нелÑзÑ; <a href="
+"\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-"
+"company-ever-trust-microsoft-again/index.htm\"> ÐгенÑÑÑво
наÑионалÑной "
+"безопаÑноÑÑи полÑзÑеÑÑÑ Ð¸ даже ÑоздаеÑ
ÑлабÑе меÑÑа</a> в неÑвободнÑÑ
"
+"пÑогÑаммаÑ
Ð´Ð»Ñ <a
href=\"http://www.theguardian.com/world/2013/sep/05/nsa-"
+"gchq-encryption-codes-security\"> вÑоÑÐ¶ÐµÐ½Ð¸Ñ Ð½Ð° наÑи
компÑÑÑеÑÑ</a> и "
+"маÑÑÑÑÑизаÑоÑÑ. СвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð´Ð°ÑÑ
нам конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ наÑими "
"ÑобÑÑвеннÑми компÑÑÑеÑами, но <a
href=\"http://www.wired.com/"
"opinion/2013/10/149481/\"> ÑÑо не заÑиÑÐ¸Ñ Ð½Ð°ÑÑ ÑаÑÑнÑÑ
жизнÑ, когда Ð¼Ñ "
"вÑÑ
одим в ÐнÑеÑнеÑ</a>."
@@ -193,32 +146,6 @@
"ÑлиÑком велика, ÑÑÐ¾Ð±Ñ Ð´ÐµÐ¼Ð¾ÐºÑаÑÐ¸Ñ Ð¼Ð¾Ð³Ð»Ð° ее
вÑдеÑжаÑÑ."
#. type: Content of: <p>
-# | An unnamed U.S. government official ominously told journalists in 2011
-# | that the <a
-# |
href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\">
-# | U.S. would not subpoena reporters because “We know who you're
-# | talking to.”</a> Sometimes <a
-# |
href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">
-# | journalists' phone call records are subpoenaed</a> to find this out, but
-# | Snowden has shown us that in effect they subpoena [-<a
-# | href=\"https://www.commondreams.org/view/2013/05/14\">-] all the phone
-# | call records of everyone in the [-U.S.</a>,-] {+U.S.,+} all the [-time.-]
-# | {+time, <a
-# |
href=\"http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\">
-# | from Verizon </a> and <a
-# |
href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">
-# | from other companies too</a>.+}
-#| msgid ""
-#| "An unnamed U.S. government official ominously told journalists in 2011 "
-#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
-#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\"> U.S. would "
-#| "not subpoena reporters because “We know who you're talking to."
-#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
-#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\"> journalists' "
-#| "phone call records are subpoenaed</a> to find this out, but Snowden has "
-#| "shown us that in effect they subpoena <a href=\"https://www.commondreams."
-#| "org/view/2013/05/14\"> all the phone call records of everyone in the U.S."
-#| "</a>, all the time."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
@@ -240,12 +167,11 @@
"говоÑил”</a>. Ðногда Ð´Ð»Ñ ÑÑого <a
href=\"http://www.theguardian.com/"
"media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\"> по "
"ÑÑÐµÐ±Ð¾Ð²Ð°Ð½Ð¸Ñ ÑÑда пеÑедаÑÑÑÑ Ð·Ð°Ð¿Ð¸Ñи
ÑелеÑоннÑÑ
пеÑеговоÑов жÑÑналиÑÑов</a>, но "
-"СноÑден показал нам, ÑÑо ÑакÑиÑеÑки они
вÑе вÑÐµÐ¼Ñ Ð¿Ð¾Ð»ÑÑаÑÑ "
-"запиÑи вÑеÑ
ÑелеÑоннÑÑ
пеÑеговоÑов вÑеÑ
лÑдей в СШР<a href="
-"\"http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-"
-"data-court-order\"> из Verizon</a>, <a href=\"http://www.marketwatch."
-"com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\"> "
-"а Ñакже Ð¾Ñ Ð´ÑÑгиÑ
компаний</a>."
+"СноÑден показал нам, ÑÑо ÑакÑиÑеÑки они
вÑе вÑÐµÐ¼Ñ Ð¿Ð¾Ð»ÑÑаÑÑ Ð·Ð°Ð¿Ð¸Ñи вÑеÑ
"
+"ÑелеÑоннÑÑ
пеÑеговоÑов вÑеÑ
лÑдей в СШР<a
href=\"http://www.theguardian.com/"
+"world/interactive/2013/jun/06/verizon-telephone-data-court-order\"> из "
+"Verizon</a>, <a href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-"
+"into-networks-beyond-verizon-2013-06-07\"> а Ñакже Ð¾Ñ Ð´ÑÑгиÑ
компаний</a>."
#. type: Content of: <p>
msgid ""
@@ -321,22 +247,6 @@
"назнаÑиÑÑ Ñвидание”."
#. type: Content of: <p>
-# | Surveillance data will always be used for other purposes, even if this is
-# | prohibited. Once the data has been accumulated and the state has the
-# | possibility of access to it, it can [-<a
-# |
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\">-]
-# | misuse that data in dreadful [-ways.</a>-] {+ways, as shown by examples
-# | from <a
-# |
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\">
-# | Europe</a> and <a
-# | href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\"> the
-# | US </a>.+}
-#| msgid ""
-#| "Surveillance data will always be used for other purposes, even if this is "
-#| "prohibited. Once the data has been accumulated and the state has the "
-#| "possibility of access to it, it can <a href=\"http://falkvinge."
-#| "net/2012/03/17/collected-personal-data-will-always-be-used-against-the-"
-#| "citizens/\"> misuse that data in dreadful ways.</a>"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -348,11 +258,10 @@
msgstr ""
"ÐаннÑе Ñлежки вÑегда бÑдÑÑ
иÑполÑзоваÑÑÑÑ Ð² дÑÑгиÑ
ÑелÑÑ
, даже еÑли
ÑÑо "
"бÑÐ´ÐµÑ Ð·Ð°Ð¿ÑеÑено. Ðак ÑолÑко даннÑе
ÑобÑÐ°Ð½Ñ Ð¸ Ñ Ð³Ð¾ÑÑдаÑÑÑва еÑÑÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ "
-"доÑÑÑпа к ним, оно Ð¼Ð¾Ð¶ÐµÑ Ð·Ð»Ð¾ÑпоÑÑеблÑÑÑ "
-"ÑÑими даннÑми ÑжаÑаÑÑим обÑазом, как
показÑваÑÑ <a href=\"http://falkvinge.net/2012/03/17/collected-"
-"personal-data-will-always-be-used-against-the-citizens/\">пÑимеÑÑ Ð¸Ð·
ÐвÑопÑ</a> "
-"и <a "
-"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">СШÐ</a>."
+"доÑÑÑпа к ним, оно Ð¼Ð¾Ð¶ÐµÑ Ð·Ð»Ð¾ÑпоÑÑеблÑÑÑ
ÑÑими даннÑми ÑжаÑаÑÑим обÑазом, как "
+"показÑваÑÑ <a
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-"
+"will-always-be-used-against-the-citizens/\">пÑимеÑÑ Ð¸Ð·
ÐвÑопÑ</a> и <a href="
+"\"https://en.wikipedia.org/wiki/Japanese_American_internment\">СШÐ</a>."
#. type: Content of: <p>
msgid ""
@@ -458,12 +367,12 @@
"free software on your own computer before uploading it."
msgstr ""
"Ðикогда не пеÑедавайÑе ни на какой ÑайÑ
полного ÑпиÑка адÑеÑов ÑлекÑÑонной "
-"поÑÑÑ Ð¸ номеÑов ÑелеÑонов лÑдей, Ñ
коÑоÑÑми Ð²Ñ Ð¾Ð±ÑаеÑеÑÑ. ÐеÑжиÑе Ñвои даннÑе "
-"Ñ ÑебÑ; не Ñ
ÑаниÑе Ñвои даннÑе на
“Ñдобном” ÑеÑвеÑе компании. "
-"Ðднако вполне безопаÑно ввеÑÑÑÑ
ÑезеÑвнÑе копии даннÑÑ
коммеÑÑеÑкой
ÑлÑжбе "
-"пÑи ÑÑловии, ÑÑо Ð²Ñ Ð·Ð°ÑиÑÑовали ÑÑи
даннÑе, в Ñом ÑиÑле имена Ñайлов, на "
-"Ñвоем компÑÑÑеÑе Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑвободнÑÑ
пÑогÑамм пеÑед Ñем, как оÑпÑавлÑÑÑ Ð¸Ñ
на "
-"ÑеÑвеÑ."
+"поÑÑÑ Ð¸ номеÑов ÑелеÑонов лÑдей, Ñ
коÑоÑÑми Ð²Ñ Ð¾Ð±ÑаеÑеÑÑ. ÐеÑжиÑе Ñвои "
+"даннÑе Ñ ÑебÑ; не Ñ
ÑаниÑе Ñвои даннÑе на
“Ñдобном” ÑеÑвеÑе "
+"компании. Ðднако вполне безопаÑно ввеÑÑÑÑ
ÑезеÑвнÑе копии даннÑÑ
"
+"коммеÑÑеÑкой ÑлÑжбе пÑи ÑÑловии, ÑÑо вÑ
заÑиÑÑовали ÑÑи даннÑе, в Ñом ÑиÑле "
+"имена Ñайлов, на Ñвоем компÑÑÑеÑе Ñ
помоÑÑÑ ÑвободнÑÑ
пÑогÑамм пеÑед Ñем, "
+"как оÑпÑавлÑÑÑ Ð¸Ñ
на ÑеÑвеÑ."
#. type: Content of: <p>
msgid ""
@@ -475,12 +384,12 @@
"computing, it requires you to hand over all the pertinent data to the server."
msgstr ""
"Ради конÑиденÑиалÑноÑÑи Ð²Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ
избегаÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм, поÑколÑÐºÑ "
-"вледÑÑвие пеÑедаÑи дÑÑгим конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
ваÑими вÑÑиÑлениÑми, они, <a "
-"href=\"/philosophy/proprietary-surveillance.html\">веÑоÑÑно,
ÑпионÑÑ Ð·Ð° "
-"вами</a>. ÐзбегайÑе <a "
-"href=\"/philosophy/who-does-that-server-really-serve.html\">
ÑÑлÑг-замен "
-"пÑогÑамм</a>, а Ñакже пеÑедаÑи дÑÑгим
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ваÑими вÑÑиÑлениÑми, ÑÑо "
-"ÑÑебÑÐµÑ Ð¾Ñ Ð²Ð°Ñ Ð¿ÑедоÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð²ÑеÑ
обÑабаÑÑваемÑÑ
даннÑÑ
на ÑеÑвеÑ."
+"вледÑÑвие пеÑедаÑи дÑÑгим конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
ваÑими вÑÑиÑлениÑми, они, <a href=\"/"
+"philosophy/proprietary-surveillance.html\">веÑоÑÑно, ÑпионÑÑ
за вами</a>. "
+"ÐзбегайÑе <a
href=\"/philosophy/who-does-that-server-really-serve.html\"> "
+"ÑÑлÑг-замен пÑогÑамм</a>, а Ñакже пеÑедаÑи
дÑÑгим конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ваÑими "
+"вÑÑиÑлениÑми, ÑÑо ÑÑебÑÐµÑ Ð¾Ñ Ð²Ð°Ñ
пÑедоÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð²ÑеÑ
обÑабаÑÑваемÑÑ
даннÑÑ
"
+"на ÑеÑвеÑ."
#. type: Content of: <p>
msgid ""
@@ -490,9 +399,9 @@
"practices of society."
msgstr ""
"Ðднако даже Ñамой бдиÑелÑной ÑамозаÑиÑÑ
недоÑÑаÑоÑно, ÑÑÐ¾Ð±Ñ Ð·Ð°ÑиÑиÑÑ Ð²Ð°ÑÑ "
-"конÑиденÑиалÑноÑÑÑ Ð½Ð° ÑиÑÑемаÑ
, коÑоÑÑе
вам не пÑинадлежаÑ. Ðогда Ð¼Ñ Ð¾Ð±ÑаемÑÑ "
-"Ñ Ð´ÑÑгими или пеÑедвигаемÑÑ Ð¿Ð¾ гоÑодÑ,
наÑа конÑиденÑиалÑноÑÑÑ Ð·Ð°Ð²Ð¸ÑÐ¸Ñ Ð¾Ñ "
-"ÑложивÑейÑÑ Ð² обÑеÑÑве пÑакÑики."
+"конÑиденÑиалÑноÑÑÑ Ð½Ð° ÑиÑÑемаÑ
, коÑоÑÑе
вам не пÑинадлежаÑ. Ðогда Ð¼Ñ "
+"обÑаемÑÑ Ñ Ð´ÑÑгими или пеÑедвигаемÑÑ Ð¿Ð¾
гоÑодÑ, наÑа конÑиденÑиалÑноÑÑÑ "
+"завиÑÐ¸Ñ Ð¾Ñ ÑложивÑейÑÑ Ð² обÑеÑÑве
пÑакÑики."
#. type: Content of: <h3>
msgid "We Must Design Every System for Privacy"
@@ -544,23 +453,6 @@
msgstr "ÐеÑа пÑоÑив ÑбоÑа даннÑÑ
: оÑÑавлÑÑÑ Ð¸Ñ
ÑаÑÑÑедоÑоÑеннÑми"
#. type: Content of: <p>
-# | One way to make monitoring safe for privacy is to {+<a
-# | name=\"dispersal\">+} keep the data dispersed and inconvenient to
-# | [-access.-] {+access</a>.+} Old-fashioned security cameras were no threat
-# | to privacy. The recording was stored on the premises, and kept for a few
-# | weeks at most. Because of the inconvenience of accessing these
-# | recordings, it was never done massively; they were accessed only in the
-# | places where someone reported a crime. It would not be feasible to
-# | physically collect millions of tapes every day and watch them or copy them.
-#| msgid ""
-#| "One way to make monitoring safe for privacy is to keep the data dispersed "
-#| "and inconvenient to access. Old-fashioned security cameras were no "
-#| "threat to privacy. The recording was stored on the premises, and kept "
-#| "for a few weeks at most. Because of the inconvenience of accessing these "
-#| "recordings, it was never done massively; they were accessed only in the "
-#| "places where someone reported a crime. It would not be feasible to "
-#| "physically collect millions of tapes every day and watch them or copy "
-#| "them."
msgid ""
"One way to make monitoring safe for privacy is to <a name=\"dispersal\"> "
"keep the data dispersed and inconvenient to access</a>. Old-fashioned "
@@ -571,9 +463,9 @@
"to physically collect millions of tapes every day and watch them or copy "
"them."
msgstr ""
-"<a name=\"dispersal\"></a>Ðдин из ÑпоÑобов ÑделаÑÑ
наблÑдение безопаÑнÑм длÑ
конÑиденÑиалÑноÑÑи "
-"— оÑÑавлÑÑÑ Ð´Ð°Ð½Ð½Ñе ÑаÑÑÑедоÑоÑеннÑми,
без Ñдобного доÑÑÑпа. "
-"СÑаÑомоднÑе камеÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð½Ð°Ð±Ð»ÑÐ´ÐµÐ½Ð¸Ñ Ð½Ðµ
пÑедÑÑавлÑли ÑгÑÐ¾Ð·Ñ "
+"<a name=\"dispersal\"></a>Ðдин из ÑпоÑобов ÑделаÑÑ
наблÑдение безопаÑнÑм Ð´Ð»Ñ "
+"конÑиденÑиалÑноÑÑи — оÑÑавлÑÑÑ
даннÑе ÑаÑÑÑедоÑоÑеннÑми, без "
+"Ñдобного доÑÑÑпа. СÑаÑомоднÑе камеÑÑ
видеонаблÑÐ´ÐµÐ½Ð¸Ñ Ð½Ðµ пÑедÑÑавлÑли ÑгÑÐ¾Ð·Ñ "
"конÑиденÑиалÑноÑÑи. ÐапиÑи велиÑÑ Ð½Ð°
меÑÑе и Ñ
ÑанилиÑÑ Ð½Ðµ долÑÑе неÑколÑкиÑ
"
"неделÑ. Ðз-за неÑдобÑÑв доÑÑÑпа к ÑÑим
запиÑÑм к ним никогда не обÑаÑалиÑÑ "
"помногÑ; запиÑи поднимали ÑолÑко в меÑÑаÑ
,
где кÑо-Ñо ÑообÑал о "
@@ -692,25 +584,6 @@
"конÑиденÑиалÑноÑÑи, Ñем намеÑениÑ
ÑоблÑдаÑÑ ÐµÐµ."
#. type: Content of: <p>
-# | We could correct both problems by adopting a system of anonymous
-# | payments—anonymous for the payer, that is. (We don't want the payee
-# | to dodge taxes.) <a
-# |
href=\"http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">
-# | Bitcoin is not anonymous</a>, [-but-] {+though there are efforts to
-# | develop ways to pay anonymously with Bitcoin. However,+} technology for
-# | <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.html\">
-# | digital cash was first developed [-25 years ago</a>;-] {+in the
-# | 1980s</a>;+} we need only suitable business arrangements, and for the
-# | state not to obstruct them.
-#| msgid ""
-#| "We could correct both problems by adopting a system of anonymous "
-#| "payments—anonymous for the payer, that is. (We don't want the "
-#| "payee to dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
-#| "lets-cut-through-the-bitcoin-hype/\"> Bitcoin is not anonymous</a>, but "
-#| "technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
-#| "emoney_pr.html\"> digital cash was first developed 25 years ago</a>; we "
-#| "need only suitable business arrangements, and for the state not to "
-#| "obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want the payee "
@@ -726,9 +599,9 @@
"плаÑÑÑ, Ñвиливал Ð¾Ñ Ð½Ð°Ð»Ð¾Ð³Ð¾Ð²). <a
href=\"http://www.wired.com/opinion/2013/05/"
"lets-cut-through-the-bitcoin-hype/\"> СиÑÑема Bitcoin не
анонимна</a>, но "
"ÑеÑ
ника <a
href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.html\"> "
-"ÑиÑÑовой налиÑноÑÑи впеÑвÑе бÑла
ÑазÑабоÑана в воÑÑмидеÑÑÑÑе годÑ
XX века</a>; "
-"нам недоÑÑÐ°ÐµÑ ÑолÑко пÑедпÑиÑÑий, коÑоÑÑе
занималиÑÑ Ð±Ñ ÑÑим, и гоÑÑдаÑÑÑва, "
-"коÑоÑое не пÑепÑÑÑÑвовало Ð±Ñ ÑÑомÑ."
+"ÑиÑÑовой налиÑноÑÑи впеÑвÑе бÑла
ÑазÑабоÑана в воÑÑмидеÑÑÑÑе Ð³Ð¾Ð´Ñ XX "
+"века</a>; нам недоÑÑÐ°ÐµÑ ÑолÑко пÑедпÑиÑÑий,
коÑоÑÑе занималиÑÑ Ð±Ñ ÑÑим, и "
+"гоÑÑдаÑÑÑва, коÑоÑое не пÑепÑÑÑÑвовало бÑ
ÑÑомÑ."
#. type: Content of: <p>
msgid ""
Index: po/surveillance-vs-democracy.translist
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.translist,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/surveillance-vs-democracy.translist 22 Jan 2014 21:28:28 -0000
1.5
+++ po/surveillance-vs-democracy.translist 23 Feb 2014 15:59:45 -0000
1.6
@@ -6,6 +6,7 @@
<span dir="ltr"><a lang="es" hreflang="es"
href="/philosophy/surveillance-vs-democracy.es.html">español</a> [es]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/philosophy/surveillance-vs-democracy.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="it" hreflang="it"
href="/philosophy/surveillance-vs-democracy.it.html">italiano</a> [it]</span>
+<span dir="ltr"><a lang="ru" hreflang="ru"
href="/philosophy/surveillance-vs-democracy.ru.html">ÑÑÑÑкий</a> [ru]</span>
<span dir="ltr"><a lang="sq" hreflang="sq"
href="/philosophy/surveillance-vs-democracy.sq.html">Shqip</a> [sq]</span>
</p>
</div>' -->
Index: surveillance-vs-democracy.ru.html
===================================================================
RCS file: surveillance-vs-democracy.ru.html
diff -N surveillance-vs-democracy.ru.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ surveillance-vs-democracy.ru.html 23 Feb 2014 15:59:44 -0000 1.1
@@ -0,0 +1,525 @@
+
+
+<!--#include virtual="/server/header.ru.html" -->
+<!-- Parent-Version: 1.75 -->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+ <!--#set var="ENGLISH_PAGE"
value="/philosophy/surveillance-vs-democracy.en.html" -->
+
+<title>СколÑко Ñлежки Ð¼Ð¾Ð¶ÐµÑ Ð²ÑдеÑжаÑÑ
демокÑаÑиÑ? - ÐÑÐ¾ÐµÐºÑ GNU - Фонд Ñвободного
+пÑогÑаммного обеÑпеÑениÑ</title>
+
+<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
+<!--#include virtual="/server/banner.ru.html" -->
+<h2>СколÑко Ñлежки Ð¼Ð¾Ð¶ÐµÑ Ð²ÑдеÑжаÑÑ
демокÑаÑиÑ?</h2>
+
+<p><a href="http://www.stallman.org/">РиÑаÑд СÑолмен</a></p>
+
+<blockquote><p>ÐеÑвонаÑалÑÐ½Ð°Ñ Ð²ÐµÑÑÐ¸Ñ ÑÑой ÑÑаÑÑи
бÑла опÑбликована в окÑÑбÑе 2013 года
+в <a
+href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/">
+УайеÑед</a>.</p></blockquote>
+
+<p>ÐлагодаÑÑ ÑакÑам, ÑÑавÑим извеÑÑнÑм
благодаÑÑ ÐдÑаÑÐ´Ñ Ð¡Ð½Ð¾ÑденÑ, Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼,
+ÑÑо ÑовÑеменнÑй ÑÑÐ¾Ð²ÐµÐ½Ñ Ð¾Ð±Ñей Ñлежки в
обÑеÑÑве неÑовмеÑÑим Ñ Ð¿Ñавами
+Ñеловека. ÐеоднокÑаÑное запÑгивание и
пÑеÑледование диÑÑиденÑов,
+инÑоÑмаÑоÑов и жÑÑналиÑÑов в СШРи дÑÑгиÑ
ÑÑÑанаÑ
подÑвеÑÐ¶Ð´Ð°ÐµÑ ÑÑо. Ðам
+нÑжно ÑнизиÑÑ ÑÑÐ¾Ð²ÐµÐ½Ñ Ð¾Ð±Ñей Ñлежки, но до
какиÑ
пÑеделов? Ðаков в ÑоÑноÑÑи
+<em>макÑималÑнÑй допÑÑÑимÑй ÑÑовенÑ
Ñлежки</em>, за пÑÐµÐ´ÐµÐ»Ñ ÐºÐ¾ÑоÑого мÑ
+гаÑанÑиÑованно не Ð´Ð¾Ð»Ð¶Ð½Ñ Ð²ÑÑ
одиÑÑ? ÐÑо
ÑÑовенÑ, пÑи пÑевÑÑении коÑоÑого
+Ñлежка наÑÐ¸Ð½Ð°ÐµÑ Ð²Ð¼ÐµÑиваÑÑÑÑ Ð²
ÑÑнкÑиониÑование демокÑаÑии, когда
+оÑведомиÑелей (ÑакиÑ
как СноÑден), как
пÑавило, оÑлавливаÑÑ.</p>
+
+<p>Ð ÑÑловиÑÑ
гоÑÑдаÑÑÑвенной ÑÐ°Ð¹Ð½Ñ Ð¼Ñ,
наÑод, завиÑим Ð¾Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑи
+оÑведомиÑелей <a
+href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">
ÑаÑÑказÑваÑÑ
+нам о Ñом, ÑÑо Ð´ÐµÐ»Ð°ÐµÑ Ð³Ð¾ÑÑдаÑÑÑво</a>. Ðднако
нÑнеÑнÑÑ Ñлежка оÑпÑгиваеÑ
+поÑенÑиалÑнÑÑ
оÑведомиÑелей, а ÑÑо знаÑиÑ,
ÑÑо она ÑеÑеÑÑÑÑ ÑилÑна. ЧÑобÑ
+воÑÑÑановиÑÑ Ð´ÐµÐ¼Ð¾ÐºÑаÑиÑеÑкий конÑÑолÑ
наÑода над гоÑÑдаÑÑÑвом, Ð¼Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ
+ÑокÑаÑиÑÑ ÑÐ»ÐµÐ¶ÐºÑ Ð´Ð¾ велиÑинÑ, пÑи коÑоÑой
оÑведомиÑели бÑдÑÑ Ð·Ð½Ð°ÑÑ, ÑÑо они
+в безопаÑноÑÑи.</p>
+
+<p>ÐÑименение ÑвободнÑÑ
пÑогÑамм, <a
+href="/philosophy/free-software-is-more-important.html/"> за ÑÑо Ñ
вÑÑÑÑпаÑ
+Ñже ÑÑидÑаÑÑ Ð»ÐµÑ</a> — пеÑвÑй Ñаг к
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ÑиÑÑовой
+ÑÑоÑоной наÑей жизни, ÑÑо подÑазÑмеваеÑ
пÑоÑиводейÑÑвие Ñлежке. ÐовеÑÑÑÑ
+неÑвободнÑм пÑогÑаммам нелÑзÑ; <a
+href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
+ÐгенÑÑÑво наÑионалÑной безопаÑноÑÑи
полÑзÑеÑÑÑ Ð¸ даже ÑÐ¾Ð·Ð´Ð°ÐµÑ ÑлабÑе
+меÑÑа</a> в неÑвободнÑÑ
пÑогÑаммаÑ
Ð´Ð»Ñ <a
+href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">
+вÑоÑÐ¶ÐµÐ½Ð¸Ñ Ð½Ð° наÑи компÑÑÑеÑÑ</a> и
маÑÑÑÑÑизаÑоÑÑ. СвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð´Ð°ÑÑ
+нам конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ наÑими ÑобÑÑвеннÑми
компÑÑÑеÑами, но <a
+href="http://www.wired.com/opinion/2013/10/149481/"> ÑÑо не
заÑиÑÐ¸Ñ Ð½Ð°ÑÑ
+ÑаÑÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ, когда Ð¼Ñ Ð²ÑÑ
одим в
ÐнÑеÑнеÑ</a>.</p>
+
+<p>РСШРпÑоводиÑÑÑ <a
+href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">
+двÑÑÑоÑонний законопÑÐ¾ÐµÐºÑ Ñ ÑелÑÑ
“ÑÑезаÑÑ ÑÐ¸Ð»Ñ Ñлежки внÑÑÑи
+ÑÑÑанє</a>, но Ð´Ð»Ñ ÑÑого нÑжно
огÑаниÑиÑÑ Ð¸ÑполÑзование
+гоÑÑдаÑÑÑвеннÑми оÑганами наÑиÑ
ÑлекÑÑоннÑÑ
доÑÑе. ÐÑого не доÑÑаÑоÑно длÑ
+Ñого, ÑÑÐ¾Ð±Ñ Ð·Ð°ÑиÑиÑÑ Ð¾ÑведомиÑелей, еÑли
“поимка оÑведомиÑелє
+ÑÑановиÑÑÑ Ð¾Ñнованием Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа к
даннÑм, позволÑÑÑим иденÑиÑиÑиÑоваÑÑ
+его. Ðам нÑжно идÑи далÑÑе.</p>
+
+<h3>ÐеÑÑ
ний пÑедел Ñлежки пÑи демокÑаÑии</h3>
+
+<p>ÐÑли оÑведомиÑели не ÑмеÑÑ Ð¿ÑолиÑÑ ÑвеÑ
на пÑеÑÑÑÐ¿Ð»ÐµÐ½Ð¸Ñ Ð¸ ложÑ, Ð¼Ñ ÑеÑÑем
+поÑледний кÑÑок ÑакÑиÑеÑкого конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
Ñвоим пÑавиÑелÑÑÑвом и
+гоÑÑдаÑÑÑвеннÑми ÑÑÑеждениÑми. ÐÐ¾Ñ Ð¿Ð¾ÑемÑ
Ñлежка, коÑоÑÐ°Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑеÑ
+гоÑÑдаÑÑÑÐ²Ñ ÑзнаваÑÑ, кÑо говоÑил Ñ
жÑÑналиÑÑом, ÑлиÑком велика —
+ÑлиÑком велика, ÑÑÐ¾Ð±Ñ Ð´ÐµÐ¼Ð¾ÐºÑаÑÐ¸Ñ Ð¼Ð¾Ð³Ð»Ð° ее
вÑдеÑжаÑÑ.</p>
+
+<p>Ðекое должноÑÑное лиÑо админиÑÑÑаÑии
СШРзловеÑе заÑвило жÑÑналиÑÑам в
+2011 годÑ, ÑÑо <a
+href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">
+СШРне бÑдÑÑ Ð´Ð¾Ð¿ÑаÑиваÑÑ Ð¶ÑÑналиÑÑов,
поÑÐ¾Ð¼Ñ ÑÑо “Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, кÑо Ñ Ð²Ð°Ð¼Ð¸
+говоÑил”</a>. Ðногда Ð´Ð»Ñ ÑÑого <a
+href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">
+по ÑÑÐµÐ±Ð¾Ð²Ð°Ð½Ð¸Ñ ÑÑда пеÑедаÑÑÑÑ Ð·Ð°Ð¿Ð¸Ñи
ÑелеÑоннÑÑ
пеÑеговоÑов жÑÑналиÑÑов</a>,
+но СноÑден показал нам, ÑÑо ÑакÑиÑеÑки они
вÑе вÑÐµÐ¼Ñ Ð¿Ð¾Ð»ÑÑаÑÑ Ð·Ð°Ð¿Ð¸Ñи вÑеÑ
+ÑелеÑоннÑÑ
пеÑеговоÑов вÑеÑ
лÑдей в СШР<a
+href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">
+из Verizon</a>, <a
+href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">
+а Ñакже Ð¾Ñ Ð´ÑÑгиÑ
компаний</a>.</p>
+
+<p>ÐеÑÑелÑноÑÑÑ Ð´Ð¸ÑÑиденÑов и оппозиÑии
ÑÑебÑÐµÑ Ñ
ÑаниÑÑ ÐºÐ¾Ðµ-ÑÑо в ÑекÑеÑе оÑ
+гоÑÑдаÑÑÑва, коÑоÑое непÑоÑÑ Ð¿ÑоделаÑÑ Ñ
ними ÑÐ¾Ñ Ð¸Ð»Ð¸ иной гÑÑзнÑй
+ÑÑÑк. ACLU пÑодемонÑÑÑиÑовала <a
+href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">
ÑиÑÑемаÑиÑеÑкÑÑ
+пÑакÑÐ¸ÐºÑ Ð²Ð½ÐµÐ´ÑÐµÐ½Ð¸Ñ Ð°Ð³ÐµÐ½Ñов в миÑнÑе
гÑÑÐ¿Ð¿Ñ Ð´Ð¸ÑÑиденÑов</a> Ñо ÑÑоÑонÑ
+гоÑÑдаÑÑÑвеннÑÑ
оÑганов СШРпод Ñем
пÑедлогом, ÑÑо ÑÑеди ниÑ
могÑÑ Ð¾ÐºÐ°Ð·Ð°ÑÑÑÑ
+ÑеÑÑоÑиÑÑÑ. ТоÑка, в коÑоÑой Ñлежка
ÑÑановиÑÑÑ ÑлиÑком велика —
+ÑÑо ÑоÑка, в коÑоÑой гоÑÑдаÑÑÑво можеÑ
ÑзнаÑÑ, кÑо говоÑил Ñ Ð¸Ð·Ð²ÐµÑÑнÑм
+жÑÑналиÑÑом или извеÑÑнÑм диÑÑиденÑом.</p>
+
+<h3>ÐÐ´Ð½Ð°Ð¶Ð´Ñ ÑобÑаннÑми ÑведениÑми бÑдÑÑ
злоÑпоÑÑеблÑÑÑ</h3>
+
+<p>Ðогда лÑди пÑизнаÑÑ, ÑÑо ÑÑÐ¾Ð²ÐµÐ½Ñ Ð¾Ð±Ñей
Ñлежки ÑлиÑком вÑÑок, Ñамо Ñобой
+напÑаÑиваеÑÑÑ Ð¿ÑедложиÑÑ Ð¾Ð³ÑаниÑÐµÐ½Ð¸Ñ Ð½Ð°
доÑÑÑп к ÑобÑаннÑм даннÑм. ÐÑо
+звÑÑÐ¸Ñ Ð½ÐµÐ¿Ð»Ð¾Ñ
о, но пÑÐ¾Ð±Ð»ÐµÐ¼Ñ ÑÑо не ÑеÑиÑ,
ни на иоÑÑ, даже в пÑедположении,
+ÑÑо гоÑÑдаÑÑÑво подÑиниÑÑÑ ÑÑим пÑавилам.
(ÐаÑионалÑное агенÑÑÑво
+безопаÑноÑÑи ввело в заблÑждение ÑÑд,
ÑазбиÑавÑий наÑÑÑение Ðакона о Ñлежке
+в ÑелÑÑ
внеÑней Ñазведки, поÑле Ñего ÑÑд
заÑвил, ÑÑо он <a
+href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">
ÑакÑиÑеÑки
+не в ÑоÑÑоÑнии полÑÑиÑÑ Ð¾ÑÑÐµÑ Ð¾ дейÑÑвиÑÑ
агенÑÑÑва</a>.) ÐодозÑение в
+ÑовеÑÑении пÑеÑÑÑÐ¿Ð»ÐµÐ½Ð¸Ñ ÑÑанеÑ
оÑнованием Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа, Ñак ÑÑо как ÑолÑко
+оÑведомиÑÐµÐ»Ñ Ð¾Ð±Ð²Ð¸Ð½ÑÑ Ð² “Ñпионаже”,
поиÑк “Ñпиона”
+ÑÑÐ°Ð½ÐµÑ Ð¿Ð¾Ð²Ð¾Ð´Ð¾Ð¼ Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа к накопленномÑ
маÑеÑиалÑ.</p>
+
+<p>ÐоÑÑдаÑÑÑвеннÑй пеÑÑонал Ñлежки бÑдеÑ
злоÑпоÑÑеблÑÑÑ Ð´Ð°Ð½Ð½Ñми и в лиÑнÑÑ
+ÑелÑÑ
. ÐекоÑоÑÑе агенÑÑ ÐÐÐ <a
+href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">
+полÑзовалоÑÑ ÑиÑÑемами Ñлежки СШРдлÑ
оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ ÑвоиÑ
+лÑбимÑÑ
</a> — пÑоÑлÑÑ
, наÑÑоÑÑиÑ
и
желаемÑÑ
— ÑÑа
+пÑакÑика назÑваеÑÑÑ “лÑбовнаÑ
Ñазведка”. СоглаÑно ÐÐÐ, неÑколÑко
+Ñаз иÑ
ÑлиÑали в ÑÑом и наказÑвали; Ð¼Ñ Ð½Ðµ
знаем, ÑколÑко бÑло дÑÑгиÑ
+ÑлÑÑаев, когда иÑ
в ÑÑом не ÑлиÑили. Ðо ÑÑо
не должно Ð½Ð°Ñ ÑдивлÑÑÑ, поÑомÑ
+ÑÑо полиÑÐ¸Ñ Ð´Ð°Ð²Ð½Ð¾ <a
+href="http://www.sweetliberty.org/issues/privacy/lein1.htm">
полÑзÑеÑÑÑ
+Ñвоим доÑÑÑпом к запиÑÑм о номеÑаÑ
авÑомобилей, ÑÑÐ¾Ð±Ñ Ð¾ÑÑлеживаÑÑ
+пÑивлекаÑелÑнÑÑ
оÑоб</a> — пÑакÑика,
извеÑÑÐ½Ð°Ñ ÐºÐ°Ðº “пÑобиÑÑ
+номеÑ, ÑÑÐ¾Ð±Ñ Ð½Ð°Ð·Ð½Ð°ÑиÑÑ Ñвидание”.</p>
+
+<p>ÐаннÑе Ñлежки вÑегда бÑдÑÑ
иÑполÑзоваÑÑÑÑ Ð² дÑÑгиÑ
ÑелÑÑ
, даже еÑли
ÑÑо
+бÑÐ´ÐµÑ Ð·Ð°Ð¿ÑеÑено. Ðак ÑолÑко даннÑе ÑобÑанÑ
и Ñ Ð³Ð¾ÑÑдаÑÑÑва еÑÑÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ
+доÑÑÑпа к ним, оно Ð¼Ð¾Ð¶ÐµÑ Ð·Ð»Ð¾ÑпоÑÑеблÑÑÑ
ÑÑими даннÑми ÑжаÑаÑÑим обÑазом, как
+показÑваÑÑ <a
+href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">пÑимеÑÑ
+из ÐвÑопÑ</a> и <a
+href="https://en.wikipedia.org/wiki/Japanese_American_internment">СШÐ</a>.</p>
+
+<p>ТоÑалÑÐ½Ð°Ñ Ñлежка в ÑоÑеÑании Ñ
ÑаÑплÑвÑаÑÑми ÑоÑмÑлиÑовками законов
+оÑкÑÑÐ²Ð°ÐµÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑи маÑÑиÑованной оÑ
оÑÑ Ð¿ÑоÑив какой Ñгодно Ñели. ЧÑобÑ
+обезопаÑиÑÑ Ð¶ÑÑналиÑÑÐ¸ÐºÑ Ð¸ демокÑаÑиÑ, мÑ
Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¾Ð³ÑаниÑиÑÑ ÑÐ±Ð¾Ñ Ð´Ð°Ð½Ð½ÑÑ
,
+коÑоÑÑе бÑдÑÑ Ð»ÐµÐ³ÐºÐ¾ доÑÑÑпнÑ
гоÑÑдаÑÑÑвÑ.</p>
+
+<h3>СÑÐ¾Ð¹ÐºÐ°Ñ Ð·Ð°ÑиÑа лиÑной жизни должна бÑÑÑ
ÑеÑ
ниÑеÑкой</h3>
+
+<p>Фонд ÑлекÑÑоннÑÑ
ÑÑбежей и дÑÑгие
оÑганизаÑии пÑедлагаÑÑ ÑÑд ÑÑидиÑеÑкиÑ
+пÑинÑипов, ÑоÑÑавленнÑÑ
Ð´Ð»Ñ <a
+href="https://en.necessaryandproportionate.org/text">
пÑедоÑвÑаÑениÑ
+злоÑпоÑÑеблений маÑÑовой Ñлежкой</a>. Ð ÑÑи
пÑинÑÐ¸Ð¿Ñ Ð²Ñ
Ð¾Ð´Ð¸Ñ (ÑÑо жизненно
+важно) ÑÐ²Ð½Ð°Ñ ÑÑидиÑеÑÐºÐ°Ñ Ð·Ð°ÑиÑа
оÑведомиÑелей; как ÑледÑÑвие, ÑÑи пÑинÑипÑ
+бÑдÑÑ Ð°Ð´ÐµÐºÐ²Ð°ÑÐ½Ñ Ð·Ð°ÑиÑе демокÑаÑиÑеÑкиÑ
Ñвобод — еÑли иÑ
пÑимÑÑ Ð²
+полном обÑеме и бÑдÑÑ ÑоблÑдаÑÑ Ð²Ñегда и
без иÑклÑÑений.</p>
+
+<p>Ðднако Ñакой ÑÑидиÑеÑкой заÑиÑÑ Ð½Ðµ
доÑÑаÑоÑно: как показÑваÑÑ Ð½ÐµÐ´Ð°Ð²Ð½Ð¸Ðµ
+ÑобÑÑиÑ, они могÑÑ Ð±ÑÑÑ Ð¾ÑÐ¾Ð·Ð²Ð°Ð½Ñ (как Ðакон
о попÑавкаÑ
в FISA), дейÑÑвие иÑ
+Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ Ð¿ÑиоÑÑановлено, Ð½Ð°ÐºÐ¾Ð½ÐµÑ Ð¸Ñ
могÑÑ <a
+href="http://www.nytimes.com/2009/04/16/us/16nsa.html">
игноÑиÑоваÑÑ</a>.</p>
+
+<p>Ð Ñо же вÑÐµÐ¼Ñ Ð´ÐµÐ¼Ð°Ð³Ð¾Ð³Ð¸ бÑдÑÑ Ð¿ÑиводиÑÑ
обÑÑнÑе оÑговоÑки в каÑеÑÑве
+оÑнований Ð´Ð»Ñ ÑоÑалÑной Ñлежки; лÑбой
ÑеÑÑоÑиÑÑиÑеÑкий акÑ, даже еÑли в нем
+Ð¿Ð¾Ð³Ð¸Ð±Ð½ÐµÑ Ð²Ñего неÑколÑко Ñеловек, даÑÑ Ð¸Ð¼
ÑакÑÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ.</p>
+
+<p>ÐÑли огÑаниÑÐµÐ½Ð¸Ñ Ð½Ð° доÑÑÑп к даннÑм
ÑнимÑÑ, ÑÑо бÑÐ´ÐµÑ Ð²Ñе Ñавно, как еÑли бÑ
+они никогда не ÑÑÑеÑÑвовали: доÑÑе,
накопленнÑе за долгие годÑ, ÑÑÐ°Ð·Ñ ÑÑанÑÑ
+доÑÑÑÐ¿Ð½Ñ Ð´Ð»Ñ Ð·Ð»Ð¾ÑпоÑÑеблений Ñо ÑÑоÑонÑ
гоÑÑдаÑÑÑва и его агенÑов, а еÑли иÑ
+ÑобÑали компании, Ñо и Ð´Ð»Ñ ÑаÑÑнÑÑ
злоÑпоÑÑеблений Ñ Ð¸Ñ
ÑÑоÑонÑ. Ðднако еÑли
+Ð¼Ñ Ð¾ÑÑановим ÑÐ±Ð¾Ñ Ð´Ð¾ÑÑе на каждого, Ñо ÑÑиÑ
доÑÑе не бÑÐ´ÐµÑ Ð¸ не бÑдеÑ
+ÑпоÑоба ÑобÑаÑÑ Ð¸Ñ
задним ÑиÑлом. ÐовомÑ
анÑилибеÑалÑÐ½Ð¾Ð¼Ñ ÑÐµÐ¶Ð¸Ð¼Ñ Ð¿ÑиÑлоÑÑ Ð±Ñ
+ÑеализовÑваÑÑ ÑÐ»ÐµÐ¶ÐºÑ Ð·Ð°Ð½Ð¾Ð²Ð¾, и даннÑе
ÑобиÑалиÑÑ Ð±Ñ ÑолÑко наÑÐ¸Ð½Ð°Ñ Ñ ÑÑого
+моменÑа. ЧÑо каÑаеÑÑÑ Ð¿ÑиоÑÑановки
дейÑÑÐ²Ð¸Ñ Ð¸Ð»Ð¸ игноÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ ÑÑого закона,
+Ñо ÑÑа Ð¸Ð´ÐµÑ ÐµÐ´Ð²Ð° ли Ð¸Ð¼ÐµÐµÑ ÑмÑÑл.</p>
+
+<h3>Ðо-пеÑвÑÑ
, не бÑÑÑ Ð´ÑÑаками</h3>
+
+<p>ЧÑÐ¾Ð±Ñ Ñ Ð²Ð°Ñ Ð±Ñла конÑиденÑиалÑноÑÑÑ, вÑ
не Ð´Ð¾Ð»Ð¶Ð½Ñ ÐµÐµ вÑбÑаÑÑваÑÑ: заÑиÑаÑÑ
+ваÑÑ ÐºÐ¾Ð½ÑиденÑиалÑноÑÑÑ Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¿Ñежде
вÑего Ð²Ñ Ñами. Ðе ÑаÑÑказÑвайÑе
+компании, Ñакой как Facebook, ниÑего Ñакого,
ÑÑо Ð²Ñ Ð½Ðµ пеÑедали Ð±Ñ Ð´Ð»Ñ
+пÑбликаÑии в газеÑе. Ðе ÑаÑÑказÑвайÑе
компании, Ñакой как Facebook, о ÑвоиÑ
+знакомÑÑ
ниÑего Ñакого, ÑÑо они не Ñ
оÑели
Ð±Ñ Ð¾Ð¿ÑбликоваÑÑ Ð² газеÑе. РеÑе
+лÑÑÑе не бÑÑÑ Ð¾Ð´Ð½Ð¸Ð¼ из полÑзоваÑелей Facebook
вообÑе.</p>
+
+<p>Ðикогда не пеÑедавайÑе ни на какой ÑайÑ
полного ÑпиÑка адÑеÑов ÑлекÑÑонной
+поÑÑÑ Ð¸ номеÑов ÑелеÑонов лÑдей, Ñ
коÑоÑÑми Ð²Ñ Ð¾Ð±ÑаеÑеÑÑ. ÐеÑжиÑе Ñвои
+даннÑе Ñ ÑебÑ; не Ñ
ÑаниÑе Ñвои даннÑе на
“Ñдобном” ÑеÑвеÑе
+компании. Ðднако вполне безопаÑно ввеÑÑÑÑ
ÑезеÑвнÑе копии даннÑÑ
+коммеÑÑеÑкой ÑлÑжбе пÑи ÑÑловии, ÑÑо вÑ
заÑиÑÑовали ÑÑи даннÑе, в Ñом ÑиÑле
+имена Ñайлов, на Ñвоем компÑÑÑеÑе Ñ
помоÑÑÑ ÑвободнÑÑ
пÑогÑамм пеÑед Ñем,
+как оÑпÑавлÑÑÑ Ð¸Ñ
на ÑеÑвеÑ.</p>
+
+<p>Ради конÑиденÑиалÑноÑÑи Ð²Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ
избегаÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм, поÑколÑкÑ
+вледÑÑвие пеÑедаÑи дÑÑгим конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
ваÑими вÑÑиÑлениÑми, они, <a
+href="/philosophy/proprietary-surveillance.html">веÑоÑÑно,
ÑпионÑÑ Ð·Ð°
+вами</a>. ÐзбегайÑе <a
+href="/philosophy/who-does-that-server-really-serve.html">
ÑÑлÑг-замен
+пÑогÑамм</a>, а Ñакже пеÑедаÑи дÑÑгим
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ваÑими вÑÑиÑлениÑми, ÑÑо
+ÑÑебÑÐµÑ Ð¾Ñ Ð²Ð°Ñ Ð¿ÑедоÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð²ÑеÑ
обÑабаÑÑваемÑÑ
даннÑÑ
на ÑеÑвеÑ.</p>
+
+<p>Ðднако даже Ñамой бдиÑелÑной ÑамозаÑиÑÑ
недоÑÑаÑоÑно, ÑÑÐ¾Ð±Ñ Ð·Ð°ÑиÑиÑÑ Ð²Ð°ÑÑ
+конÑиденÑиалÑноÑÑÑ Ð½Ð° ÑиÑÑемаÑ
, коÑоÑÑе
вам не пÑинадлежаÑ. Ðогда мÑ
+обÑаемÑÑ Ñ Ð´ÑÑгими или пеÑедвигаемÑÑ Ð¿Ð¾
гоÑодÑ, наÑа конÑиденÑиалÑноÑÑÑ
+завиÑÐ¸Ñ Ð¾Ñ ÑложивÑейÑÑ Ð² обÑеÑÑве
пÑакÑики.</p>
+
+<h3>ÐаждÑÑ ÑиÑÑÐµÐ¼Ñ Ð½Ñжно пÑоекÑиÑоваÑÑ Ñ
ÑÑеÑом конÑиденÑиалÑноÑÑи</h3>
+
+<p>ÐÑли Ð¼Ñ Ð½Ðµ Ñ
оÑим жиÑÑ Ð² обÑеÑÑве
ÑоÑалÑной Ñлежки, Ð¼Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ ÑаÑÑмаÑÑиваÑÑ
+ÑÐ»ÐµÐ¶ÐºÑ ÐºÐ°Ðº Ñвоего Ñода ÑоÑиалÑное
загÑÑзнение и огÑаниÑиваÑÑ Ð²ÐºÐ»Ð°Ð´ в ÑлежкÑ
+каждой новой ÑиÑÑовой ÑиÑÑÐµÐ¼Ñ ÑоÑно Ñак
же, как Ð¼Ñ Ð¾Ð³ÑаниÑиваем воздейÑÑвие
+ÑизиÑеÑкиÑ
ÑооÑÑжений на окÑÑжаÑÑÑÑ
ÑÑедÑ.</p>
+
+<p>ÐапÑимеÑ: “инÑеллекÑÑалÑнÑе”
ÑлекÑÑоÑÑеÑÑики ÑаÑÑ
валиваÑÑ Ð·Ð° Ñо,
+ÑÑо они оÑÑÑлаÑÑ Ð² ÑнеÑгеÑиÑеÑкÑÑ
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð¼Ð¾Ð¼ÐµÐ½ÑнÑе даннÑе о ÑаÑÑ
оде
+ÑлекÑÑоÑнеÑгии каждÑм полÑзоваÑелем, в
Ñом ÑиÑле о Ñом, как ÑаÑÑ
од
+ÑооÑноÑиÑÑÑ Ñ ÑаÑÑ
одом ÑÑеднего
полÑзоваÑелÑ. ÐÑо Ñеализовано на оÑнове
+обÑей Ñлежки, но никакой Ñлежки Ð´Ð»Ñ ÑÑого
не нÑжно. ÐнеÑгеÑиÑеÑкой компании
+бÑло Ð±Ñ Ð½ÐµÑÑÑдно вÑÑÑиÑÑваÑÑ ÑÑедний ÑаÑÑ
од в жилом Ñайоне, Ð´ÐµÐ»Ñ Ð¾Ð±Ñий
+ÑаÑÑ
од на колиÑеÑÑво абоненÑов, и вÑÑÑлаÑÑ
полÑÑенное знаÑение на
+ÑÑеÑÑики. ÐлекÑÑоÑÑеÑÑик каждого клиенÑа
мог Ð±Ñ ÑÑавниваÑÑ ÑÑо Ñо Ñвоими
+измеÑениÑми за нÑжнÑй пеÑиод Ñо ÑÑедним
гÑаÑиком ÑаÑÑ
ода за ÑÑÐ¾Ñ Ð¿ÐµÑиод. То
+же Ñамое, ÑолÑко без Ñлежки!</p>
+
+<p>Ðам надо вÑÑÑаиваÑÑ ÑакÑÑ
конÑиденÑиалÑноÑÑÑ Ð²Ð¾ вÑе наÑи ÑиÑÑовÑе
ÑиÑÑемÑ.</p>
+
+<h3>ÐеÑа пÑоÑив ÑбоÑа даннÑÑ
: оÑÑавлÑÑÑ Ð¸Ñ
ÑаÑÑÑедоÑоÑеннÑми</h3>
+
+<p><a name="dispersal"></a>Ðдин из ÑпоÑобов ÑделаÑÑ
наблÑдение безопаÑнÑм длÑ
+конÑиденÑиалÑноÑÑи — оÑÑавлÑÑÑ
даннÑе ÑаÑÑÑедоÑоÑеннÑми, без
+Ñдобного доÑÑÑпа. СÑаÑомоднÑе камеÑÑ
видеонаблÑÐ´ÐµÐ½Ð¸Ñ Ð½Ðµ пÑедÑÑавлÑли ÑгÑозÑ
+конÑиденÑиалÑноÑÑи. ÐапиÑи велиÑÑ Ð½Ð°
меÑÑе и Ñ
ÑанилиÑÑ Ð½Ðµ долÑÑе неÑколÑкиÑ
+неделÑ. Ðз-за неÑдобÑÑв доÑÑÑпа к ÑÑим
запиÑÑм к ним никогда не обÑаÑалиÑÑ
+помногÑ; запиÑи поднимали ÑолÑко в меÑÑаÑ
,
где кÑо-Ñо ÑообÑал о
+пÑеÑÑÑплении. ÐÑло ÑизиÑеÑки невозможно
ÑобиÑаÑÑ ÐºÐ°Ð¶Ð´Ñй Ð´ÐµÐ½Ñ Ð¼Ð¸Ð»Ð»Ð¸Ð¾Ð½Ñ Ð»ÐµÐ½Ñ,
+а заÑем пÑоÑмаÑÑиваÑÑ Ð¸Ð»Ð¸ копиÑоваÑÑ Ð¸Ñ
.</p>
+
+<p>Ð¡ÐµÐ³Ð¾Ð´Ð½Ñ ÐºÐ°Ð¼ÐµÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð½Ð°Ð±Ð»ÑÐ´ÐµÐ½Ð¸Ñ ÑÑали
камеÑами Ñлежки: они подклÑÑÐµÐ½Ñ Ðº
+ÐнÑеÑнеÑÑ, Ñак ÑÑо запиÑи можно ÑобиÑаÑÑ Ð²
инÑоÑмаÑионном ÑенÑÑе и Ñ
ÑаниÑÑ
+веÑно. ÐÑо Ñже опаÑно, но положение бÑÐ´ÐµÑ ÑÑ
ÑдÑаÑÑÑÑ. ÐÑогÑеÑÑ Ð²
+ÑаÑпознавании Ð»Ð¸Ñ Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑивеÑÑи к ÑомÑ,
ÑÑо в один пÑекÑаÑнÑй денÑ
+подозÑеваемÑÑ
жÑÑналиÑÑов ÑмогÑÑ
поÑÑоÑнно оÑÑлеживаÑÑ Ð½Ð° ÑлиÑе, ÑÑобÑ
+ÑвидеÑÑ, Ñ ÐºÐµÐ¼ они обÑаÑÑÑÑ.</p>
+
+<p>ÐамеÑÑ, подклÑÑеннÑе к ÐнÑеÑнеÑÑ, ÑаÑÑо
заÑиÑÐµÐ½Ñ Ð² ÑиÑÑовом оÑноÑении
+доволÑно-Ñаки погано, Ñак ÑÑо <a
+href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">
+кÑо Ñгодно мог Ð±Ñ Ð¿ÑоÑмаÑÑиваÑÑ Ñо, на ÑÑо
напÑавлена камеÑа</a>. ЧÑобÑ
+воÑÑÑановиÑÑ ÐºÐ¾Ð½ÑиденÑиалÑноÑÑÑ, нам надо
запÑеÑиÑÑ Ð¿Ð¾Ð»Ñзование камеÑами,
+подклÑÑеннÑми к ÐнÑеÑнеÑÑ, когда они
напÑÐ°Ð²Ð»ÐµÐ½Ñ Ð½Ð° обÑеÑÑвеннÑе меÑÑа, еÑли
+ÑолÑко ÑÑи камеÑÑ Ð½Ðµ ÑÑÑÐ°Ð½Ð¾Ð²Ð»ÐµÐ½Ñ Ð½Ð°
Ñеловеке. ÐаждÑй должен бÑÑÑ Ð²Ð¾Ð»ÐµÐ½
+пÑбликоваÑÑ Ð¸Ð½Ð¾Ð³Ð´Ð° ÑоÑо- и видеозапиÑи, но
ÑиÑÑемаÑиÑеÑкое накопление ÑакиÑ
+даннÑÑ
в ÐнÑеÑнеÑе должно
огÑаниÑиваÑÑÑÑ.</p>
+
+<h3>ÐеÑÑ Ð¿ÑоÑив коммеÑÑеÑкой Ñлежки в
ÐнÑеÑнеÑе</h3>
+
+<p>ÐолÑÑинÑÑво ÑобиÑаемÑÑ
даннÑÑ
возникаеÑ
в ÑезÑлÑÑаÑе ÑобÑÑвенной ÑиÑÑовой
+деÑÑелÑноÑÑи лÑдей. ÐбÑÑно даннÑе ÑнаÑала
ÑобиÑаÑÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñми. Ðо когда
+ÑеÑÑ Ð¸Ð´ÐµÑ Ð¾Ð± ÑгÑозе конÑиденÑиалÑноÑÑи и
демокÑаÑии, ÑовеÑÑенно безÑазлиÑно,
+пÑоводиÑÑÑ Ð»Ð¸ Ñлежка гоÑÑдаÑÑÑвом
напÑÑмÑÑ Ð¸Ð»Ð¸ ее поÑÑÑаÑÑ Ð¿ÑедпÑиÑÑиÑ,
+поÑÐ¾Ð¼Ñ ÑÑо даннÑе, коÑоÑÑе ÑобиÑаÑÑ
компании, ÑиÑÑемаÑиÑеÑки доÑÑÑпнÑ
+гоÑÑдаÑÑÑвÑ.</p>
+
+<p>ÐÐÐ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ PRISM <a
+href="https://www.commondreams.org/headline/2013/08/23-2"> пÑоникло в
базÑ
+даннÑÑ
многиÑ
кÑÑпнÑÑ
коÑпоÑаÑий в
облаÑÑи ÐнÑеÑнеÑа</a>. AT&T ÑоÑ
ÑанÑеÑ
+вÑе Ñвои запиÑи о ÑелеÑоннÑÑ
пеÑеговоÑаÑ
Ñ 1987 года и <a
+href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">
+пÑедоÑÑавлÑÐµÑ Ð¸Ñ
DEA</a> Ð´Ð»Ñ Ð¿Ð¾Ð¸Ñка по
запÑоÑÑ. СÑÑого говоÑÑ, пÑавÑÑий
+Ñежим СШРне Ð²Ð»Ð°Ð´ÐµÐµÑ ÑÑими даннÑми, но
пÑакÑиÑеÑки ÑазниÑÑ Ð½ÐµÑ Ð½Ð¸ÐºÐ°ÐºÐ¾Ð¹.</p>
+
+<p>СледоваÑелÑно, в ÑелÑÑ
обеÑпеÑениÑ
безопаÑноÑÑи жÑÑналиÑÑики и демокÑаÑии
+ÑÑебÑеÑÑÑ ÑокÑаÑиÑÑ Ð¾Ð±Ñем даннÑÑ
,
ÑобиÑаемÑÑ
о лÑдÑÑ
лÑбÑми оÑганизаÑиÑми, а
+не ÑолÑко гоÑÑдаÑÑÑвом. ÐÑ Ð´Ð¾Ð»Ð¶Ð½Ñ
пеÑепÑоекÑиÑоваÑÑ ÑиÑÑовÑе ÑиÑÑÐµÐ¼Ñ Ñак,
+ÑÑÐ¾Ð±Ñ Ð¾Ð½Ð¸ не ÑобиÑали даннÑе о ÑвоиÑ
полÑзоваÑелÑÑ
. ÐÑли им ÑÑебÑÑÑÑÑ
+ÑиÑÑовÑе даннÑе о наÑиÑ
опеÑаÑиÑÑ
, им не
должно бÑÑÑ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÐµÐ½Ð¾ Ñ
ÑаниÑÑ Ð¸Ñ
+долÑÑе, Ñем коÑоÑкое вÑÐµÐ¼Ñ ÑвеÑÑ
Ñого, ÑÑо
пÑинÑипиалÑно необÑ
одимо в иÑ
+ÑабоÑе Ñ Ð½Ð°Ð¼Ð¸.</p>
+
+<p>Ðдна из побÑдиÑелÑнÑÑ
пÑиÑин
ÑовÑеменного ÑÑÐ¾Ð²Ð½Ñ Ñлежки в ÐнÑеÑнеÑе
+заклÑÑаеÑÑÑ Ð² Ñом, ÑÑо ÑайÑÑ ÑинанÑиÑÑÑÑÑÑ
из ÑекламÑ, оÑнованной на
+оÑÑлеживании деÑÑелÑноÑÑи и пÑиÑÑÑаÑÑий
полÑзоваÑелей. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ ÑÐµÐºÐ»Ð°Ð¼Ñ Ð½Ðµ
+пÑоÑÑо Ñем-Ñо надоедливÑм, на ÑÑо Ð¼Ñ Ð¼Ð¾Ð³Ð»Ð¸
Ð±Ñ Ð½Ð°ÑÑиÑÑÑÑ Ð½Ðµ обÑаÑаÑÑ
+вниманиÑ,— ÑÑо пÑевÑаÑÐ°ÐµÑ ÐµÐµ в ÑиÑÑемÑ
Ñлежки, коÑоÑÐ°Ñ Ð²ÑÐµÐ´Ð¸Ñ Ð½Ð°Ð¼
+незавиÑимо Ð¾Ñ Ñого, знаем Ð¼Ñ Ð¾Ð± ÑÑом или
неÑ. СиÑÑÐµÐ¼Ñ Ð¿Ð¾ÐºÑпок по ÐнÑеÑнеÑÑ
+Ñакже оÑÑлеживаÑÑ ÑвоиÑ
полÑзоваÑелей. Ð
вÑем нам извеÑÑно, ÑÑо
+“пÑавила конÑиденÑиалÑноÑÑи”
пÑедÑÑавлÑÑÑ Ñобой ÑкоÑее
+опÑÐ°Ð²Ð´Ð°Ð½Ð¸Ñ Ð´Ð»Ñ Ð½Ð°ÑÑÑениÑ
конÑиденÑиалÑноÑÑи, Ñем намеÑениÑ
ÑоблÑдаÑÑ ÐµÐµ.</p>
+
+<p>ÐÑ Ð¼Ð¾Ð³Ð»Ð¸ Ð±Ñ ÑÑÑÑаниÑÑ Ð¾Ð±Ðµ пÑоблемÑ
введением ÑиÑÑÐµÐ¼Ñ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½ÑÑ
+плаÑежей — Ñо еÑÑÑ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½ÑÑ
Ð´Ð»Ñ ÑеÑ
,
кÑо плаÑÐ¸Ñ (Ð¼Ñ Ð½Ðµ Ñ
оÑим,
+ÑÑÐ¾Ð±Ñ ÑоÑ, ÐºÐ¾Ð¼Ñ Ð¿Ð»Ð°ÑÑÑ, Ñвиливал оÑ
налогов). <a
+href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">
+СиÑÑема Bitcoin не анонимна</a>, но ÑеÑ
ника <a
+href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"> ÑиÑÑовой
+налиÑноÑÑи впеÑвÑе бÑла ÑазÑабоÑана в
воÑÑмидеÑÑÑÑе Ð³Ð¾Ð´Ñ XX века</a>;
+нам недоÑÑÐ°ÐµÑ ÑолÑко пÑедпÑиÑÑий, коÑоÑÑе
занималиÑÑ Ð±Ñ ÑÑим, и гоÑÑдаÑÑÑва,
+коÑоÑое не пÑепÑÑÑÑвовало Ð±Ñ ÑÑомÑ.</p>
+
+<p>ÐополниÑелÑнÑÑ ÑгÑÐ¾Ð·Ñ ÑÐ±Ð¾Ñ Ð»Ð¸ÑнÑÑ
даннÑÑ
ÑайÑами пÑедÑÑавлÑÐµÑ Ð¿Ð¾ÑомÑ, ÑÑо
+взломÑики могÑÑ Ð¿ÑоникаÑÑ Ð½Ð° ÑеÑвеÑÑ,
бÑаÑÑ Ð´Ð°Ð½Ð½Ñе и злоÑпоÑÑеблÑÑÑ Ð¸Ð¼Ð¸. Ð
+Ñом ÑиÑле даннÑми о кÑедиÑнÑÑ
каÑÑаÑ
клиенÑов. СиÑÑема анонимнÑÑ
плаÑежей
+поконÑила Ð±Ñ Ñ ÑÑой ÑгÑозой: бÑеÑÑ Ð² заÑиÑе
ÑайÑа не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð²ÑедиÑÑ Ð²Ð°Ð¼,
+когда ÑÐ°Ð¹Ñ Ð½Ð¸Ñего о Ð²Ð°Ñ Ð½Ðµ знаеÑ.</p>
+
+<h3>ÐеÑÑ Ð¿ÑоÑив Ñлежки за пеÑедвижениÑми</h3>
+
+<p>ÐÑ Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¿ÑеобÑазоваÑÑ ÑиÑÑовÑе
ÑиÑÑÐµÐ¼Ñ ÑбоÑа плаÑежей в анонимнÑе
+(напÑимеÑ, Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑиÑÑовой налиÑноÑÑи).
СиÑÑÐµÐ¼Ñ ÑаÑÐ¿Ð¾Ð·Ð½Ð°Ð²Ð°Ð½Ð¸Ñ Ð½Ð¾Ð¼ÐµÑов
+маÑин ÑаÑпознаÑÑ Ð²Ñе номеÑа, и <a
+href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">
+даннÑе могÑÑ Ñ
ÑаниÑÑÑÑ Ð½ÐµÐ¾Ð¿Ñеделенно
долго</a>; закон должен ÑÑебоваÑÑ,
+ÑÑÐ¾Ð±Ñ Ð¾ÑмеÑалиÑÑ Ð¸ запиÑÑвалиÑÑ Ð½Ð¾Ð¼ÐµÑа
ÑолÑко ÑеÑ
авÑомобилей, коÑоÑÑе
+наÑ
одÑÑÑÑ Ð² ÑозÑÑке. Ðенее безопаÑной
алÑÑеÑнаÑивой бÑло Ð±Ñ Ð¾ÑмеÑаÑÑ Ð²Ñе
+авÑомобили на меÑÑе, но ÑолÑко на
неÑколÑко дней, пÑиÑем полнÑе даннÑе не
+Ð´Ð¾Ð»Ð¶Ð½Ñ Ð±ÑÑÑ Ð´Ð¾ÑÑÑÐ¿Ð½Ñ Ð¿Ð¾ ÐнÑеÑнеÑÑ; доÑÑÑп
к даннÑм должен бÑÑÑ Ð¾Ð³ÑаниÑен
+ÑпиÑком номеÑов авÑомобилей в ÑозÑÑке.</p>
+
+<p>“ÐеÑполеÑнÑй” ÑпиÑок СШРнÑжно
ÑпÑаздниÑÑ, поÑÐ¾Ð¼Ñ ÑÑо ÑÑо <a
+href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">
+наказание без ÑÑда</a>.</p>
+
+<p>ÐопÑÑÑимо веÑÑи ÑпиÑок лÑдей, лиÑноÑÑÑ Ð¸
багаж коÑоÑÑÑ
доÑмаÑÑиваеÑÑÑ Ð±Ð¾Ð»ÐµÐµ
+ÑÑаÑелÑно, а анонимнÑÑ
паÑÑажиÑов на
внÑÑÑенниÑ
линиÑÑ
можно бÑло Ð±Ñ ÑÑиÑаÑÑ
+вклÑÑеннÑми в ÑÑÐ¾Ñ ÑпиÑок. Также допÑÑÑимо
запÑеÑаÑÑ Ð½ÐµÐ³Ñажданам, еÑли им
+вообÑе не ÑазÑеÑен вÑезд в ÑÑÑанÑ, поÑадкÑ
на ÑейÑÑ Ñ Ð¿Ð¾Ñадками в ÑÑой
+ÑÑÑане. ÐÑого должно бÑÑÑ Ð´Ð¾ÑÑаÑоÑно длÑ
вÑеÑ
законнÑÑ
Ñелей.</p>
+
+<p>Ðо многиÑ
ÑиÑÑемаÑ
пÑодажи билеÑов длÑ
плаÑежей пÑименÑÑÑÑÑ Ñазного Ñода
+ÑлекÑÑоннÑе каÑÑÑ. ÐÑи ÑиÑÑемÑ
накапливаÑÑ Ð»Ð¸ÑнÑе даннÑе: еÑли Ð²Ñ Ð¾Ð´Ð½Ð°Ð¶Ð´Ñ
по
+оÑибке оплаÑили Ð¿Ð¾ÐµÐ·Ð´ÐºÑ Ñем-Ñо кÑоме
налиÑнÑÑ
, они навÑегда ÑвÑзÑваÑÑ
+ÑлекÑÑоннÑÑ ÐºÐ°ÑÑÑ Ñ Ð²Ð°Ñим именем. Ðолее
Ñого, они запиÑÑваÑÑ Ð²Ñе поездки,
+ÑвÑзаннÑе Ñ ÐºÐ°Ð¶Ð´Ð¾Ð¹ каÑÑой. ÐÑе ÑÑо вмеÑÑе
ÑоÑÑавлÑÐµÑ ÑиÑÑÐµÐ¼Ñ Ð¼Ð°ÑÑовой
+Ñлежки. Ð¡Ð±Ð¾Ñ ÑÑиÑ
даннÑÑ
нÑжно ÑокÑаÑиÑÑ.</p>
+
+<p>СлÑÐ¶Ð±Ñ Ð½Ð°Ð²Ð¸Ð³Ð°Ñии ведÑÑ ÑлежкÑ: компÑÑÑеÑ
полÑзоваÑÐµÐ»Ñ Ð¿ÐµÑÐµÐ´Ð°ÐµÑ Ð²
+каÑÑогÑаÑиÑеÑкÑÑ ÑлÑÐ¶Ð±Ñ ÐºÐ¾Ð¾ÑдинаÑÑ
полÑзоваÑÐµÐ»Ñ Ð¸ меÑÑо, кÑда он
+напÑавлÑеÑÑÑ; поÑле ÑÑого ÑеÑвеÑ
опÑеделÑÐµÑ Ð¼Ð°ÑÑÑÑÑ Ð¸ возвÑаÑÐ°ÐµÑ ÐµÐ³Ð¾ на
+компÑÑÑÐµÑ Ð¿Ð¾Ð»ÑзоваÑелÑ, где ÑÑÐ¾Ñ Ð¼Ð°ÑÑÑÑÑ
оÑобÑажаеÑÑÑ. РнаÑÑоÑÑее вÑемÑ
+ÑеÑвеÑ, веÑоÑÑно, запиÑÑÐ²Ð°ÐµÑ ÐºÐ¾Ð¾ÑдинаÑÑ
полÑзоваÑелÑ, поÑколÑÐºÑ Ð½Ð¸ÑÑо ÑÑомÑ
+не пÑепÑÑÑÑвÑеÑ. Ð ÑÑой Ñлежке неÑ
пÑинÑипиалÑной необÑ
одимоÑÑи, и ее можно
+избежаÑÑ, пеÑепÑоекÑиÑовав ÑиÑÑемÑ:
ÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° компÑÑÑеÑе
+полÑзоваÑÐµÐ»Ñ Ð¼Ð¾Ð³Ð»Ð¸ Ð±Ñ Ð¿Ð¾Ð»ÑÑаÑÑ
каÑÑогÑаÑиÑеÑкие даннÑе пÑилегаÑÑиÑ
облаÑÑей
+(еÑли они еÑе не полÑÑенÑ), пÑокладÑваÑÑ
маÑÑÑÑÑ Ð¸ оÑобÑажаÑÑ ÐµÐ³Ð¾, не
+пеÑÐµÐ´Ð°Ð²Ð°Ñ Ð½Ð¸ÐºÑда меÑÑоположениÑ
полÑзоваÑÐµÐ»Ñ Ð¸ пÑÐ½ÐºÑ Ð½Ð°Ð·Ð½Ð°ÑениÑ.</p>
+
+<p>СиÑÑÐµÐ¼Ñ Ð¿ÑокаÑа велоÑипедов и Ñ.п. можно
ÑпÑоекÑиÑоваÑÑ Ñак, ÑÑÐ¾Ð±Ñ Ð»Ð¸ÑноÑÑÑ
+аÑендаÑоÑа бÑла извеÑÑна ÑолÑко внÑÑÑи
ÑÑанÑии, на коÑоÑой взÑÑа единиÑа
+ÑеÑ
ники. СиÑÑема инÑоÑмиÑовала Ð±Ñ Ð²Ñе
ÑÑанÑии, ÑÑо единиÑа
+“занÑÑа”, Ñак ÑÑо когда полÑзоваÑелÑ
возвÑаÑÐ°ÐµÑ ÐµÐµ на лÑбой
+ÑÑанÑии (вообÑе говоÑÑ, оÑлиÑной Ð¾Ñ Ñой,
где ее взÑли), ÑÑа ÑÑанÑÐ¸Ñ Ð±ÑдеÑ
+знаÑÑ, где и когда взÑÑа ÑÑа единиÑа.
СиÑÑема пÑоинÑоÑмиÑÑÐµÑ Ð´ÑÑгÑÑ ÑÑанÑиÑ,
+ÑÑо единиÑа болÑÑе не “занÑÑа”. Ðна
ÑоÑÑÐ°Ð²Ð¸Ñ Ñакже ÑÑеÑ
+полÑзоваÑÐµÐ»Ñ Ð¸ вÑÑÐ»ÐµÑ ÐµÐ³Ð¾ (ÑеÑез некоÑоÑое
ÑлÑÑайное ÑиÑло минÑÑ) в ÑенÑÑ Ð¿Ð¾
+колÑÑÑ ÑÑанÑий, Ñак ÑÑо в ÑенÑÑе не бÑдеÑ
извеÑÑно, оÑкÑда пÑиÑел ÑÑеÑ. Ðак
+ÑолÑко ÑÑо пÑоизойдеÑ, ÑÑанÑÐ¸Ñ Ð²Ð¾Ð·Ð²ÑаÑа
полноÑÑÑÑ Ð·Ð°Ð±ÑÐ´ÐµÑ Ð¾Ð± ÑÑой
+опеÑаÑии. ÐÑли единиÑа оÑÑаеÑÑÑ
“занÑÑой” ÑлиÑком долго,
+ÑÑанÑиÑ, на коÑоÑой ее взÑли, можеÑ
пÑоинÑоÑмиÑоваÑÑ ÑенÑÑ; в ÑÑом ÑлÑÑае
+она могла Ð±Ñ Ð½ÐµÐ¼ÐµÐ´Ð»ÐµÐ½Ð½Ð¾ ÑообÑиÑÑ Ð¾
лиÑноÑÑи Ñого, кÑо взÑл ÑÑÑ ÐµÐ´Ð¸Ð½Ð¸ÑÑ.</p>
+
+<h3>ÐеÑÑ Ð¿ÑоÑив коммÑникаÑионнÑÑ
доÑÑе</h3>
+
+<p>ÐоÑÑавÑики ÑÑлÑг ÐнÑеÑнеÑа и ÑелеÑоннÑе
компании Ñ
ÑанÑÑ Ð¾Ð±ÑиÑнÑе ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾
+конÑакÑаÑ
ÑвоиÑ
полÑзоваÑелей (пÑоÑмоÑÑ
ÑÑÑÐ°Ð½Ð¸Ñ ÐнÑеÑнеÑа, ÑелеÑоннÑе вÑзовÑ
+и Ñ.д.). ÐÐ»Ñ ÑоÑовÑÑ
ÑелеÑонов они <a
+href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">
+запиÑÑваÑÑ Ñакже ÑизиÑеÑкие кооÑдинаÑÑ
полÑзоваÑелÑ</a>. Ðни Ñ
ÑанÑÑ ÑÑи
+доÑÑе длиÑелÑное вÑемÑ: в ÑлÑÑае
AT&T — ÑвÑÑе ÑÑидÑаÑи леÑ. Ð
+ÑкоÑо они бÑдÑÑ <a
+href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">
+запиÑÑваÑÑ Ð´Ð°Ð¶Ðµ ÑизиологиÑеÑкие пÑоÑеÑÑÑ
полÑзоваÑелÑ</a>. ÐказÑваеÑÑÑ, <a
+href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">
+ÐгенÑÑÑво наÑионалÑной безопаÑноÑÑи
ÑобиÑÐ°ÐµÑ Ð´Ð°Ð½Ð½Ñе о меÑÑоположении ÑоÑовÑÑ
+ÑелеÑонов</a> в маÑÑовÑÑ
колиÑеÑÑваÑ
.</p>
+
+<p>ÐонÑидениÑалÑÐ½Ð°Ñ ÑвÑÐ·Ñ Ð½ÐµÐ²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð°,
когда ÑиÑÑÐµÐ¼Ñ ÑоздаÑÑ Ñакие доÑÑе. Так
+ÑÑо Ñ
Ñанение иÑ
должно бÑÑÑ Ð½ÐµÐ·Ð°ÐºÐ¾Ð½Ð½Ð¾.
ÐоÑÑавÑикам ÑÑлÑг ÐнÑеÑнеÑа и
+ÑелеÑоннÑм компаниÑм не должно бÑÑÑ
позволено Ñ
ÑаниÑÑ ÑÑи ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ ÑлиÑком
+долго, еÑли ÑолÑко наблÑдение за
опÑеделеннÑм лиÑом не ÑÑÑановлено в
+ÑÑдебном поÑÑдке.</p>
+
+<p>ÐÑой меÑÑ Ð½Ðµ вполне доÑÑаÑоÑно,
поÑколÑÐºÑ ÐµÐµ пÑименение ÑизиÑеÑки не
меÑаеÑ
+гоÑÑдаÑÑÑÐ²Ñ ÑобиÑаÑÑ Ð²Ñе ÑведениÑ
непоÑÑедÑÑвенно в Ð¼Ð¾Ð¼ÐµÐ½Ñ Ð¸Ñ
+Ð²Ð¾Ð·Ð½Ð¸ÐºÐ½Ð¾Ð²ÐµÐ½Ð¸Ñ — а именно ÑÑо <a
+href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">
+в СШРделаÑÑ Ñ Ð½ÐµÐºÐ¾ÑоÑÑми или даже вÑеми
ÑелеÑоннÑми компаниÑми</a>. Ðам
+пÑиÑлоÑÑ Ð±Ñ ÑаÑÑÑиÑÑваÑÑ Ð½Ð° ÑоблÑдение
закона. Ðднако ÑÑо бÑло Ð±Ñ Ð»ÑÑÑе
+нÑнеÑней ÑиÑÑаÑии, в коÑоÑой
ÑооÑвеÑÑÑвÑÑÑий закон (PATRIOT) ÑвнÑм обÑазом
+не запÑеÑÐ°ÐµÑ ÑакÑÑ Ð¿ÑакÑикÑ. ÐÑоме Ñого,
еÑли Ð±Ñ Ð³Ð¾ÑÑдаÑÑÑво Ñнова ввело
+Ñакого Ñода ÑлежкÑ, оно не полÑÑило бÑ
даннÑе о ÑелеÑоннÑÑ
пеÑеговоÑаÑ
+каждого, пÑоведеннÑÑ
до ÑÑого вÑемени.</p>
+
+<h3>Ðо иногда Ñлежка необÑ
одима</h3>
+
+<p>ÐÐ»Ñ ÑозÑÑка пÑеÑÑÑпников гоÑÑдаÑÑÑвÑ
необÑ
одима возможноÑÑÑ ÑаÑÑледоваÑÑ
+конкÑеÑнÑе пÑеÑÑÑÐ¿Ð»ÐµÐ½Ð¸Ñ Ð¸Ð»Ð¸ конкÑеÑнÑе
покÑÑÐµÐ½Ð¸Ñ Ð¿Ð¾ оÑдеÑÑ Ð¸Ð· ÑÑда. С
+пÑиÑ
одом ÐнÑеÑнеÑа полномоÑие
пÑоÑлÑÑиваÑÑ ÑелеÑоннÑе пеÑеговоÑÑ
еÑÑеÑÑвенно
+ÑаÑÑиÑÑеÑÑÑ Ð½Ð° полномоÑие подклÑÑаÑÑÑÑ Ðº
ÑоединениÑм по ÐнÑеÑнеÑÑ. ÐÑими
+полномоÑиÑми легко злоÑпоÑÑеблÑÑÑ Ð²
полиÑиÑеÑкиÑ
ÑелÑÑ
, но они необÑ
одимÑ. Ð
+ÑÑаÑÑÑÑ, ÑÑо не Ð´Ð°ÐµÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑи наÑ
одиÑÑ
оÑведомиÑелей задним ÑиÑлом.</p>
+
+<p>ÐиÑа Ñ Ð¾ÑобÑми полномоÑиÑми, вÑданнÑми
гоÑÑдаÑÑÑвом, Ñакие как ÑабоÑники
+полиÑии, ÑÑÑаÑиваÑÑ Ñвое пÑаво на
конÑиденÑиалÑноÑÑÑ, и за ними должно
+веÑÑиÑÑ Ð½Ð°Ð±Ð»Ñдение. (Ð Ñамом деле, в
полиÑейÑком жаÑгоне еÑÑÑ Ð¾Ñобое
+вÑÑажение, “<a
+href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">даваÑÑ
+лжеÑвидеÑелÑÑкие показаниÑ</a>”,
поÑколÑÐºÑ Ð¾Ð½Ð¸ Ñо и дело ÑÑим
+занимаÑÑÑÑ, оÑобенно в оÑноÑении
пÑоÑеÑÑÑÑÑиÑ
и <a
+href="http://photographyisnotacrime.com/"> ÑоÑогÑаÑов</a>.) Ð
одном гоÑоде в
+ÐалиÑоÑнии бÑло введено обÑзаÑелÑное
поÑÑоÑнное ноÑение видеокамеÑ
+полиÑейÑкими, и обнаÑÑжилоÑÑ, ÑÑо <a
+href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">
+пÑименение ÑÐ¸Ð»Ñ Ð¿Ð¾Ð»Ð¸ÑейÑкими ÑокÑаÑилоÑÑ
на 60%</a>. ACLU поддеÑÐ¶Ð¸Ð²Ð°ÐµÑ ÑÑо.</p>
+
+<p><a
+href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">
+ÐоÑпоÑаÑии — не лÑди, Ñ Ð½Ð¸Ñ
не должно
бÑÑÑ Ð¿Ñав
+Ñеловека</a>. Ðполне законно ÑÑебоваÑÑ Ð¾Ñ
пÑедпÑиÑÑий пÑбликаÑии деÑалей
+пÑоÑеÑÑов, коÑоÑÑе могли Ð±Ñ Ð¿Ð¾Ð²Ð»ÐµÑÑ Ð·Ð°
Ñобой опаÑноÑÑи в Ñ
имиÑеÑком,
+биологиÑеÑком, ÑдеÑном, ÑинанÑовом,
вÑÑиÑлиÑелÑном (напÑ., <a
+href="http://DefectiveByDesign.org"> ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми</a>)
+или полиÑиÑеÑком (напÑ., заказ полиÑиÑеÑкиÑ
пÑоекÑов) оÑноÑении —
+пÑбликаÑии наÑÑолÑко подÑобной, наÑколÑко
ÑÑо ÑÑебÑÐµÑ Ð¾Ð±ÑеÑÑвенное
+благоÑоÑÑоÑние. Ðо ÑÑÐ°Ð²Ð½ÐµÐ½Ð¸Ñ Ñ Ð¾Ð¿Ð°ÑноÑÑÑÑ
ÑакиÑ
дейÑÑвий (вÑпомним ÑÑеÑкÑ
+неÑÑи BP, аваÑÐ¸Ñ Ð½Ð° ÐÐС в ФÑкÑÑиме и
ÑинанÑовÑй кÑÐ¸Ð·Ð¸Ñ 2008 года)
+ÑгÑоза ÑеÑÑоÑизма иÑÑезаÑÑе мала.</p>
+
+<p>Ðднако жÑÑналиÑÑÐ¸ÐºÑ Ð½Ñжно заÑиÑаÑÑ Ð¾Ñ
наблÑдениÑ, даже еÑли она ведеÑÑÑ Ð²
+Ñ
оде пÑедпÑинимаÑелÑÑкой деÑÑелÑноÑÑи.</p>
+
+<hr />
+
+<p>ЦиÑÑÐ¾Ð²Ð°Ñ ÑеÑ
ника пÑинеÑла Ñ Ñобой
ÑмопомÑаÑиÑелÑнÑй ÑоÑÑ ÑÑÐ¾Ð²Ð½Ñ Ñлежки за
+наÑими пеÑедвижениÑми, дейÑÑвиÑми и
пеÑеговоÑами. Ðн гоÑаздо вÑÑе ÑÑÐ¾Ð²Ð½Ñ Ñой
+Ñлежки, коÑоÑÑÑ Ð¼Ñ Ð¸ÑпÑÑÑвали на Ñебе в
девÑноÑÑÑе Ð³Ð¾Ð´Ñ XX века, <a
+href="http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html">
+гоÑаздо вÑÑе ÑÑÐ¾Ð²Ð½Ñ Ñой Ñлежки, коÑоÑÑÑ
иÑпÑÑвали на Ñебе лÑди за железнÑм
+занавеÑом</a> в воÑÑмидеÑÑÑÑе годÑ
XX века, и он бÑл Ð±Ñ Ð³Ð¾Ñаздо вÑÑе,
+даже еÑли Ð±Ñ Ð½Ð° пÑименение гоÑÑдаÑÑÑвом
накопленнÑÑ
даннÑÑ
бÑли наложенÑ
+дополниÑелÑнÑе ÑÑидиÑеÑкие огÑаниÑениÑ.</p>
+
+<p>ÐÑли Ð¼Ñ Ð½Ðµ ÑÑиÑаем, ÑÑо наÑи ÑвободнÑе
ÑÑÑÐ°Ð½Ñ Ð² пÑоÑлом ÑÑÑадали Ð¾Ñ Ð¾ÑÑÑой
+неÑ
ваÑки Ñлежки и Ð´Ð¾Ð»Ð¶Ð½Ñ Ð±ÑÑÑ Ð¿Ð¾Ð´ более
ÑÑÑогим надзоÑом, Ñем СовеÑÑкий СоÑз
+и ÐоÑÑоÑÐ½Ð°Ñ ÐеÑманиÑ, нам нÑжно веÑнÑÑÑ
ÑÑÐ¾Ñ ÑÑÐ¾Ð²ÐµÐ½Ñ Ð½Ð° пÑежние позиÑии. ÐлÑ
+ÑÑого ÑÑебÑеÑÑÑ Ð¾ÑÑановиÑÑ Ð¼Ð°ÑÑовÑй ÑбоÑ
даннÑÑ
о лÑдÑÑ
.</p>
+
+<blockquote>
+<p>Copyright © 2013 Richard Stallman<br />
+ÐÑо пÑоизведение доÑÑÑпно по <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.ru">лиÑензии
+Creative Commons Attribution-NoDerivs (<em>ÐÑÑибÑÑÐ¸Ñ —
Ðез
+пÑоизводнÑÑ
пÑоизведений</em>) 3.0 СШÐ</a>.</p>
+</blockquote>
+
+
+<div style="font-size: small;">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.ru.html" -->
+<div id="footer">
+
+<p>ÐожалÑйÑÑа, пÑиÑÑлайÑе обÑие запÑоÑÑ
ÑÐ¾Ð½Ð´Ñ Ð¸ GNU по адÑеÑÑ <a
+href="mailto:address@hidden"><address@hidden></a>. ÐÑÑÑ Ñакже <a
+href="/contact/">дÑÑгие ÑпоÑÐ¾Ð±Ñ ÑвÑзаÑÑÑÑ</a> Ñ
Ñондом. ÐÑÑеÑÑ Ð¾
+неÑабоÑаÑÑиÑ
ÑÑÑлкаÑ
и дÑÑгие попÑавки
или пÑÐµÐ´Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ пÑиÑÑлаÑÑ Ð¿Ð¾
+адÑеÑÑ <a href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+ÐÑ ÑÑаÑалиÑÑ ÑделаÑÑ ÑÑÐ¾Ñ Ð¿ÐµÑевод ÑоÑнÑм и
каÑеÑÑвеннÑм, но иÑклÑÑиÑÑ
+возможноÑÑÑ Ð¾Ñибки Ð¼Ñ Ð½Ðµ можем.
ÐÑиÑÑлайÑе, пожалÑйÑÑа, Ñвои замеÑÐ°Ð½Ð¸Ñ Ð¸
+пÑÐµÐ´Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾ пеÑÐµÐ²Ð¾Ð´Ñ Ð¿Ð¾ адÑеÑÑ <a
+href="mailto:address@hidden"><address@hidden></a>.
+</p><p>Ð¡Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¿Ð¾ кооÑдинаÑии и
пÑедложениÑм пеÑеводов наÑиÑ
ÑÑаÑей Ñм. в
+<a href="/server/standards/README.translations.html">“Ð
ÑководÑÑве по
+пеÑеводам”</a>.</p>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright © 2013 Free Software Foundation, Inc.</p>
+
+<p>ÐÑо пÑоизведение доÑÑÑпно по <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.ru">лиÑензии
+Creative Commons Attribution-NoDerivs (<em>ÐÑÑибÑÑÐ¸Ñ —
Ðез
+пÑоизводнÑÑ
пÑоизведений</em>) 3.0 СШÐ</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.ru.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+ </div>
+
+
+ <p><!-- timestamp start -->
+Ðбновлено:
+
+$Date: 2014/02/23 15:59:44 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
Index: po/surveillance-vs-democracy.ru-en.html
===================================================================
RCS file: po/surveillance-vs-democracy.ru-en.html
diff -N po/surveillance-vs-democracy.ru-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/surveillance-vs-democracy.ru-en.html 23 Feb 2014 15:59:45 -0000
1.1
@@ -0,0 +1,496 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.75 -->
+<title>How Much Surveillance Can Democracy Withstand?
+- GNU Project - Free Software Foundation</title>
+<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>How Much Surveillance Can Democracy Withstand?</h2>
+
+<p>by <a href="http://www.stallman.org/">Richard Stallman</a></p>
+
+<blockquote><p>A version of this article was first published in <a
+href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/">
+Wired</a> in October 2013.</p></blockquote>
+
+<p>Thanks to Edward Snowden's disclosures, we know that the current
+level of general surveillance in society is incompatible with human
+rights. The repeated harassment and prosecution of dissidents,
+sources, and journalists in the US and elsewhere provides
+confirmation. We need to reduce the level of general surveillance,
+but how far? Where exactly is the
+<em>maximum tolerable level of surveillance</em>, which we must ensure
+is not exceeded? It is the level beyond which surveillance starts to
+interfere with the functioning of democracy, in that whistleblowers
+(such as Snowden) are likely to be caught.</p>
+
+<p>Faced with government secrecy, we the people depend on
+whistleblowers
+to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">
+tell us what the state is doing</a>. However, today's surveillance
+intimidates potential whistleblowers, which means it is too much. To
+recover our democratic control over the state, we must reduce
+surveillance to the point where whistleblowers know they are safe.</p>
+
+<p>Using free/libre
+software, <a href="/philosophy/free-software-even-more-important.html">
+as I've advocated for 30 years</a>, is the first step in taking
+control of our digital lives, and that includes preventing
+surveillance. We can't trust nonfree software; the NSA
+<a
+href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
+uses</a> and
+even <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">
+creates</a> security weaknesses in nonfree software to invade our own
+computers and routers. Free software gives us control of our own
+computers, but <a href="http://www.wired.com/opinion/2013/10/149481/">
+that won't protect our privacy once we set foot on the
+Internet</a>.</p>
+
+<p><a
+href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
+legislation to “curtail the domestic surveillance
+powers”</a> in the U.S. is being drawn up, but it relies on
+limiting the government's use of our virtual dossiers. That won't
+suffice to protect whistleblowers if “catching the
+whistleblower” is grounds for access sufficient to identify him
+or her. We need to go further.</p>
+
+<h3>The Upper Limit on Surveillance in a Democracy</h3>
+
+<p>If whistleblowers don't dare reveal crimes and lies, we lose the
+last shred of effective control over our government and institutions.
+That's why surveillance that enables the state to find out who has
+talked with a reporter is too much surveillance—too much for
+democracy to endure.</p>
+
+<p>An unnamed U.S. government official ominously told journalists in
+2011 that
+the <a
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">
+U.S. would not subpoena reporters because “We know who you're
+talking to.”</a>
+Sometimes <a
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">
+journalists' phone call records are subpoenaed</a> to find this out,
+but Snowden has shown us that in effect they subpoena all the phone
+call records of everyone in the U.S., all the
+time, <a
href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">
+from Verizon </a>
+and <a
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">
+from other companies too</a>.</p>
+
+<p>Opposition and dissident activities need to keep secrets from
+states that are willing to play dirty tricks on them. The ACLU has
+demonstrated the U.S. government's <a
+href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"> systematic
+practice of infiltrating peaceful dissident groups</a> on the pretext
+that there might be terrorists among them. The point at which
+surveillance is too much is the point at which the state can find who
+spoke to a known journalist or a known dissident.</p>
+
+<h3>Information, Once Collected, Will Be Misused</h3>
+
+<p>When people recognize that the level of general surveillance is too
+high, the first response is to propose limits on access to the
+accumulated data. That sounds nice, but it won't fix the problem, not
+even slightly, even supposing that the government obeys the rules.
+(The NSA has misled the FISA court, which said it was <a
+href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">
+unable to effectively hold the NSA accountable</a>.) Suspicion of a
+crime will be grounds for access, so once a whistleblower is accused
+of “espionage,” finding the “spy” will provide
+an excuse to access the accumulated material.</p>
+
+<p>The state's surveillance staff will misuse the data for personal
+reasons too. Some NSA agents <a
+href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">
+used U.S. surveillance systems to track their lovers</a>—past,
+present, or wished-for—in a practice called
+“LOVEINT.” The NSA says it has caught and punished this a
+few times; we don't know how many other times it wasn't caught. But
+these events shouldn't surprise us, because police have long <a
+href="http://www.sweetliberty.org/issues/privacy/lein1.htm">used their
+access to driver's license records to track down someone
+attractive</a>, a practice known as “running a plate for a
+date.”</p>
+
+<p>Surveillance data will always be used for other purposes, even if
+this is prohibited. Once the data has been accumulated and the state
+has the possibility of access to it, it can misuse that data in
+dreadful ways, as shown by examples
+from <a
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">
+Europe</a>
+and <a href="https://en.wikipedia.org/wiki/Japanese_American_internment">
+the US </a>.</p>
+
+<p>Total surveillance plus vague law provides an opening for a massive
+fishing expedition against any desired target. To make journalism and
+democracy safe, we must limit the accumulation of data that is easily
+accessible to the state.</p>
+
+<h3>Robust Protection for Privacy Must Be Technical</h3>
+
+<p>The Electronic Frontier Foundation and other organizations propose
+a set of legal principles designed to <a
+href="https://en.necessaryandproportionate.org/text"> prevent the
+abuses of massive surveillance</a>. These principles include,
+crucially, explicit legal protection for whistleblowers; as a
+consequence, they would be adequate for protecting democratic
+freedoms—if adopted completely and enforced without exception
+forever.</p>
+
+<p>However, such legal protections are precarious: as recent history
+shows, they can be repealed (as in the FISA Amendments Act),
+suspended, or <a
+href="http://www.nytimes.com/2009/04/16/us/16nsa.html">
+ignored</a>.</p>
+
+<p>Meanwhile, demagogues will cite the usual excuses as grounds for
+total surveillance; any terrorist attack, even one that kills just a
+handful of people, will give them an opportunity.</p>
+
+<p>If limits on access to the data are set aside, it will be as if
+they had never existed: years worth of dossiers would suddenly become
+available for misuse by the state and its agents and, if collected by
+companies, for their private misuse as well. If, however, we stop the
+collection of dossiers on everyone, those dossiers won't exist, and
+there will be no way to compile them retroactively. A new illiberal
+regime would have to implement surveillance afresh, and it would only
+collect data starting at that date. As for suspending or momentarily
+ignoring this law, the idea would hardly make sense.</p>
+
+<h3>First, Don't Be Foolish</h3>
+
+<p>To have privacy, you must not throw it away: the first one who has
+to protect your privacy is you. Don't tell a company such as Facebook
+anything about you that you hesitate to publish in a newspaper. Don't
+tell a company such as Facebook anything about your friends that they
+might not wish to publish in a newspaper. Better yet, don't be one
+of Facebook's users at all.</p>
+
+<p>Never give any web site your entire list of email or phone
+contacts. Keep your own data; don't store your data in a company's
+“convenient” server. It's safe, however, to entrust a
+data backup to a commercial service, provided you encrypted the data,
+including the file names, with free software on your own computer
+before uploading it.</p>
+
+<p>For privacy's sake, you must avoid nonfree software since, as a
+consequence of giving others control of your computing, it
+is <a href="/philosophy/proprietary-surveillance.html"> likely to spy
+on you </a>.
+Avoid <a href="/philosophy/who-does-that-server-really-serve.html">
+service as a software substitute </a>; as well as giving others
+control of your computing, it requires you to hand over all the
+pertinent data to the server.</p>
+
+<p>However, even the most rigorous self-protection is insufficient to
+protect your privacy on or from systems that don't belong to you.
+When we communicate with others or move around the city, our
+privacy depends on the practices of society.</p>
+
+<h3>We Must Design Every System for Privacy</h3>
+
+<p>If we don't want a total surveillance society, we must consider
+surveillance a kind of social pollution, and limit the surveillance
+impact of each new digital system just as we limit the environmental
+impact of physical construction.</p>
+
+<p>For example: “Smart” meters for electricity are touted
+for sending the power company moment-by-moment data about each
+customer's electric usage, including how usage compares with users in
+general. This is implemented based on general surveillance, but does
+not require any surveillance. It would be easy for the power company
+to calculate the average usage in a residential neighborhood by
+dividing the total usage by the number of subscribers, and send that
+to the meters. Each customer's meter could compare her usage, over
+any desired period of time, with the average usage pattern for that
+period. The same benefit, with no surveillance!</p>
+
+<p>We need to design such privacy into all our digital systems.</p>
+
+<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+
+<p>One way to make monitoring safe for privacy is to <a name="dispersal">
+keep the data
+dispersed and inconvenient to access</a>. Old-fashioned security cameras
+were no threat to privacy. The recording was stored on the premises,
+and kept for a few weeks at most. Because of the inconvenience of
+accessing these recordings, it was never done massively; they were
+accessed only in the places where someone reported a crime. It would
+not be feasible to physically collect millions of tapes every day and
+watch them or copy them.</p>
+
+<p>Nowadays, security cameras have become surveillance cameras: they
+are connected to the Internet so recordings can be collected in a data
+center and saved forever. This is already dangerous, but it is going
+to get worse. Advances in face recognition may bring the day when
+suspected journalists can be tracked on the street all the time to see
+who they talk with.</p>
+
+<p>Internet-connected cameras often have lousy digital security
+themselves, so <a
+href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">
+anyone could watch what the camera sees</a>. To restore privacy, we
+should ban the use of Internet-connected cameras aimed where and when
+the public is admitted, except when carried by people. Everyone must
+be free to post photos and video recordings occasionally, but the
+systematic accumulation of such data on the Internet must be
+limited.</p>
+
+<h3>Remedy for Internet Commerce Surveillance</h3>
+
+<p>Most data collection comes from people's own digital activities.
+Usually the data is collected first by companies. But when it comes
+to the threat to privacy and democracy, it makes no difference whether
+surveillance is done directly by the state or farmed out to a
+business, because the data that the companies collect is
+systematically available to the state.</p>
+
+<p>The NSA, through PRISM, has <a
+href="https://www.commondreams.org/headline/2013/08/23-2"> gotten into
+the databases of many large Internet corporations</a>. AT&T has
+saved all its phone call records since 1987 and <a
+href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">
+makes them available to the DEA</a> to search on request. Strictly
+speaking, the U.S. government does not possess that data, but in
+practical terms it may as well possess it.</p>
+
+<p>The goal of making journalism and democracy safe therefore requires
+that we reduce the data collected about people by any organization,
+not just by the state. We must redesign digital systems so that they
+do not accumulate data about their users. If they need digital data
+about our transactions, they should not be allowed to keep them more
+than a short time beyond what is inherently necessary for their
+dealings with us.</p>
+
+<p>One of the motives for the current level of surveillance of the
+Internet is that sites are financed through advertising based on
+tracking users' activities and propensities. This converts a mere
+annoyance—advertising that we can learn to ignore—into a
+surveillance system that harms us whether we know it or not.
+Purchases over the Internet also track their users. And we are all
+aware that “privacy policies” are more excuses to violate
+privacy than commitments to uphold it.</p>
+
+<p>We could correct both problems by adopting a system of anonymous
+payments—anonymous for the payer, that is. (We don't want the
+payee to dodge taxes.) <a
+href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">
+Bitcoin is not anonymous</a>, though there are efforts to develop
+ways to pay anonymously with Bitcoin. However, technology for <a
+href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"> digital
+cash was first developed in the 1980s</a>; we need only suitable
+business arrangements, and for the state not to obstruct them.</p>
+
+<p>A further threat from sites' collection of personal data is that
+security breakers might get in, take it, and misuse it. This includes
+customers' credit card details. An anonymous payment system would end
+this danger: a security hole in the site can't hurt you if the site
+knows nothing about you.</p>
+
+<h3>Remedy for Travel Surveillance</h3>
+
+<p>We must convert digital toll collection to anonymous payment (using
+digital cash, for instance). License-plate recognition systems
+recognize all license plates, and the <a
+href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">
+data can be kept indefinitely</a>; they should be required by law to
+notice and record only those license numbers that are on a list of
+cars sought by court orders. A less secure alternative would record
+all cars locally but only for a few days, and not make the full data
+available over the Internet; access to the data should be limited to
+searching for a list of court-ordered license-numbers.</p>
+
+<p>The U.S. “no-fly” list must be abolished because it is
+<a
+href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">
+punishment without trial</a>.</p>
+
+<p>It is acceptable to have a list of people whose person and luggage
+will be searched with extra care, and anonymous passengers on domestic
+flights could be treated as if they were on this list. It is also
+acceptable to bar non-citizens, if they are not permitted to enter the
+country at all, from boarding flights to the country. This ought to
+be enough for all legitimate purposes.</p>
+
+<p>Many mass transit systems use some kind of smart cards or RFIDs for
+payment. These systems accumulate personal data: if you once make the
+mistake of paying with anything but cash, they associate the card
+permanently with your name. Furthermore, they record all travel
+associated with each card. Together they amount to massive
+surveillance. This data collection must be reduced.</p>
+
+<p>Navigation services do surveillance: the user's computer tells the
+map service the user's location and where the user wants to go; then
+the server determines the route and sends it back to the user's
+computer, which displays it. Nowadays, the server probably records
+the user's locations, since there is nothing to prevent it. This
+surveillance is not inherently necessary, and redesign could avoid it:
+free/libre software in the user's computer could download map data for
+the pertinent regions (if not downloaded previously), compute the
+route, and display it, without ever telling anyone where the user is
+or wants to go.</p>
+
+<p>Systems for borrowing bicycles, etc., can be designed so that the
+borrower's identity is known only inside the station where the item
+was borrowed. Borrowing would inform all stations that the item is
+“out,” so when the user returns it at any station (in
+general, a different one), that station will know where and when that
+item was borrowed. It will inform the other station that the item is
+no longer “out.” It will also calculate the user's bill,
+and send it (after waiting some random number of minutes) to
+headquarters along a ring of stations, so that headquarters would not
+find out which station the bill came from. Once this is done, the
+return station would forget all about the transaction. If an item
+remains “out” for too long, the station where it was
+borrowed can inform headquarters; in that case, it could send the
+borrower's identity immediately.</p>
+
+<h3>Remedy for Communications Dossiers</h3>
+
+<p>Internet service providers and telephone companies keep extensive
+data on their users' contacts (browsing, phone calls, etc). With
+mobile phones, they also <a
+href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">
+record the user's physical location</a>. They keep these dossiers for
+a long time: over 30 years, in the case of AT&T. Soon they will
+even <a
+href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">
+record the user's body activities</a>. It appears that the <a
+href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">
+NSA collects cell phone location data</a> in bulk.</p>
+
+<p>Unmonitored communication is impossible where systems create such
+dossiers. So it should be illegal to create or keep them. ISPs and
+phone companies must not be allowed to keep this information for very
+long, in the absence of a court order to surveil a certain party.</p>
+
+<p>This solution is not entirely satisfactory, because it won't
+physically stop the government from collecting all the information
+immediately as it is generated—which is what the <a
+href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">
+U.S. does with some or all phone companies</a>. We would have to rely
+on prohibiting that by law. However, that would be better than the
+current situation, where the relevant law (the PATRIOT Act) does not
+clearly prohibit the practice. In addition, if the government did
+resume this sort of surveillance, it would not get data about
+everyone's phone calls made prior to that time.</p>
+
+<h3>But Some Surveillance Is Necessary</h3>
+
+<p>For the state to find criminals, it needs to be able to investigate
+specific crimes, or specific suspected planned crimes, under a court
+order. With the Internet, the power to tap phone conversations would
+naturally extend to the power to tap Internet connections. This power
+is easy to abuse for political reasons, but it is also necessary.
+Fortunately, this won't make it possible to find whistleblowers after
+the fact.</p>
+
+<p>Individuals with special state-granted power, such as police,
+forfeit their right to privacy and must be monitored. (In fact,
+police have their own jargon term for perjury, “<a
+href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">testilying</a>,”
since they do
+it so frequently, particularly about protesters and <a
+href="http://photographyisnotacrime.com/"> photographers</a>.) One
+city in California that required police to wear video cameras all the
+time found <a
+href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">
+their use of force fell by 60%</a>. The ACLU is in favor of this.</p>
+
+<p><a
+href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
+are not people, and not entitled to human rights</a>. It is
+legitimate to require businesses to publish the details of processes
+that might cause chemical, biological, nuclear, fiscal, computational
+(e.g., <a href="http://DefectiveByDesign.org">DRM</a>) or political
+(e.g., lobbying) hazards to society, to whatever level is needed for
+public well-being. The danger of these operations (consider the BP
+oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
+that of terrorism.</p>
+
+<p>However, journalism must be protected from surveillance even when
+it is carried out as part of a business.</p>
+
+<hr />
+
+<p>Digital technology has brought about a tremendous increase in the
+level of surveillance of our movements, actions, and communications.
+It is far more than we experienced in the 1990s, and <a
+href="http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html">
+far more than people behind the Iron Curtain experienced</a> in the
+1980s, and would still be far more even with additional legal limits
+on state use of the accumulated data.</p>
+
+<p>Unless we believe that our free countries previously suffered from
+a grave surveillance deficit, and ought to be surveilled more than the
+Soviet Union and East Germany were, we must reverse this increase.
+That requires stopping the accumulation of big data about people.</p>
+
+<blockquote>
+<p>Copyright 2013 Richard Stallman<br />
+Licensed under the <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative Commons
+Attribution-NoDerivs 3.0 United States License</a></p>
+</blockquote>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2013 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative Commons
+Attribution-NoDerivs 3.0 United States License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p>Updated:
+<!-- timestamp start -->
+$Date: 2014/02/23 15:59:45 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy po/surveillance-vs-democracy.ru....,
GNUN <=