www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www distros/free-system-distribution-guidelines...


From: GNUN
Subject: www distros/free-system-distribution-guidelines...
Date: Sat, 31 May 2014 18:28:15 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     14/05/31 18:28:15

Modified files:
        distros        : free-system-distribution-guidelines.ru.html 
        distros/po     : free-system-distribution-guidelines.ru-en.html 
                         free-system-distribution-guidelines.ru.po 
        philosophy     : free-sw.ru.html 
                         surveillance-vs-democracy.ru.html 
        philosophy/po  : free-sw.ru-en.html free-sw.ru.po 
                         surveillance-vs-democracy.ru-en.html 
                         surveillance-vs-democracy.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/free-system-distribution-guidelines.ru.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-system-distribution-guidelines.ru-en.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-system-distribution-guidelines.ru.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/free-sw.ru.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ru.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-sw.ru-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-sw.ru.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru.po?cvsroot=www&r1=1.14&r2=1.15

Patches:
Index: distros/free-system-distribution-guidelines.ru.html
===================================================================
RCS file: /web/www/www/distros/free-system-distribution-guidelines.ru.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- distros/free-system-distribution-guidelines.ru.html 14 Apr 2014 07:08:06 
-0000      1.45
+++ distros/free-system-distribution-guidelines.ru.html 31 May 2014 18:27:43 
-0000      1.46
@@ -1,11 +1,9 @@
-
+<!--#set var="ENGLISH_PAGE" 
value="/distros/free-system-distribution-guidelines.en.html" -->
 
 <!--#include virtual="/server/header.ru.html" -->
 <!-- Parent-Version: 1.77 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
- <!--#set var="ENGLISH_PAGE" 
value="/distros/free-system-distribution-guidelines.en.html" -->
-
 <title>Рекомендации для свободных 
дистрибутивов систем - Проект GNU - Фонд
 свободного программного обеспечения</title>
 <link rel="alternate" title="Свободные дистрибутивы 
GNU/Linux"
@@ -250,6 +248,13 @@
 указывающую на gnu.org или gnu.org/philosophy для 
более подробных сведений о
 вопросе.</p>
 
+<h3 id="words-to-avoid">Пожалуйста, не повторяйте 
пропаганду и путаницу</h3>
+
+<p>Пожалуйста, ознакомьтесь с нашим <a 
href="/philosophy/words-to-avoid.html">
+списком слов, которых следует избегать</a>: 
они либо необъективны и вводят в
+заблуждение; старайтесь избегать их в 
своих публичных заявлениях и
+дискуссиях.</p>
+
 <h3 id="final-notes">Окончательные замечания</h3>
 
 <p>Мы поддерживаем перечень <a 
href="/distros/free-distros.html">свободных
@@ -347,7 +352,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2014/04/14 07:08:06 $
+$Date: 2014/05/31 18:27:43 $
 
 <!-- timestamp end -->
 </p>

Index: distros/po/free-system-distribution-guidelines.ru-en.html
===================================================================
RCS file: 
/web/www/www/distros/po/free-system-distribution-guidelines.ru-en.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- distros/po/free-system-distribution-guidelines.ru-en.html   14 Apr 2014 
07:08:07 -0000      1.29
+++ distros/po/free-system-distribution-guidelines.ru-en.html   31 May 2014 
18:27:44 -0000      1.30
@@ -238,6 +238,13 @@
 gnu.org or gnu.org/philosophy for further information about the
 issue.</p>
 
+<h3 id="words-to-avoid">Please Avoid Repeating Propaganda and Confusion</h3>
+
+<p>Please see our list
+of <a href="/philosophy/words-to-avoid.html">words to avoid</a>, which
+are either biased, misguided or misleading, and try to avoid them in
+your public statements and discussions with the public.</p>
+
 <h3 id="final-notes">Final Notes</h3>
 
 <p>We maintain a list of the <a href="/distros/free-distros.html">free
@@ -316,7 +323,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/04/14 07:08:07 $
+$Date: 2014/05/31 18:27:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: distros/po/free-system-distribution-guidelines.ru.po
===================================================================
RCS file: /web/www/www/distros/po/free-system-distribution-guidelines.ru.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- distros/po/free-system-distribution-guidelines.ru.po        31 May 2014 
18:11:02 -0000      1.52
+++ distros/po/free-system-distribution-guidelines.ru.po        31 May 2014 
18:27:45 -0000      1.53
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2014-05-29 08:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -553,9 +552,9 @@
 "avoid</a>, which are either biased, misguided or misleading, and try to "
 "avoid them in your public statements and discussions with the public."
 msgstr ""
-"Пожалуйста, ознакомьтесь с нашим <a 
href=\"/philosophy/words-to-avoid.html\"> "
-"списком слов, которых следует избегать</a>: 
они либо необъективны и вводят "
-"в заблуждение; старайтесь избегать их в 
своих публичных заявлениях и "
+"Пожалуйста, ознакомьтесь с нашим <a 
href=\"/philosophy/words-to-avoid.html"
+"\"> списком слов, которых следует 
избегать</a>: они либо необъективны и "
+"вводят в заблуждение; старайтесь избегать 
их в своих публичных заявлениях и "
 "дискуссиях."
 
 #. type: Content of: <h3>

Index: philosophy/free-sw.ru.html
===================================================================
RCS file: /web/www/www/philosophy/free-sw.ru.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- philosophy/free-sw.ru.html  12 Apr 2014 13:56:21 -0000      1.44
+++ philosophy/free-sw.ru.html  31 May 2014 18:27:46 -0000      1.45
@@ -1,11 +1,9 @@
-
+<!--#set var="ENGLISH_PAGE" value="/philosophy/free-sw.en.html" -->
 
 <!--#include virtual="/server/header.ru.html" -->
 <!-- Parent-Version: 1.77 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
- <!--#set var="ENGLISH_PAGE" value="/philosophy/free-sw.en.html" -->
-
 <title>Что такое свободная программа? - Проект 
GNU - Фонд свободного программного
 обеспечения</title>
 
@@ -58,7 +56,7 @@
 </p>
 
 <ul>
-  <li>Свобода выполнять программу в любых 
целях (свобода 0).</li>
+  <li>Свобода выполнять программу как вам 
угодно в любых целях (свобода 0).</li>
   <li>Свобода изучать работу программы и 
модифицировать программу, чтобы она
 выполняла ваши вычисления, как вы 
пожелаете (свобода 1). Это предполагает
 доступ к исходному тексту.
@@ -107,6 +105,11 @@
 </p>
 
 <p>
+Свобода выполнять программу как вам 
угодно означает, что вам не запрещено и
+не мешают делать это. Это никак не связано 
ни с тем, какой функциональностью
+обладает программа, ни с тем, полезна ли 
она для того, что вы хотите делать.</p>
+
+<p>
 Свобода передавать копии должна 
распространяться как на двоичные или
 исполняемые формы программы, так и на исх
одный текст, с изменениями или без
 них (распространение программ в 
исполнимом виде необходимо для удобства в
@@ -392,6 +395,15 @@
 <ul>
 
 <li><a
+href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&amp;r1=1.134&amp;r2=1.135";>Версия
+1.135</a>: Каждый раз говорится, что 
свобода&nbsp;0&nbsp;&mdash; это свобода
+выполнять программу как вам угодно.</li>
+
+<li><a
+href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&amp;r1=1.133&amp;r2=1.134";>Версия
+1.134</a>: Свобода 0 не связана с 
функциональностью программы.</li>
+
+<li><a
 
href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&amp;r1=1.130&amp;r2=1.131";>Version
 1.131</a>: Лицензия свободной программы не 
может требовать соблюдения
 лицензии другой, несвободной программы.</li>
@@ -597,7 +609,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2014/04/12 13:56:21 $
+$Date: 2014/05/31 18:27:46 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/surveillance-vs-democracy.ru.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.ru.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/surveillance-vs-democracy.ru.html        15 Apr 2014 04:01:36 
-0000      1.5
+++ philosophy/surveillance-vs-democracy.ru.html        31 May 2014 18:27:46 
-0000      1.6
@@ -1,11 +1,9 @@
-
+<!--#set var="ENGLISH_PAGE" 
value="/philosophy/surveillance-vs-democracy.en.html" -->
 
 <!--#include virtual="/server/header.ru.html" -->
 <!-- Parent-Version: 1.77 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
- <!--#set var="ENGLISH_PAGE" 
value="/philosophy/surveillance-vs-democracy.en.html" -->
-
 <title>Сколько слежки может выдержать 
демократия? - Проект GNU - Фонд свободного
 программного обеспечения</title>
 
@@ -166,20 +164,18 @@
 
 <h3>Во-первых, не быть дураками</h3>
 
-<p>Чтобы у вас была конфиденциальность, вы 
не должны ее выбрасывать: защищать
-вашу конфиденциальность должны прежде 
всего вы сами. Не рассказывайте
-компании, такой как Facebook, ничего такого, 
что вы не передали бы для
-публикации в газете. Не рассказывайте 
компании, такой как Facebook, о своих
-знакомых ничего такого, что они не хотели 
бы опубликовать в газете. А еще
-лучше не быть одним из пользователей Facebook 
вообще.</p>
-
-<p>Никогда не передавайте ни на какой сайт 
полного списка адресов электронной
-почты и номеров телефонов людей, с 
которыми вы общаетесь. Держите свои
-данные у себя; не храните свои данные на 
&ldquo;удобном&rdquo; сервере
-компании. Однако вполне безопасно вверять 
резервные копии данных
-коммерческой службе при условии, что вы 
зашифровали эти данные, в том числе
-имена файлов, на своем компьютере с 
помощью свободных программ перед тем,
-как отправлять их на сервер.</p>
+<p>Чтобы у нас была конфиденциальность, мы 
не должны отбрасывать ее: первый,
+кто должен защищать вашу 
конфиденциальность&nbsp;&mdash; это вы. 
Избегайте
+идентифицировать себя на сайтах 
Интернета, связывайтесь с ними по Tor и
+пользуйтесь браузерами, которые блокируют 
схемы, применяемые на сайтах для
+отслеживания посетителей. Применяйте GNU 
Privacy Guard для шифрования
+содержимого своей электронной почты. 
Оплачивайте покупки наличными.</p>
+
+<p>Держите свои данные у себя; не храните 
свои данные на &ldquo;удобном&rdquo;
+сервере компании. Однако вполне безопасно 
вверять резервные копии данных
+коммерческой службе при условии, что вы 
сложили файлы в архив и зашифровали
+весь этот архив, в том числе имена файлов, 
на своем компьютере с помощью
+свободных программ перед тем, как 
отправлять их на сервер.</p>
 
 <p>Ради конфиденциальности вы должны 
избегать несвободных программ, поскольку
 вследствие передачи другим контроля над 
вашими вычислениями, они, <a
@@ -189,10 +185,24 @@
 программ</a>, а также передачи другим 
контроля над вашими вычислениями, это
 требует от вас предоставления всех 
обрабатываемых данных на сервер.</p>
 
-<p>Однако даже самой бдительной самозащиты 
недостаточно, чтобы защитить вашу
-конфиденциальность на системах, которые 
вам не принадлежат. Когда мы
-общаемся с другими или передвигаемся по 
городу, наша конфиденциальность
-зависит от сложившейся в обществе 
практики.</p>
+<p>Защищайте также конфиденциальность 
своих друзей и знакомых. <a
+href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>Не
+выдавайте их личных данных</a>, кроме необх
одимых для связи с ними, и
+никогда не передавайте никакому сайту 
своего списка телефонных и электронных
+контактов. Не говорите таким компаниям, 
как Facebook, ничего такого о своих
+друзьях, что они могли бы не хотеть 
опубликовать в газете. А еще лучше не
+пользуйтесь Facebook вообще. Отказывайтесь от 
систем связи, в которых от
+пользователей требуется называть свои 
настоящие имена, даже если вы
+собираетесь назвать свои, поскольку это 
поощряет других людей отказаться от
+своей конфиденциальности.</p>
+
+<p>Самозащита важна, но даже самой 
бдительной самозащиты недостаточно, чтобы
+защитить вашу конфиденциальность на 
системах, которые вам не
+принадлежат. Когда мы общаемся с другими 
или передвигаемся по городу, наша
+конфиденциальность зависит от 
сложившейся в обществе практики. Мы можем
+избегать некоторых систем, которые 
отслеживают наши сообщения и перемещения,
+но не все их. Ясно, что лучше было бы 
заставить все эти системы прекратить
+слежку за людьми, за исключением законно 
подозреваемых.</p>
 
 <h3>Каждую систему нужно проектировать с 
учетом конфиденциальности</h3>
 
@@ -380,6 +390,16 @@
 такого рода слежку, оно не получило бы 
данные о телефонных переговорах
 каждого, проведенных до этого времени.</p>
 
+<p>Что касается тайны электронной 
переписки, простым частичным решением для 
вас
+и других будет пользоваться службами 
электронной почты в стране, которая
+никогда не стала бы сотрудничать с вашим 
правительством, и связываться друг
+с другом с использованием криптографии. 
Однако у Лейдера Левисона (владелеца
+почтовой службы Lavabit, которую слежка США 
пыталась полностью разложить)
+есть мысль о криптографической системе, с 
помощью которой вашей службе
+электронной почты было бы известно только 
то, что вы послали сообщение
+какому-то пользователю моей службы 
электронной почты, но было бы трудно
+определить, что вы послали сообщение мне.</p>
+
 <h3>Но иногда слежка необходима</h3>
 
 <p>Для розыска преступников государству 
необходима возможность расследовать
@@ -508,7 +528,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2014/04/15 04:01:36 $
+$Date: 2014/05/31 18:27:46 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/free-sw.ru-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/free-sw.ru-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- philosophy/po/free-sw.ru-en.html    12 Apr 2014 13:58:49 -0000      1.33
+++ philosophy/po/free-sw.ru-en.html    31 May 2014 18:27:47 -0000      1.34
@@ -51,7 +51,8 @@
 </p>
 
 <ul>
-  <li>The freedom to run the program, for any purpose (freedom 0).</li>
+  <li>The freedom to run the program as you wish,
+      for any purpose (freedom 0).</li>
   <li>The freedom to study how the program works, and change it so it
       does your computing as you wish (freedom 1). Access to the source
       code is a precondition for this.
@@ -102,6 +103,12 @@
 </p>
 
 <p>
+The freedom to run the program as you wish means that you are not
+forbidden or stopped from doing so.  It has nothing to do with what
+functionality the program has, or whether it is useful for what you
+want to do.</p>
+
+<p>
 The freedom to redistribute copies must include binary or executable
 forms of the program, as well as source code, for both modified and
 unmodified versions.  (Distributing programs in runnable form is necessary
@@ -374,6 +381,13 @@
 
 <ul>
 
+<li><a 
href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&amp;r1=1.134&amp;r2=1.135";>Version
+1.135</a>: Say each time that freedom 0 is the freedom to run the program
+as you wish.</li>
+
+<li><a 
href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&amp;r1=1.133&amp;r2=1.134";>Version
+1.134</a>: Freedom 0 is not a matter of the program's functionality.</li>
+
 <li><a 
href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&amp;r1=1.130&amp;r2=1.131";>Version
 1.131</a>: A free license may not require compliance with a nonfree license
 of another program.</li>
@@ -541,7 +555,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/04/12 13:58:49 $
+$Date: 2014/05/31 18:27:47 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/free-sw.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-sw.ru.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- philosophy/po/free-sw.ru.po 31 May 2014 18:10:55 -0000      1.63
+++ philosophy/po/free-sw.ru.po 31 May 2014 18:27:47 -0000      1.64
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2014-05-26 10:56+0000\n"
 
 # type: Content of: <title>
 #. type: Content of: <title>
@@ -114,9 +113,6 @@
 
 # type: Content of: <ul><li>
 #. type: Content of: <ul><li>
-# | The freedom to run the [-program,-] {+program as you wish,+} for any
-# | purpose (freedom 0).
-#| msgid "The freedom to run the program, for any purpose (freedom 0)."
 msgid ""
 "The freedom to run the program as you wish, for any purpose (freedom 0)."
 msgstr "Свобода выполнять программу как вам 
угодно в любых целях (свобода 0)."
@@ -226,10 +222,9 @@
 "or stopped from doing so.  It has nothing to do with what functionality the "
 "program has, or whether it is useful for what you want to do."
 msgstr ""
-"Свобода выполнять программу как вам 
угодно означает, что вам не запрещено "
-"и не мешают делать это. Это никак не 
связано ни с тем, какой "
-"функциональностью обладает программа, ни 
с тем, полезна ли она для того, "
-"что вы хотите делать."
+"Свобода выполнять программу как вам 
угодно означает, что вам не запрещено и "
+"не мешают делать это. Это никак не связано 
ни с тем, какой функциональностью "
+"обладает программа, ни с тем, полезна ли 
она для того, что вы хотите делать."
 
 # type: Content of: <p>
 #. type: Content of: <p>
@@ -743,18 +738,6 @@
 
 # type: Content of: <ul><li>
 #. type: Content of: <ul><li>
-# | <a
-# | 
[-href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&amp;r1=1.130&amp;r2=1.131\";>Version
-# | 1.131</a>: A free license may not require compliance with a nonfree
-# | license of another program.-]
-# | 
{+href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&amp;r1=1.134&amp;r2=1.135\";>Version
-# | 1.135</a>: Say each time that freedom 0 is the freedom to run the program
-# | as you wish.+}
-#| msgid ""
-#| "<a href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.";
-#| "html?root=www&amp;r1=1.130&amp;r2=1.131\">Version 1.131</a>: A free "
-#| "license may not require compliance with a nonfree license of another "
-#| "program."
 msgid ""
 "<a href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?";
 "root=www&amp;r1=1.134&amp;r2=1.135\">Version 1.135</a>: Say each time that "
@@ -762,22 +745,11 @@
 msgstr ""
 "<a href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?";
 "root=www&amp;r1=1.134&amp;r2=1.135\">Версия 1.135</a>: Каждый 
раз говорится, "
-"что свобода&nbsp;0&nbsp;&mdash; это свобода 
выполнять программу как вам угодно."
+"что свобода&nbsp;0&nbsp;&mdash; это свобода 
выполнять программу как вам "
+"угодно."
 
 # type: Content of: <ul><li>
 #. type: Content of: <ul><li>
-# | <a
-# | 
[-href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&amp;r1=1.130&amp;r2=1.131\";>Version
-# | 1.131</a>: A free license may-]
-# | 
{+href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&amp;r1=1.133&amp;r2=1.134\";>Version
-# | 1.134</a>: Freedom 0 is+} not [-require compliance with-] a [-nonfree
-# | license-] {+matter+} of [-another program.-] {+the program's
-# | functionality.+}
-#| msgid ""
-#| "<a href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.";
-#| "html?root=www&amp;r1=1.130&amp;r2=1.131\">Version 1.131</a>: A free "
-#| "license may not require compliance with a nonfree license of another "
-#| "program."
 msgid ""
 "<a href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?";
 "root=www&amp;r1=1.133&amp;r2=1.134\">Version 1.134</a>: Freedom 0 is not a "

Index: philosophy/po/surveillance-vs-democracy.ru-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ru-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/po/surveillance-vs-democracy.ru-en.html  24 Apr 2014 07:02:12 
-0000      1.5
+++ philosophy/po/surveillance-vs-democracy.ru-en.html  31 May 2014 18:27:47 
-0000      1.6
@@ -8,9 +8,9 @@
 
 <p>by <a href="http://www.stallman.org/";>Richard Stallman</a></p>
 
-<blockquote><p>A version of this article was first published in <a
-href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/";>
-Wired</a> in October 2013.</p></blockquote>
+<blockquote><p>A version of this article was first published
+in <a 
href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/";>Wired</a>
+in October 2013.</p></blockquote>
 
 <p>Thanks to Edward Snowden's disclosures, we know that the current
 level of general surveillance in society is incompatible with human
@@ -25,26 +25,24 @@
 
 <p>Faced with government secrecy, we the people depend on
 whistleblowers
-to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";>
-tell us what the state is doing</a>.  However, today's surveillance
+to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";>tell
+us what the state is doing</a>.  However, today's surveillance
 intimidates potential whistleblowers, which means it is too much.  To
 recover our democratic control over the state, we must reduce
 surveillance to the point where whistleblowers know they are safe.</p>
 
 <p>Using free/libre
-software, <a href="/philosophy/free-software-even-more-important.html">
-as I've advocated for 30 years</a>, is the first step in taking
-control of our digital lives, and that includes preventing
-surveillance.  We can't trust nonfree software; the NSA
-<a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
-uses</a> and
-even <a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>
-creates</a> security weaknesses in nonfree software to invade our own
-computers and routers.  Free software gives us control of our own
-computers, but <a href="http://www.wired.com/opinion/2013/10/149481/";>
-that won't protect our privacy once we set foot on the
-Internet</a>.</p>
+software, <a href="/philosophy/free-software-even-more-important.html">as
+I've advocated for 30 years</a>, is the first step in taking control
+of our digital lives, and that includes preventing surveillance.  We
+can't trust nonfree software; the NSA
+<a 
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>uses</a>
+and
+even <a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>creates</a>
+security weaknesses in nonfree software to invade our own computers
+and routers.  Free software gives us control of our own computers,
+but <a href="http://www.wired.com/opinion/2013/10/149481/";>that won't
+protect our privacy once we set foot on the Internet</a>.</p>
 
 <p><a
 
href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>Bipartisan
@@ -65,22 +63,22 @@
 
 <p>An unnamed U.S. government official ominously told journalists in
 2011 that
-the <a 
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river";>
-U.S. would not subpoena reporters because &ldquo;We know who you're
-talking to.&rdquo;</a>
-Sometimes <a 
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>
-journalists' phone call records are subpoenaed</a> to find this out,
-but Snowden has shown us that in effect they subpoena all the phone
-call records of everyone in the U.S., all the
-time, <a 
href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order";>
-from Verizon </a>
-and <a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>
-from other companies too</a>.</p>
+the <a 
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river";>U.S.
 would
+not subpoena reporters because &ldquo;We know who you're talking
+to.&rdquo;</a>
+Sometimes <a 
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>journalists'
+phone call records are subpoenaed</a> to find this out, but Snowden
+has shown us that in effect they subpoena all the phone call records
+of everyone in the U.S., all the
+time, <a 
href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order";>from
+Verizon</a>
+and <a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>from
+other companies too</a>.</p>
 
 <p>Opposition and dissident activities need to keep secrets from
 states that are willing to play dirty tricks on them.  The ACLU has
 demonstrated the U.S. government's <a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";> systematic
+href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>systematic
 practice of infiltrating peaceful dissident groups</a> on the pretext
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
@@ -92,23 +90,23 @@
 high, the first response is to propose limits on access to the
 accumulated data.  That sounds nice, but it won't fix the problem, not
 even slightly, even supposing that the government obeys the rules.
-(The NSA has misled the FISA court, which said it was <a
-href="http://www.wired.com/threatlevel/2013/09/nsa-violations/";>
-unable to effectively hold the NSA accountable</a>.) Suspicion of a
-crime will be grounds for access, so once a whistleblower is accused
-of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide
-an excuse to access the accumulated material.</p>
+(The NSA has misled the FISA court, which said it
+was <a href="http://www.wired.com/threatlevel/2013/09/nsa-violations/";>unable
+to effectively hold the NSA accountable</a>.) Suspicion of a crime
+will be grounds for access, so once a whistleblower is accused of
+&ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
+excuse to access the accumulated material.</p>
 
 <p>The state's surveillance staff will misuse the data for personal
-reasons too.  Some NSA agents <a
-href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>
-used U.S. surveillance systems to track their lovers</a>&mdash;past,
+reasons too.  Some NSA
+agents <a 
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>used
+U.S. surveillance systems to track their lovers</a>&mdash;past,
 present, or wished-for&mdash;in a practice called
 &ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
 few times; we don't know how many other times it wasn't caught.  But
-these events shouldn't surprise us, because police have long <a
-href="http://www.sweetliberty.org/issues/privacy/lein1.htm";>used their
-access to driver's license records to track down someone
+these events shouldn't surprise us, because police have
+long <a href="http://www.sweetliberty.org/issues/privacy/lein1.htm";>used
+their access to driver's license records to track down someone
 attractive</a>, a practice known as &ldquo;running a plate for a
 date.&rdquo;</p>
 
@@ -116,10 +114,9 @@
 this is prohibited.  Once the data has been accumulated and the state
 has the possibility of access to it, it can misuse that data in
 dreadful ways, as shown by examples
-from <a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/";>
-Europe</a>
-and <a href="https://en.wikipedia.org/wiki/Japanese_American_internment";>
-the US </a>.</p>
+from <a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/";>Europe</a>
+and <a href="https://en.wikipedia.org/wiki/Japanese_American_internment";>the
+US </a>.</p>
 
 <p>Total surveillance plus vague law provides an opening for a massive
 fishing expedition against any desired target.  To make journalism and
@@ -130,7 +127,7 @@
 
 <p>The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to <a
-href="https://en.necessaryandproportionate.org/text";> prevent the
+href="https://en.necessaryandproportionate.org/text";>prevent the
 abuses of massive surveillance</a>.  These principles include,
 crucially, explicit legal protection for whistleblowers; as a
 consequence, they would be adequate for protecting democratic
@@ -140,8 +137,7 @@
 <p>However, such legal protections are precarious: as recent history
 shows, they can be repealed (as in the FISA Amendments Act),
 suspended, or <a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html";>
-ignored</a>.</p>
+href="http://www.nytimes.com/2009/04/16/us/16nsa.html";>ignored</a>.</p>
 
 <p>Meanwhile, demagogues will cite the usual excuses as grounds for
 total surveillance; any terrorist attack, even one that kills just a
@@ -160,32 +156,45 @@
 <h3>First, Don't Be Foolish</h3>
 
 <p>To have privacy, you must not throw it away: the first one who has
-to protect your privacy is you.  Don't tell a company such as Facebook
-anything about you that you hesitate to publish in a newspaper.  Don't
-tell a company such as Facebook anything about your friends that they
-might not wish to publish in a newspaper.  Better yet, don't be one
-of Facebook's users at all.</p>
+to protect your privacy is you.  Avoid identifying yourself to web
+sites, contact them with Tor, and use browsers that block the schemes
+they use to track visitors.  Use the GNU Privacy Guard to encrypt the
+contents of your email.  Pay for things with cash.</p>
 
-<p>Never give any web site your entire list of email or phone
-contacts.  Keep your own data; don't store your data in a company's
+<p>Keep your own data; don't store your data in a company's
 &ldquo;convenient&rdquo; server.  It's safe, however, to entrust a
-data backup to a commercial service, provided you encrypted the data,
-including the file names, with free software on your own computer
-before uploading it.</p>
+data backup to a commercial service, provided you put the files in an
+archive and encrypt the whole archive, including the names of the
+files, with free software on your own computer before uploading
+it.</p>
 
 <p>For privacy's sake, you must avoid nonfree software since, as a
 consequence of giving others control of your computing, it
-is <a href="/philosophy/proprietary-surveillance.html"> likely to spy
-on you </a>.
-Avoid <a href="/philosophy/who-does-that-server-really-serve.html">
-service as a software substitute </a>; as well as giving others
-control of your computing, it requires you to hand over all the
-pertinent data to the server.</p>
-
-<p>However, even the most rigorous self-protection is insufficient to
-protect your privacy on or from systems that don't belong to you.
-When we communicate with others or move around the city, our
-privacy depends on the practices of society.</p>
+is <a href="/philosophy/proprietary-surveillance.html">likely to spy
+on you</a>.
+Avoid <a href="/philosophy/who-does-that-server-really-serve.html">service
+as a software substitute</a>; as well as giving others control of your
+computing, it requires you to hand over all the pertinent data to the
+server.</p>
+
+<p>Protect your friends' and acquaintances' privacy,
+too.  <a 
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>Don't
+give out their personal information</a> except how to contact them,
+and never give any web site your list of email or phone contacts.
+Don't tell a company such as Facebook anything about your friends that
+they might not wish to publish in a newspaper.  Better yet, don't be
+used by Facebook at all.  Reject communication systems that require
+users to give their real names, even if you are going to give yours,
+since they pressure other people to surrender their privacy.</p>
+
+<p>Self-protection is essential, but even the most rigorous
+self-protection is insufficient to protect your privacy on or from
+systems that don't belong to you.  When we communicate with others or
+move around the city, our privacy depends on the practices of society.
+We can avoid some of the systems that surveil our communications and
+movements, but not all of them.  Clearly, the better solution is to
+make all these systems stop surveilling people other than legitimate
+suspects.</p>
 
 <h3>We Must Design Every System for Privacy</h3>
 
@@ -209,15 +218,14 @@
 
 <h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
 
-<p>One way to make monitoring safe for privacy is to <a name="dispersal">
-keep the data
-dispersed and inconvenient to access</a>.  Old-fashioned security cameras
-were no threat to privacy.  The recording was stored on the premises,
-and kept for a few weeks at most.  Because of the inconvenience of
-accessing these recordings, it was never done massively; they were
-accessed only in the places where someone reported a crime.  It would
-not be feasible to physically collect millions of tapes every day and
-watch them or copy them.</p>
+<p>One way to make monitoring safe for privacy is
+to <a name="dispersal">keep the data dispersed and inconvenient to
+access</a>.  Old-fashioned security cameras were no threat to privacy.
+The recording was stored on the premises, and kept for a few weeks at
+most.  Because of the inconvenience of accessing these recordings, it
+was never done massively; they were accessed only in the places where
+someone reported a crime.  It would not be feasible to physically
+collect millions of tapes every day and watch them or copy them.</p>
 
 <p>Nowadays, security cameras have become surveillance cameras: they
 are connected to the Internet so recordings can be collected in a data
@@ -227,12 +235,12 @@
 who they talk with.</p>
 
 <p>Internet-connected cameras often have lousy digital security
-themselves, so <a
-href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances";>
-anyone could watch what the camera sees</a>.  To restore privacy, we
-should ban the use of Internet-connected cameras aimed where and when
-the public is admitted, except when carried by people.  Everyone must
-be free to post photos and video recordings occasionally, but the
+themselves,
+so <a 
href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances";>anyone
+could watch what the camera sees</a>.  To restore privacy, we should
+ban the use of Internet-connected cameras aimed where and when the
+public is admitted, except when carried by people.  Everyone must be
+free to post photos and video recordings occasionally, but the
 systematic accumulation of such data on the Internet must be
 limited.</p>
 
@@ -245,12 +253,12 @@
 business, because the data that the companies collect is
 systematically available to the state.</p>
 
-<p>The NSA, through PRISM, has <a
-href="https://www.commondreams.org/headline/2013/08/23-2";> gotten into
-the databases of many large Internet corporations</a>.  AT&amp;T has
-saved all its phone call records since 1987 and <a
-href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>
-makes them available to the DEA</a> to search on request.  Strictly
+<p>The NSA, through PRISM,
+has <a href="https://www.commondreams.org/headline/2013/08/23-2";>gotten
+into the databases of many large Internet corporations</a>.  AT&amp;T
+has saved all its phone call records since 1987
+and <a 
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>makes
+them available to the DEA</a> to search on request.  Strictly
 speaking, the U.S.  government does not possess that data, but in
 practical terms it may as well possess it.</p>
 
@@ -273,11 +281,11 @@
 
 <p>We could correct both problems by adopting a system of anonymous
 payments&mdash;anonymous for the payer, that is.  (We don't want the
-payee to dodge taxes.)  <a
-href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>
-Bitcoin is not anonymous</a>, though there are efforts to develop
-ways to pay anonymously with Bitcoin.  However, technology for <a
-href="http://www.wired.com/wired/archive/2.12/emoney_pr.html";> digital
+payee to dodge
+taxes.)  <a 
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>Bitcoin
+is not anonymous</a>, though there are efforts to develop ways to pay
+anonymously with Bitcoin.  However, technology
+for <a href="http://www.wired.com/wired/archive/2.12/emoney_pr.html";>digital
 cash was first developed in the 1980s</a>; we need only suitable
 business arrangements, and for the state not to obstruct them.</p>
 
@@ -291,19 +299,18 @@
 
 <p>We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
-recognize all license plates, and the <a
-href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm";>
-data can be kept indefinitely</a>; they should be required by law to
-notice and record only those license numbers that are on a list of
-cars sought by court orders.  A less secure alternative would record
-all cars locally but only for a few days, and not make the full data
+recognize all license plates, and
+the <a 
href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm";>data
+can be kept indefinitely</a>; they should be required by law to notice
+and record only those license numbers that are on a list of cars
+sought by court orders.  A less secure alternative would record all
+cars locally but only for a few days, and not make the full data
 available over the Internet; access to the data should be limited to
 searching for a list of court-ordered license-numbers.</p>
 
 <p>The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is
-<a
-href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes";>
-punishment without trial</a>.</p>
+<a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes";>punishment
+without trial</a>.</p>
 
 <p>It is acceptable to have a list of people whose person and luggage
 will be searched with extra care, and anonymous passengers on domestic
@@ -349,15 +356,14 @@
 
 <p>Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
-mobile phones, they also <a
-href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>
-record the user's physical location</a>.  They keep these dossiers for
-a long time: over 30 years, in the case of AT&amp;T.  Soon they will
-even <a
-href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>
-record the user's body activities</a>.  It appears that the <a
-href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location";>
-NSA collects cell phone location data</a> in bulk.</p>
+mobile phones, they
+also <a 
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>record
+the user's physical location</a>.  They keep these dossiers for a long
+time: over 30 years, in the case of AT&amp;T.  Soon they will
+even <a 
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>record
+the user's body activities</a>.  It appears that
+the <a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location";>NSA
+collects cell phone location data</a> in bulk.</p>
 
 <p>Unmonitored communication is impossible where systems create such
 dossiers.  So it should be illegal to create or keep them.  ISPs and
@@ -366,15 +372,26 @@
 
 <p>This solution is not entirely satisfactory, because it won't
 physically stop the government from collecting all the information
-immediately as it is generated&mdash;which is what the <a
-href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>
-U.S. does with some or all phone companies</a>.  We would have to rely
-on prohibiting that by law.  However, that would be better than the
+immediately as it is generated&mdash;which is what
+the <a 
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>U.S.
 does
+with some or all phone companies</a>.  We would have to rely on
+prohibiting that by law.  However, that would be better than the
 current situation, where the relevant law (the PATRIOT Act) does not
 clearly prohibit the practice.  In addition, if the government did
 resume this sort of surveillance, it would not get data about
 everyone's phone calls made prior to that time.</p>
 
+<p>For privacy about who you exchange email with, a simple partial
+solution is for you and others to use email services in a country that
+would never cooperate with your own government, and which communicate
+with each other using encryption.  However, Ladar Levison (owner of
+the mail service Lavabit that US surveillance sought to corrupt
+completely) has a more sophisticated idea for an encryption system
+through which your email service would know only that you sent mail to
+some user of my email service, and my email service would know only
+that I received mail from some user of your email service, but it
+would be hard to determine that you had sent mail to me.</p>
+
 <h3>But Some Surveillance Is Necessary</h3>
 
 <p>For the state to find criminals, it needs to be able to investigate
@@ -387,14 +404,14 @@
 
 <p>Individuals with special state-granted power, such as police,
 forfeit their right to privacy and must be monitored.  (In fact,
-police have their own jargon term for perjury, &ldquo;<a
-href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302";>testilying</a>,&rdquo;
 since they do
-it so frequently, particularly about protesters and <a
-href="http://photographyisnotacrime.com/";> photographers</a>.)  One
-city in California that required police to wear video cameras all the
-time found <a
-href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>
-their use of force fell by 60%</a>.  The ACLU is in favor of this.</p>
+police have their own jargon term for perjury,
+&ldquo;<a 
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302";>testilying</a>,&rdquo;
+since they do it so frequently, particularly about protesters
+and <a href="http://photographyisnotacrime.com/";>photographers</a>.)
+One city in California that required police to wear video cameras all
+the time
+found <a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>their
+use of force fell by 60%</a>.  The ACLU is in favor of this.</p>
 
 <p><a
 
href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266";>Corporations
@@ -414,11 +431,11 @@
 
 <p>Digital technology has brought about a tremendous increase in the
 level of surveillance of our movements, actions, and communications.
-It is far more than we experienced in the 1990s, and <a
-href="http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html";>
-far more than people behind the Iron Curtain experienced</a> in the
-1980s, and would still be far more even with additional legal limits
-on state use of the accumulated data.</p>
+It is far more than we experienced in the 1990s,
+and <a 
href="http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html";>far
+more than people behind the Iron Curtain experienced</a> in the 1980s,
+and would still be far more even with additional legal limits on state
+use of the accumulated data.</p>
 
 <p>Unless we believe that our free countries previously suffered from
 a grave surveillance deficit, and ought to be surveilled more than the
@@ -483,7 +500,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/04/24 07:02:12 $
+$Date: 2014/05/31 18:27:47 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/surveillance-vs-democracy.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ru.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- philosophy/po/surveillance-vs-democracy.ru.po       31 May 2014 18:10:56 
-0000      1.14
+++ philosophy/po/surveillance-vs-democracy.ru.po       31 May 2014 18:27:47 
-0000      1.15
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2014-05-26 10:25+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -35,13 +34,6 @@
 msgstr "<a href=\"http://www.stallman.org/\";>Ричард Столмен</a>"
 
 #. type: Content of: <blockquote><p>
-# | A version of this article was first published in <a
-# | 
href=\"http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/\";>[-
-# | -]Wired</a> in October 2013.
-#| msgid ""
-#| "A version of this article was first published in <a href=\"http://www.";
-#| "wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-"
-#| "survive-surveillance/\"> Wired</a> in October 2013."
 msgid ""
 "A version of this article was first published in <a href=\"http://www.wired.";
 "com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-"
@@ -74,19 +66,6 @@
 "осведомителей (таких как Сноуден), как 
правило, отлавливают."
 
 #. type: Content of: <p>
-# | Faced with government secrecy, we the people depend on whistleblowers to
-# | <a href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";>[- -]tell
-# | us what the state is doing</a>.  However, today's surveillance intimidates
-# | potential whistleblowers, which means it is too much.  To recover our
-# | democratic control over the state, we must reduce surveillance to the
-# | point where whistleblowers know they are safe.
-#| msgid ""
-#| "Faced with government secrecy, we the people depend on whistleblowers to "
-#| "<a href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";> tell us "
-#| "what the state is doing</a>.  However, today's surveillance intimidates "
-#| "potential whistleblowers, which means it is too much.  To recover our "
-#| "democratic control over the state, we must reduce surveillance to the "
-#| "point where whistleblowers know they are safe."
 msgid ""
 "Faced with government secrecy, we the people depend on whistleblowers to <a "
 "href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";>tell us what "
@@ -104,30 +83,6 @@
 "осведомители будут знать, что они в 
безопасности."
 
 #. type: Content of: <p>
-# | Using free/libre software, <a
-# | href=\"/philosophy/free-software-even-more-important.html\">[- -]as I've
-# | advocated for 30 years</a>, is the first step in taking control of our
-# | digital lives, and that includes preventing surveillance.  We can't trust
-# | nonfree software; the NSA <a
-# | 
href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>[-
-# | -]uses</a> and even <a
-# | 
href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\";>[-
-# | -]creates</a> security weaknesses in nonfree software to invade our own
-# | computers and routers.  Free software gives us control of our own
-# | computers, but <a href=\"http://www.wired.com/opinion/2013/10/149481/\";>[-
-# | -]that won't protect our privacy once we set foot on the Internet</a>.
-#| msgid ""
-#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
-#| "important.html\"> as I've advocated for 30 years</a>, is the first step "
-#| "in taking control of our digital lives, and that includes preventing "
-#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"http://";
-#| "blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-"
-#| "ever-trust-microsoft-again/index.htm\"> uses</a> and even <a href="
-#| "\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-";
-#| "security\"> creates</a> security weaknesses in nonfree software to invade "
-#| "our own computers and routers.  Free software gives us control of our own "
-#| "computers, but <a href=\"http://www.wired.com/opinion/2013/10/149481/\";> "
-#| "that won't protect our privacy once we set foot on the Internet</a>."
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -191,35 +146,6 @@
 "слишком велика, чтобы демократия могла ее 
выдержать."
 
 #. type: Content of: <p>
-# | An unnamed U.S. government official ominously told journalists in 2011
-# | that the <a
-# | 
href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\";>[-
-# | -]U.S. would not subpoena reporters because &ldquo;We know who you're
-# | talking to.&rdquo;</a> Sometimes <a
-# | 
href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\";>[-
-# | -]journalists' phone call records are subpoenaed</a> to find this out, but
-# | Snowden has shown us that in effect they subpoena all the phone call
-# | records of everyone in the U.S., all the time, <a
-# | 
[-href=\"http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\";>
-# | from Verizon </a>-]
-# | 
{+href=\"http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\";>from
-# | Verizon</a>+} and <a
-# | 
href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\";>[-
-# | -]from other companies too</a>.
-#| msgid ""
-#| "An unnamed U.S. government official ominously told journalists in 2011 "
-#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
-#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\"> U.S. would "
-#| "not subpoena reporters because &ldquo;We know who you're talking to."
-#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
-#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\"> journalists' "
-#| "phone call records are subpoenaed</a> to find this out, but Snowden has "
-#| "shown us that in effect they subpoena all the phone call records of "
-#| "everyone in the U.S., all the time, <a href=\"http://www.theguardian.com/";
-#| "world/interactive/2013/jun/06/verizon-telephone-data-court-order\"> from "
-#| "Verizon </a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
-#| "mining-digs-into-networks-beyond-verizon-2013-06-07\"> from other "
-#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
 "the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
@@ -248,22 +174,6 @@
 "into-networks-beyond-verizon-2013-06-07\"> а также от других 
компаний</a>."
 
 #. type: Content of: <p>
-# | Opposition and dissident activities need to keep secrets from states that
-# | are willing to play dirty tricks on them.  The ACLU has demonstrated the
-# | U.S. government's <a
-# | href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf\";>[- -]systematic
-# | practice of infiltrating peaceful dissident groups</a> on the pretext that
-# | there might be terrorists among them.  The point at which surveillance is
-# | too much is the point at which the state can find who spoke to a known
-# | journalist or a known dissident.
-#| msgid ""
-#| "Opposition and dissident activities need to keep secrets from states that "
-#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
-#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
-#| "pdf\"> systematic practice of infiltrating peaceful dissident groups</a> "
-#| "on the pretext that there might be terrorists among them.  The point at "
-#| "which surveillance is too much is the point at which the state can find "
-#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
@@ -287,27 +197,6 @@
 msgstr "Однажды собранными сведениями будут 
злоупотреблять"
 
 #. type: Content of: <p>
-# | When people recognize that the level of general surveillance is too high,
-# | the first response is to propose limits on access to the accumulated data.
-# |  That sounds nice, but it won't fix the problem, not even slightly, even
-# | supposing that the government obeys the rules.  (The NSA has misled the
-# | FISA court, which said it was <a
-# | href=\"http://www.wired.com/threatlevel/2013/09/nsa-violations/\";>[-
-# | -]unable to effectively hold the NSA accountable</a>.) Suspicion of a
-# | crime will be grounds for access, so once a whistleblower is accused of
-# | &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
-# | excuse to access the accumulated material.
-#| msgid ""
-#| "When people recognize that the level of general surveillance is too high, "
-#| "the first response is to propose limits on access to the accumulated "
-#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
-#| "even supposing that the government obeys the rules.  (The NSA has misled "
-#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
-#| "threatlevel/2013/09/nsa-violations/\"> unable to effectively hold the NSA "
-#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
-#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
-#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
-#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
@@ -332,29 +221,6 @@
 "для доступа к накопленному материалу."
 
 #. type: Content of: <p>
-# | The state's surveillance staff will misuse the data for personal reasons
-# | too.  Some NSA agents <a
-# | 
href=\"http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\";>[-
-# | -]used U.S. surveillance systems to track their lovers</a>&mdash;past,
-# | present, or wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo;
-# | The NSA says it has caught and punished this a few times; we don't know
-# | how many other times it wasn't caught.  But these events shouldn't
-# | surprise us, because police have long <a
-# | href=\"http://www.sweetliberty.org/issues/privacy/lein1.htm\";>used their
-# | access to driver's license records to track down someone attractive</a>, a
-# | practice known as &ldquo;running a plate for a date.&rdquo;
-#| msgid ""
-#| "The state's surveillance staff will misuse the data for personal reasons "
-#| "too.  Some NSA agents <a href=\"http://www.theguardian.com/world/2013/";
-#| "aug/24/nsa-analysts-abused-surveillance-systems\"> used U.S. surveillance "
-#| "systems to track their lovers</a>&mdash;past, present, or wished-"
-#| "for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it has "
-#| "caught and punished this a few times; we don't know how many other times "
-#| "it wasn't caught.  But these events shouldn't surprise us, because police "
-#| "have long <a href=\"http://www.sweetliberty.org/issues/privacy/lein1.htm";
-#| "\">used their access to driver's license records to track down someone "
-#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
-#| "&rdquo;"
 msgid ""
 "The state's surveillance staff will misuse the data for personal reasons "
 "too.  Some NSA agents <a href=\"http://www.theguardian.com/world/2013/aug/24/";
@@ -381,22 +247,6 @@
 "назначить свидание&rdquo;."
 
 #. type: Content of: <p>
-# | Surveillance data will always be used for other purposes, even if this is
-# | prohibited.  Once the data has been accumulated and the state has the
-# | possibility of access to it, it can misuse that data in dreadful ways, as
-# | shown by examples from <a
-# | 
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\";>[-
-# | -]Europe</a> and <a
-# | href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>[-
-# | -]the US </a>.
-#| msgid ""
-#| "Surveillance data will always be used for other purposes, even if this is "
-#| "prohibited.  Once the data has been accumulated and the state has the "
-#| "possibility of access to it, it can misuse that data in dreadful ways, as "
-#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
-#| "collected-personal-data-will-always-be-used-against-the-citizens/\"> "
-#| "Europe</a> and <a href=\"https://en.wikipedia.org/wiki/";
-#| "Japanese_American_internment\"> the US </a>."
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -430,21 +280,6 @@
 msgstr "Стойкая защита личной жизни должна 
быть технической"
 
 #. type: Content of: <p>
-# | The Electronic Frontier Foundation and other organizations propose a set
-# | of legal principles designed to <a
-# | href=\"https://en.necessaryandproportionate.org/text\";>[- -]prevent the
-# | abuses of massive surveillance</a>.  These principles include, crucially,
-# | explicit legal protection for whistleblowers; as a consequence, they would
-# | be adequate for protecting democratic freedoms&mdash;if adopted completely
-# | and enforced without exception forever.
-#| msgid ""
-#| "The Electronic Frontier Foundation and other organizations propose a set "
-#| "of legal principles designed to <a href=\"https://en.";
-#| "necessaryandproportionate.org/text\"> prevent the abuses of massive "
-#| "surveillance</a>.  These principles include, crucially, explicit legal "
-#| "protection for whistleblowers; as a consequence, they would be adequate "
-#| "for protecting democratic freedoms&mdash;if adopted completely and "
-#| "enforced without exception forever."
 msgid ""
 "The Electronic Frontier Foundation and other organizations propose a set of "
 "legal principles designed to <a href=\"https://en.necessaryandproportionate.";
@@ -462,13 +297,6 @@
 "и без исключений."
 
 #. type: Content of: <p>
-# | However, such legal protections are precarious: as recent history shows,
-# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
-# | href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>[- -]ignored</a>.
-#| msgid ""
-#| "However, such legal protections are precarious: as recent history shows, "
-#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
-#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";> ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -531,19 +359,6 @@
 "содержимого своей электронной почты. 
Оплачивайте покупки наличными."
 
 #. type: Content of: <p>
-# | [-Never give any web site your entire list of email or phone
-# | contacts.-]Keep your own data; don't store your data in a company's
-# | &ldquo;convenient&rdquo; server.  It's safe, however, to entrust a data
-# | backup to a commercial service, provided you [-encrypted-] {+put the files
-# | in an archive and encrypt+} the [-data,-] {+whole archive,+} including the
-# | [-file names,-] {+names of the files,+} with free software on your own
-# | computer before uploading it.
-#| msgid ""
-#| "Never give any web site your entire list of email or phone contacts.  "
-#| "Keep your own data; don't store your data in a company's &ldquo;"
-#| "convenient&rdquo; server.  It's safe, however, to entrust a data backup "
-#| "to a commercial service, provided you encrypted the data, including the "
-#| "file names, with free software on your own computer before uploading it."
 msgid ""
 "Keep your own data; don't store your data in a company's &ldquo;"
 "convenient&rdquo; server.  It's safe, however, to entrust a data backup to a "
@@ -551,31 +366,13 @@
 "whole archive, including the names of the files, with free software on your "
 "own computer before uploading it."
 msgstr ""
-"Держите свои "
-"данные у себя; не храните свои данные на 
&ldquo;удобном&rdquo; сервере "
-"компании. Однако вполне безопасно вверять 
резервные копии данных "
+"Держите свои данные у себя; не храните 
свои данные на &ldquo;удобном&rdquo; "
+"сервере компании. Однако вполне безопасно 
вверять резервные копии данных "
 "коммерческой службе при условии, что вы 
сложили файлы в архив и зашифровали "
-"весь этот архив, в том числе "
-"имена файлов, на своем компьютере с 
помощью свободных программ перед тем, "
-"как отправлять их на сервер."
-
-#. type: Content of: <p>
-# | For privacy's sake, you must avoid nonfree software since, as a
-# | consequence of giving others control of your computing, it is <a
-# | href=\"/philosophy/proprietary-surveillance.html\">[- -]likely to spy on
-# | you[- -]</a>.  Avoid <a
-# | href=\"/philosophy/who-does-that-server-really-serve.html\">[- -]service
-# | as a software substitute[- -]</a>; as well as giving others control of
-# | your computing, it requires you to hand over all the pertinent data to the
-# | server.
-#| msgid ""
-#| "For privacy's sake, you must avoid nonfree software since, as a "
-#| "consequence of giving others control of your computing, it is <a href=\"/"
-#| "philosophy/proprietary-surveillance.html\"> likely to spy on you </a>.  "
-#| "Avoid <a href=\"/philosophy/who-does-that-server-really-serve.html\"> "
-#| "service as a software substitute </a>; as well as giving others control "
-#| "of your computing, it requires you to hand over all the pertinent data to "
-#| "the server."
+"весь этот архив, в том числе имена файлов, 
на своем компьютере с помощью "
+"свободных программ перед тем, как 
отправлять их на сервер."
+
+#. type: Content of: <p>
 msgid ""
 "For privacy's sake, you must avoid nonfree software since, as a consequence "
 "of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -611,23 +408,11 @@
 "списка телефонных и электронных 
контактов. Не говорите таким компаниям, как 
"
 "Facebook, ничего такого о своих друзьях, что 
они могли бы не хотеть "
 "опубликовать в газете. А еще лучше не 
пользуйтесь Facebook вообще. "
-"Отказывайтесь от систем связи, в которых 
от пользователей требуется "
-"называть свои настоящие имена, даже если 
вы собираетесь назвать свои, "
-"поскольку это поощряет других людей 
отказаться от своей конфиденциальности."
-
-#. type: Content of: <p>
-# | [-However,-]{+Self-protection is essential, but+} even the most rigorous
-# | self-protection is insufficient to protect your privacy on or from systems
-# | that don't belong to you.  When we communicate with others or move around
-# | the city, our privacy depends on the practices of society.  {+We can avoid
-# | some of the systems that surveil our communications and movements, but not
-# | all of them.  Clearly, the better solution is to make all these systems
-# | stop surveilling people other than legitimate suspects.+}
-#| msgid ""
-#| "However, even the most rigorous self-protection is insufficient to "
-#| "protect your privacy on or from systems that don't belong to you.  When "
-#| "we communicate with others or move around the city, our privacy depends "
-#| "on the practices of society."
+"Отказывайтесь от систем связи, в которых 
от пользователей требуется называть "
+"свои настоящие имена, даже если вы 
собираетесь назвать свои, поскольку это "
+"поощряет других людей отказаться от своей 
конфиденциальности."
+
+#. type: Content of: <p>
 msgid ""
 "Self-protection is essential, but even the most rigorous self-protection is "
 "insufficient to protect your privacy on or from systems that don't belong to "
@@ -637,13 +422,13 @@
 "better solution is to make all these systems stop surveilling people other "
 "than legitimate suspects."
 msgstr ""
-"Самозащита важна, но даже самой 
бдительной самозащиты недостаточно, чтобы 
защитить вашу "
-"конфиденциальность на системах, которые 
вам не принадлежат. Когда мы "
-"общаемся с другими или передвигаемся по 
городу, наша конфиденциальность "
-"зависит от сложившейся в обществе 
практики. Мы можем избегать некоторых "
-"систем, которые отслеживают наши 
сообщения и перемещения, но не все их. "
-"Ясно, что лучше было бы заставить все эти 
системы прекратить слежку за "
-"людьми, за исключением законно 
подозреваемых."
+"Самозащита важна, но даже самой 
бдительной самозащиты недостаточно, чтобы "
+"защитить вашу конфиденциальность на 
системах, которые вам не принадлежат. "
+"Когда мы общаемся с другими или 
передвигаемся по городу, наша "
+"конфиденциальность зависит от 
сложившейся в обществе практики. Мы можем "
+"избегать некоторых систем, которые 
отслеживают наши сообщения и перемещения, "
+"но не все их. Ясно, что лучше было бы 
заставить все эти системы прекратить "
+"слежку за людьми, за исключением законно 
подозреваемых."
 
 #. type: Content of: <h3>
 msgid "We Must Design Every System for Privacy"
@@ -695,23 +480,6 @@
 msgstr "Мера против сбора данных: оставлять их 
рассредоточенными"
 
 #. type: Content of: <p>
-# | One way to make monitoring safe for privacy is to <a name=\"dispersal\">[-
-# | -]keep the data dispersed and inconvenient to access</a>.  Old-fashioned
-# | security cameras were no threat to privacy.  The recording was stored on
-# | the premises, and kept for a few weeks at most.  Because of the
-# | inconvenience of accessing these recordings, it was never done massively;
-# | they were accessed only in the places where someone reported a crime.  It
-# | would not be feasible to physically collect millions of tapes every day
-# | and watch them or copy them.
-#| msgid ""
-#| "One way to make monitoring safe for privacy is to <a name=\"dispersal\"> "
-#| "keep the data dispersed and inconvenient to access</a>.  Old-fashioned "
-#| "security cameras were no threat to privacy.  The recording was stored on "
-#| "the premises, and kept for a few weeks at most.  Because of the "
-#| "inconvenience of accessing these recordings, it was never done massively; "
-#| "they were accessed only in the places where someone reported a crime.  It "
-#| "would not be feasible to physically collect millions of tapes every day "
-#| "and watch them or copy them."
 msgid ""
 "One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
 "the data dispersed and inconvenient to access</a>.  Old-fashioned security "
@@ -748,23 +516,6 @@
 "увидеть, с кем они общаются."
 
 #. type: Content of: <p>
-# | Internet-connected cameras often have lousy digital security themselves,
-# | so <a
-# | 
href=\"http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances\";>[-
-# | -]anyone could watch what the camera sees</a>.  To restore privacy, we
-# | should ban the use of Internet-connected cameras aimed where and when the
-# | public is admitted, except when carried by people.  Everyone must be free
-# | to post photos and video recordings occasionally, but the systematic
-# | accumulation of such data on the Internet must be limited.
-#| msgid ""
-#| "Internet-connected cameras often have lousy digital security themselves, "
-#| "so <a href=\"http://www.networkworld.com/community/blog/cia-wants-spy-you-";
-#| "through-your-appliances\"> anyone could watch what the camera sees</a>.  "
-#| "To restore privacy, we should ban the use of Internet-connected cameras "
-#| "aimed where and when the public is admitted, except when carried by "
-#| "people.  Everyone must be free to post photos and video recordings "
-#| "occasionally, but the systematic accumulation of such data on the "
-#| "Internet must be limited."
 msgid ""
 "Internet-connected cameras often have lousy digital security themselves, so "
 "<a href=\"http://www.networkworld.com/community/blog/cia-wants-spy-you-";
@@ -804,23 +555,6 @@
 "государству."
 
 #. type: Content of: <p>
-# | The NSA, through PRISM, has <a
-# | href=\"https://www.commondreams.org/headline/2013/08/23-2\";>[- -]gotten
-# | into the databases of many large Internet corporations</a>.  AT&amp;T has
-# | saved all its phone call records since 1987 and <a
-# | 
href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\";>[-
-# | -]makes them available to the DEA</a> to search on request.  Strictly
-# | speaking, the U.S.  government does not possess that data, but in
-# | practical terms it may as well possess it.
-#| msgid ""
-#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-#| "headline/2013/08/23-2\"> gotten into the databases of many large Internet "
-#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
-#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
-#| "vast-phone-trove-eclipsing-nsas.html?_r=0\"> makes them available to the "
-#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
-#| "does not possess that data, but in practical terms it may as well possess "
-#| "it."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -877,25 +611,6 @@
 "конфиденциальности, чем намерения 
соблюдать ее."
 
 #. type: Content of: <p>
-# | We could correct both problems by adopting a system of anonymous
-# | payments&mdash;anonymous for the payer, that is.  (We don't want the payee
-# | to dodge taxes.)  <a
-# | 
href=\"http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\";>[-
-# | -]Bitcoin is not anonymous</a>, though there are efforts to develop ways
-# | to pay anonymously with Bitcoin.  However, technology for <a
-# | href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.html\";>[-
-# | -]digital cash was first developed in the 1980s</a>; we need only suitable
-# | business arrangements, and for the state not to obstruct them.
-#| msgid ""
-#| "We could correct both problems by adopting a system of anonymous "
-#| "payments&mdash;anonymous for the payer, that is.  (We don't want the "
-#| "payee to dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
-#| "lets-cut-through-the-bitcoin-hype/\"> Bitcoin is not anonymous</a>, "
-#| "though there are efforts to develop ways to pay anonymously with "
-#| "Bitcoin.  However, technology for <a href=\"http://www.wired.com/wired/";
-#| "archive/2.12/emoney_pr.html\"> digital cash was first developed in the "
-#| "1980s</a>; we need only suitable business arrangements, and for the state "
-#| "not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want the payee "
@@ -933,27 +648,6 @@
 msgstr "Меры против слежки за передвижениями"
 
 #. type: Content of: <p>
-# | We must convert digital toll collection to anonymous payment (using
-# | digital cash, for instance).  License-plate recognition systems recognize
-# | all license plates, and the <a
-# | 
href=\"http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm\";>[-
-# | -]data can be kept indefinitely</a>; they should be required by law to
-# | notice and record only those license numbers that are on a list of cars
-# | sought by court orders.  A less secure alternative would record all cars
-# | locally but only for a few days, and not make the full data available over
-# | the Internet; access to the data should be limited to searching for a list
-# | of court-ordered license-numbers.
-#| msgid ""
-#| "We must convert digital toll collection to anonymous payment (using "
-#| "digital cash, for instance).  License-plate recognition systems recognize "
-#| "all license plates, and the <a href=\"http://news.bbc.co.uk/2/hi/";
-#| "programmes/whos_watching_you/8064333.stm\"> data can be kept "
-#| "indefinitely</a>; they should be required by law to notice and record "
-#| "only those license numbers that are on a list of cars sought by court "
-#| "orders.  A less secure alternative would record all cars locally but only "
-#| "for a few days, and not make the full data available over the Internet; "
-#| "access to the data should be limited to searching for a list of court-"
-#| "ordered license-numbers."
 msgid ""
 "We must convert digital toll collection to anonymous payment (using digital "
 "cash, for instance).  License-plate recognition systems recognize all "
@@ -977,14 +671,6 @@
 "в розыске."
 
 #. type: Content of: <p>
-# | The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a
-# | 
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes\";>[-
-# | -]punishment without trial</a>.
-#| msgid ""
-#| "The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a "
-#| "href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-";
-#| "racial-justice/victory-federal-court-recognizes\"> punishment without "
-#| "trial</a>."
 msgid ""
 "The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a href="
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
@@ -1083,28 +769,6 @@
 msgstr "Меры против коммуникационных досье"
 
 #. type: Content of: <p>
-# | Internet service providers and telephone companies keep extensive data on
-# | their users' contacts (browsing, phone calls, etc).  With mobile phones,
-# | they also <a
-# | 
href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>[-
-# | -]record the user's physical location</a>.  They keep these dossiers for a
-# | long time: over 30 years, in the case of AT&amp;T.  Soon they will even <a
-# | 
href=\"http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\";>[-
-# | -]record the user's body activities</a>.  It appears that the <a
-# | 
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\";>[-
-# | -]NSA collects cell phone location data</a> in bulk.
-#| msgid ""
-#| "Internet service providers and telephone companies keep extensive data on "
-#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-#| "protection-malte-spitz\"> record the user's physical location</a>.  They "
-#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
-#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
-#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
-#| "become-qs-activity-trackers/\"> record the user's body activities</a>.  "
-#| "It appears that the <a href=\"https://www.aclu.org/blog/national-security-";
-#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\"> NSA "
-#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
@@ -1146,27 +810,6 @@
 "судебном порядке."
 
 #. type: Content of: <p>
-# | This solution is not entirely satisfactory, because it won't physically
-# | stop the government from collecting all the information immediately as it
-# | is generated&mdash;which is what the <a
-# | 
href=\"http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\";>[-
-# | -]U.S. does with some or all phone companies</a>.  We would have to rely
-# | on prohibiting that by law.  However, that would be better than the
-# | current situation, where the relevant law (the PATRIOT Act) does not
-# | clearly prohibit the practice.  In addition, if the government did resume
-# | this sort of surveillance, it would not get data about everyone's phone
-# | calls made prior to that time.
-#| msgid ""
-#| "This solution is not entirely satisfactory, because it won't physically "
-#| "stop the government from collecting all the information immediately as it "
-#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
-#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\"> U.S. does with "
-#| "some or all phone companies</a>.  We would have to rely on prohibiting "
-#| "that by law.  However, that would be better than the current situation, "
-#| "where the relevant law (the PATRIOT Act) does not clearly prohibit the "
-#| "practice.  In addition, if the government did resume this sort of "
-#| "surveillance, it would not get data about everyone's phone calls made "
-#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
@@ -1201,15 +844,15 @@
 "service would know only that I received mail from some user of your email "
 "service, but it would be hard to determine that you had sent mail to me."
 msgstr ""
-"Что касается тайны электронной переписки, 
простым частичным решением "
-"для вас и других будет пользоваться 
службами электронной почты в стране, "
-"которая никогда не стала бы сотрудничать 
с вашим правительством, и "
-"связываться друг с другом с 
использованием криптографии. Однако у 
Лейдера "
-"Левисона (владелеца почтовой службы Lavabit, 
которую слежка США пыталась "
-"полностью разложить) есть мысль о 
криптографической системе, с помощью "
-"которой вашей службе электронной почты 
было бы известно только то, что "
-"вы послали сообщение какому-то 
пользователю моей службы электронной 
почты, "
-"но было бы трудно определить, что вы 
послали сообщение мне."
+"Что касается тайны электронной переписки, 
простым частичным решением для вас "
+"и других будет пользоваться службами 
электронной почты в стране, которая "
+"никогда не стала бы сотрудничать с вашим 
правительством, и связываться друг "
+"с другом с использованием криптографии. 
Однако у Лейдера Левисона (владелеца "
+"почтовой службы Lavabit, которую слежка США 
пыталась полностью разложить) "
+"есть мысль о криптографической системе, с 
помощью которой вашей службе "
+"электронной почты было бы известно только 
то, что вы послали сообщение "
+"какому-то пользователю моей службы 
электронной почты, но было бы трудно "
+"определить, что вы послали сообщение мне."
 
 #. type: Content of: <h3>
 msgid "But Some Surveillance Is Necessary"
@@ -1232,27 +875,6 @@
 "счастью, это не дает возможности находить 
осведомителей задним числом."
 
 #. type: Content of: <p>
-# | Individuals with special state-granted power, such as police, forfeit
-# | their right to privacy and must be monitored.  (In fact, police have their
-# | own jargon term for perjury, &ldquo;<a
-# | 
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302\";>testilying</a>,&rdquo;
-# | since they do it so frequently, particularly about protesters and <a
-# | href=\"http://photographyisnotacrime.com/\";>[- -]photographers</a>.)  One
-# | city in California that required police to wear video cameras all the time
-# | found <a
-# | 
href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\";>[-
-# | -]their use of force fell by 60%</a>.  The ACLU is in favor of this.
-#| msgid ""
-#| "Individuals with special state-granted power, such as police, forfeit "
-#| "their right to privacy and must be monitored.  (In fact, police have "
-#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
-#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
-#| "&rdquo; since they do it so frequently, particularly about protesters and "
-#| "<a href=\"http://photographyisnotacrime.com/\";> photographers</a>.)  One "
-#| "city in California that required police to wear video cameras all the "
-#| "time found <a href=\"http://www.motherjones.com/kevin-drum/2013/08/";
-#| "ubiquitous-surveillance-police-edition\"> their use of force fell by 60%</"
-#| "a>.  The ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1311,21 +933,6 @@
 "ходе предпринимательской деятельности."
 
 #. type: Content of: <p>
-# | Digital technology has brought about a tremendous increase in the level of
-# | surveillance of our movements, actions, and communications.  It is far
-# | more than we experienced in the 1990s, and <a
-# | 
href=\"http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html\";>[-
-# | -]far more than people behind the Iron Curtain experienced</a> in the
-# | 1980s, and would still be far more even with additional legal limits on
-# | state use of the accumulated data.
-#| msgid ""
-#| "Digital technology has brought about a tremendous increase in the level "
-#| "of surveillance of our movements, actions, and communications.  It is far "
-#| "more than we experienced in the 1990s, and <a href=\"http://blogs.hbr.org/";
-#| "cs/2013/06/your_iphone_works_for_the_secret_police.html\"> far more than "
-#| "people behind the Iron Curtain experienced</a> in the 1980s, and would "
-#| "still be far more even with additional legal limits on state use of the "
-#| "accumulated data."
 msgid ""
 "Digital technology has brought about a tremendous increase in the level of "
 "surveillance of our movements, actions, and communications.  It is far more "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]