[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www distros/free-system-distribution-guidelines...
From: |
GNUN |
Subject: |
www distros/free-system-distribution-guidelines... |
Date: |
Sat, 31 May 2014 18:28:15 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 14/05/31 18:28:15
Modified files:
distros : free-system-distribution-guidelines.ru.html
distros/po : free-system-distribution-guidelines.ru-en.html
free-system-distribution-guidelines.ru.po
philosophy : free-sw.ru.html
surveillance-vs-democracy.ru.html
philosophy/po : free-sw.ru-en.html free-sw.ru.po
surveillance-vs-democracy.ru-en.html
surveillance-vs-democracy.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/free-system-distribution-guidelines.ru.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-system-distribution-guidelines.ru-en.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-system-distribution-guidelines.ru.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/free-sw.ru.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ru.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-sw.ru-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-sw.ru.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru.po?cvsroot=www&r1=1.14&r2=1.15
Patches:
Index: distros/free-system-distribution-guidelines.ru.html
===================================================================
RCS file: /web/www/www/distros/free-system-distribution-guidelines.ru.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- distros/free-system-distribution-guidelines.ru.html 14 Apr 2014 07:08:06
-0000 1.45
+++ distros/free-system-distribution-guidelines.ru.html 31 May 2014 18:27:43
-0000 1.46
@@ -1,11 +1,9 @@
-
+<!--#set var="ENGLISH_PAGE"
value="/distros/free-system-distribution-guidelines.en.html" -->
<!--#include virtual="/server/header.ru.html" -->
<!-- Parent-Version: 1.77 -->
<!-- This file is automatically generated by GNUnited Nations! -->
- <!--#set var="ENGLISH_PAGE"
value="/distros/free-system-distribution-guidelines.en.html" -->
-
<title>РекомендаÑии Ð´Ð»Ñ ÑвободнÑÑ
диÑÑÑибÑÑивов ÑиÑÑем - ÐÑÐ¾ÐµÐºÑ GNU - Фонд
Ñвободного пÑогÑаммного обеÑпеÑениÑ</title>
<link rel="alternate" title="СвободнÑе диÑÑÑибÑÑивÑ
GNU/Linux"
@@ -250,6 +248,13 @@
ÑказÑваÑÑÑÑ Ð½Ð° gnu.org или gnu.org/philosophy длÑ
более подÑобнÑÑ
Ñведений о
вопÑоÑе.</p>
+<h3 id="words-to-avoid">ÐожалÑйÑÑа, не повÑоÑÑйÑе
пÑÐ¾Ð¿Ð°Ð³Ð°Ð½Ð´Ñ Ð¸ пÑÑаниÑÑ</h3>
+
+<p>ÐожалÑйÑÑа, ознакомÑÑеÑÑ Ñ Ð½Ð°Ñим <a
href="/philosophy/words-to-avoid.html">
+ÑпиÑком Ñлов, коÑоÑÑÑ
ÑледÑÐµÑ Ð¸Ð·Ð±ÐµÐ³Ð°ÑÑ</a>:
они либо необÑекÑÐ¸Ð²Ð½Ñ Ð¸ вводÑÑ Ð²
+заблÑждение; ÑÑаÑайÑеÑÑ Ð¸Ð·Ð±ÐµÐ³Ð°ÑÑ Ð¸Ñ
в
ÑвоиÑ
пÑблиÑнÑÑ
заÑвлениÑÑ
и
+диÑкÑÑÑиÑÑ
.</p>
+
<h3 id="final-notes">ÐконÑаÑелÑнÑе замеÑаниÑ</h3>
<p>ÐÑ Ð¿Ð¾Ð´Ð´ÐµÑживаем пеÑеÑÐµÐ½Ñ <a
href="/distros/free-distros.html">ÑвободнÑÑ
@@ -347,7 +352,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2014/04/14 07:08:06 $
+$Date: 2014/05/31 18:27:43 $
<!-- timestamp end -->
</p>
Index: distros/po/free-system-distribution-guidelines.ru-en.html
===================================================================
RCS file:
/web/www/www/distros/po/free-system-distribution-guidelines.ru-en.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- distros/po/free-system-distribution-guidelines.ru-en.html 14 Apr 2014
07:08:07 -0000 1.29
+++ distros/po/free-system-distribution-guidelines.ru-en.html 31 May 2014
18:27:44 -0000 1.30
@@ -238,6 +238,13 @@
gnu.org or gnu.org/philosophy for further information about the
issue.</p>
+<h3 id="words-to-avoid">Please Avoid Repeating Propaganda and Confusion</h3>
+
+<p>Please see our list
+of <a href="/philosophy/words-to-avoid.html">words to avoid</a>, which
+are either biased, misguided or misleading, and try to avoid them in
+your public statements and discussions with the public.</p>
+
<h3 id="final-notes">Final Notes</h3>
<p>We maintain a list of the <a href="/distros/free-distros.html">free
@@ -316,7 +323,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/04/14 07:08:07 $
+$Date: 2014/05/31 18:27:44 $
<!-- timestamp end -->
</p>
</div>
Index: distros/po/free-system-distribution-guidelines.ru.po
===================================================================
RCS file: /web/www/www/distros/po/free-system-distribution-guidelines.ru.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- distros/po/free-system-distribution-guidelines.ru.po 31 May 2014
18:11:02 -0000 1.52
+++ distros/po/free-system-distribution-guidelines.ru.po 31 May 2014
18:27:45 -0000 1.53
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2014-05-29 08:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -553,9 +552,9 @@
"avoid</a>, which are either biased, misguided or misleading, and try to "
"avoid them in your public statements and discussions with the public."
msgstr ""
-"ÐожалÑйÑÑа, ознакомÑÑеÑÑ Ñ Ð½Ð°Ñим <a
href=\"/philosophy/words-to-avoid.html\"> "
-"ÑпиÑком Ñлов, коÑоÑÑÑ
ÑледÑÐµÑ Ð¸Ð·Ð±ÐµÐ³Ð°ÑÑ</a>:
они либо необÑекÑÐ¸Ð²Ð½Ñ Ð¸ вводÑÑ "
-"в заблÑждение; ÑÑаÑайÑеÑÑ Ð¸Ð·Ð±ÐµÐ³Ð°ÑÑ Ð¸Ñ
в
ÑвоиÑ
пÑблиÑнÑÑ
заÑвлениÑÑ
и "
+"ÐожалÑйÑÑа, ознакомÑÑеÑÑ Ñ Ð½Ð°Ñим <a
href=\"/philosophy/words-to-avoid.html"
+"\"> ÑпиÑком Ñлов, коÑоÑÑÑ
ÑледÑеÑ
избегаÑÑ</a>: они либо необÑекÑÐ¸Ð²Ð½Ñ Ð¸ "
+"вводÑÑ Ð² заблÑждение; ÑÑаÑайÑеÑÑ Ð¸Ð·Ð±ÐµÐ³Ð°ÑÑ
иÑ
в ÑвоиÑ
пÑблиÑнÑÑ
заÑвлениÑÑ
и "
"диÑкÑÑÑиÑÑ
."
#. type: Content of: <h3>
Index: philosophy/free-sw.ru.html
===================================================================
RCS file: /web/www/www/philosophy/free-sw.ru.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- philosophy/free-sw.ru.html 12 Apr 2014 13:56:21 -0000 1.44
+++ philosophy/free-sw.ru.html 31 May 2014 18:27:46 -0000 1.45
@@ -1,11 +1,9 @@
-
+<!--#set var="ENGLISH_PAGE" value="/philosophy/free-sw.en.html" -->
<!--#include virtual="/server/header.ru.html" -->
<!-- Parent-Version: 1.77 -->
<!-- This file is automatically generated by GNUnited Nations! -->
- <!--#set var="ENGLISH_PAGE" value="/philosophy/free-sw.en.html" -->
-
<title>ЧÑо Ñакое ÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма? - ÐÑоекÑ
GNU - Фонд Ñвободного пÑогÑаммного
обеÑпеÑениÑ</title>
@@ -58,7 +56,7 @@
</p>
<ul>
- <li>Свобода вÑполнÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð² лÑбÑÑ
ÑелÑÑ
(Ñвобода 0).</li>
+ <li>Свобода вÑполнÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ°Ðº вам
Ñгодно в лÑбÑÑ
ÑелÑÑ
(Ñвобода 0).</li>
<li>Свобода изÑÑаÑÑ ÑабоÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð¸
модиÑиÑиÑоваÑÑ Ð¿ÑогÑаммÑ, ÑÑÐ¾Ð±Ñ Ð¾Ð½Ð°
вÑполнÑла ваÑи вÑÑиÑлениÑ, как вÑ
пожелаеÑе (Ñвобода 1). ÐÑо пÑедполагаеÑ
доÑÑÑп к иÑÑ
Ð¾Ð´Ð½Ð¾Ð¼Ñ ÑекÑÑÑ.
@@ -107,6 +105,11 @@
</p>
<p>
+Свобода вÑполнÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ°Ðº вам
Ñгодно ознаÑаеÑ, ÑÑо вам не запÑеÑено и
+не меÑаÑÑ Ð´ÐµÐ»Ð°ÑÑ ÑÑо. ÐÑо никак не ÑвÑзано
ни Ñ Ñем, какой ÑÑнкÑионалÑноÑÑÑÑ
+Ð¾Ð±Ð»Ð°Ð´Ð°ÐµÑ Ð¿ÑогÑамма, ни Ñ Ñем, полезна ли
она Ð´Ð»Ñ Ñого, ÑÑо Ð²Ñ Ñ
оÑиÑе делаÑÑ.</p>
+
+<p>
Свобода пеÑедаваÑÑ ÐºÐ¾Ð¿Ð¸Ð¸ должна
ÑаÑпÑоÑÑÑанÑÑÑÑÑ ÐºÐ°Ðº на двоиÑнÑе или
иÑполнÑемÑе ÑоÑÐ¼Ñ Ð¿ÑогÑаммÑ, Ñак и на иÑÑ
однÑй ÑекÑÑ, Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñми или без
ниÑ
(ÑаÑпÑоÑÑÑанение пÑогÑамм в
иÑполнимом виде необÑ
одимо Ð´Ð»Ñ ÑдобÑÑва в
@@ -392,6 +395,15 @@
<ul>
<li><a
+href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&r1=1.134&r2=1.135">ÐеÑÑиÑ
+1.135</a>: ÐаждÑй Ñаз говоÑиÑÑÑ, ÑÑо
Ñвобода 0 — ÑÑо Ñвобода
+вÑполнÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ°Ðº вам Ñгодно.</li>
+
+<li><a
+href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&r1=1.133&r2=1.134">ÐеÑÑиÑ
+1.134</a>: Свобода 0 не ÑвÑзана Ñ
ÑÑнкÑионалÑноÑÑÑÑ Ð¿ÑогÑаммÑ.</li>
+
+<li><a
href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&r1=1.130&r2=1.131">Version
1.131</a>: ÐиÑÐµÐ½Ð·Ð¸Ñ Ñвободной пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ðµ
Ð¼Ð¾Ð¶ÐµÑ ÑÑебоваÑÑ ÑоблÑдениÑ
лиÑензии дÑÑгой, неÑвободной пÑогÑаммÑ.</li>
@@ -597,7 +609,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2014/04/12 13:56:21 $
+$Date: 2014/05/31 18:27:46 $
<!-- timestamp end -->
</p>
Index: philosophy/surveillance-vs-democracy.ru.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.ru.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/surveillance-vs-democracy.ru.html 15 Apr 2014 04:01:36
-0000 1.5
+++ philosophy/surveillance-vs-democracy.ru.html 31 May 2014 18:27:46
-0000 1.6
@@ -1,11 +1,9 @@
-
+<!--#set var="ENGLISH_PAGE"
value="/philosophy/surveillance-vs-democracy.en.html" -->
<!--#include virtual="/server/header.ru.html" -->
<!-- Parent-Version: 1.77 -->
<!-- This file is automatically generated by GNUnited Nations! -->
- <!--#set var="ENGLISH_PAGE"
value="/philosophy/surveillance-vs-democracy.en.html" -->
-
<title>СколÑко Ñлежки Ð¼Ð¾Ð¶ÐµÑ Ð²ÑдеÑжаÑÑ
демокÑаÑиÑ? - ÐÑÐ¾ÐµÐºÑ GNU - Фонд Ñвободного
пÑогÑаммного обеÑпеÑениÑ</title>
@@ -166,20 +164,18 @@
<h3>Ðо-пеÑвÑÑ
, не бÑÑÑ Ð´ÑÑаками</h3>
-<p>ЧÑÐ¾Ð±Ñ Ñ Ð²Ð°Ñ Ð±Ñла конÑиденÑиалÑноÑÑÑ, вÑ
не Ð´Ð¾Ð»Ð¶Ð½Ñ ÐµÐµ вÑбÑаÑÑваÑÑ: заÑиÑаÑÑ
-ваÑÑ ÐºÐ¾Ð½ÑиденÑиалÑноÑÑÑ Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¿Ñежде
вÑего Ð²Ñ Ñами. Ðе ÑаÑÑказÑвайÑе
-компании, Ñакой как Facebook, ниÑего Ñакого,
ÑÑо Ð²Ñ Ð½Ðµ пеÑедали Ð±Ñ Ð´Ð»Ñ
-пÑбликаÑии в газеÑе. Ðе ÑаÑÑказÑвайÑе
компании, Ñакой как Facebook, о ÑвоиÑ
-знакомÑÑ
ниÑего Ñакого, ÑÑо они не Ñ
оÑели
Ð±Ñ Ð¾Ð¿ÑбликоваÑÑ Ð² газеÑе. РеÑе
-лÑÑÑе не бÑÑÑ Ð¾Ð´Ð½Ð¸Ð¼ из полÑзоваÑелей Facebook
вообÑе.</p>
-
-<p>Ðикогда не пеÑедавайÑе ни на какой ÑайÑ
полного ÑпиÑка адÑеÑов ÑлекÑÑонной
-поÑÑÑ Ð¸ номеÑов ÑелеÑонов лÑдей, Ñ
коÑоÑÑми Ð²Ñ Ð¾Ð±ÑаеÑеÑÑ. ÐеÑжиÑе Ñвои
-даннÑе Ñ ÑебÑ; не Ñ
ÑаниÑе Ñвои даннÑе на
“Ñдобном” ÑеÑвеÑе
-компании. Ðднако вполне безопаÑно ввеÑÑÑÑ
ÑезеÑвнÑе копии даннÑÑ
-коммеÑÑеÑкой ÑлÑжбе пÑи ÑÑловии, ÑÑо вÑ
заÑиÑÑовали ÑÑи даннÑе, в Ñом ÑиÑле
-имена Ñайлов, на Ñвоем компÑÑÑеÑе Ñ
помоÑÑÑ ÑвободнÑÑ
пÑогÑамм пеÑед Ñем,
-как оÑпÑавлÑÑÑ Ð¸Ñ
на ÑеÑвеÑ.</p>
+<p>ЧÑÐ¾Ð±Ñ Ñ Ð½Ð°Ñ Ð±Ñла конÑиденÑиалÑноÑÑÑ, мÑ
не Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¾ÑбÑаÑÑваÑÑ ÐµÐµ: пеÑвÑй,
+кÑо должен заÑиÑаÑÑ Ð²Ð°ÑÑ
конÑиденÑиалÑноÑÑÑ — ÑÑо вÑ.
ÐзбегайÑе
+иденÑиÑиÑиÑоваÑÑ ÑÐµÐ±Ñ Ð½Ð° ÑайÑаÑ
ÐнÑеÑнеÑа, ÑвÑзÑвайÑеÑÑ Ñ Ð½Ð¸Ð¼Ð¸ по Tor и
+полÑзÑйÑеÑÑ Ð±ÑаÑзеÑами, коÑоÑÑе блокиÑÑÑÑ
ÑÑ
емÑ, пÑименÑемÑе на ÑайÑаÑ
длÑ
+оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾ÑеÑиÑелей. ÐÑименÑйÑе GNU
Privacy Guard Ð´Ð»Ñ ÑиÑÑованиÑ
+ÑодеÑжимого Ñвоей ÑлекÑÑонной поÑÑÑ.
ÐплаÑивайÑе покÑпки налиÑнÑми.</p>
+
+<p>ÐеÑжиÑе Ñвои даннÑе Ñ ÑебÑ; не Ñ
ÑаниÑе
Ñвои даннÑе на “Ñдобном”
+ÑеÑвеÑе компании. Ðднако вполне безопаÑно
ввеÑÑÑÑ ÑезеÑвнÑе копии даннÑÑ
+коммеÑÑеÑкой ÑлÑжбе пÑи ÑÑловии, ÑÑо вÑ
Ñложили ÑÐ°Ð¹Ð»Ñ Ð² аÑÑ
ив и заÑиÑÑовали
+веÑÑ ÑÑÐ¾Ñ Ð°ÑÑ
ив, в Ñом ÑиÑле имена Ñайлов,
на Ñвоем компÑÑÑеÑе Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ
+ÑвободнÑÑ
пÑогÑамм пеÑед Ñем, как
оÑпÑавлÑÑÑ Ð¸Ñ
на ÑеÑвеÑ.</p>
<p>Ради конÑиденÑиалÑноÑÑи Ð²Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ
избегаÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм, поÑколÑкÑ
вÑледÑÑвие пеÑедаÑи дÑÑгим конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
ваÑими вÑÑиÑлениÑми, они, <a
@@ -189,10 +185,24 @@
пÑогÑамм</a>, а Ñакже пеÑедаÑи дÑÑгим
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ваÑими вÑÑиÑлениÑми, ÑÑо
ÑÑебÑÐµÑ Ð¾Ñ Ð²Ð°Ñ Ð¿ÑедоÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð²ÑеÑ
обÑабаÑÑваемÑÑ
даннÑÑ
на ÑеÑвеÑ.</p>
-<p>Ðднако даже Ñамой бдиÑелÑной ÑамозаÑиÑÑ
недоÑÑаÑоÑно, ÑÑÐ¾Ð±Ñ Ð·Ð°ÑиÑиÑÑ Ð²Ð°ÑÑ
-конÑиденÑиалÑноÑÑÑ Ð½Ð° ÑиÑÑемаÑ
, коÑоÑÑе
вам не пÑинадлежаÑ. Ðогда мÑ
-обÑаемÑÑ Ñ Ð´ÑÑгими или пеÑедвигаемÑÑ Ð¿Ð¾
гоÑодÑ, наÑа конÑиденÑиалÑноÑÑÑ
-завиÑÐ¸Ñ Ð¾Ñ ÑложивÑейÑÑ Ð² обÑеÑÑве
пÑакÑики.</p>
+<p>ÐаÑиÑайÑе Ñакже конÑиденÑиалÑноÑÑÑ
ÑвоиÑ
дÑÑзей и знакомÑÑ
. <a
+href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Ðе
+вÑдавайÑе иÑ
лиÑнÑÑ
даннÑÑ
</a>, кÑоме необÑ
одимÑÑ
Ð´Ð»Ñ ÑвÑзи Ñ Ð½Ð¸Ð¼Ð¸, и
+никогда не пеÑедавайÑе Ð½Ð¸ÐºÐ°ÐºÐ¾Ð¼Ñ ÑайÑÑ
Ñвоего ÑпиÑка ÑелеÑоннÑÑ
и ÑлекÑÑоннÑÑ
+конÑакÑов. Ðе говоÑиÑе Ñаким компаниÑм,
как Facebook, ниÑего Ñакого о ÑвоиÑ
+дÑÑзÑÑÑ
, ÑÑо они могли Ð±Ñ Ð½Ðµ Ñ
оÑеÑÑ
опÑбликоваÑÑ Ð² газеÑе. РеÑе лÑÑÑе не
+полÑзÑйÑеÑÑ Facebook вообÑе. ÐÑказÑвайÑеÑÑ Ð¾Ñ
ÑиÑÑем ÑвÑзи, в коÑоÑÑÑ
оÑ
+полÑзоваÑелей ÑÑебÑеÑÑÑ Ð½Ð°Ð·ÑваÑÑ Ñвои
наÑÑоÑÑие имена, даже еÑли вÑ
+ÑобиÑаеÑеÑÑ Ð½Ð°Ð·Ð²Ð°ÑÑ Ñвои, поÑколÑÐºÑ ÑÑо
пооÑÑÑÐµÑ Ð´ÑÑгиÑ
лÑдей оÑказаÑÑÑÑ Ð¾Ñ
+Ñвоей конÑиденÑиалÑноÑÑи.</p>
+
+<p>СамозаÑиÑа важна, но даже Ñамой
бдиÑелÑной ÑамозаÑиÑÑ Ð½ÐµÐ´Ð¾ÑÑаÑоÑно, ÑÑобÑ
+заÑиÑиÑÑ Ð²Ð°ÑÑ ÐºÐ¾Ð½ÑиденÑиалÑноÑÑÑ Ð½Ð°
ÑиÑÑемаÑ
, коÑоÑÑе вам не
+пÑинадлежаÑ. Ðогда Ð¼Ñ Ð¾Ð±ÑаемÑÑ Ñ Ð´ÑÑгими
или пеÑедвигаемÑÑ Ð¿Ð¾ гоÑодÑ, наÑа
+конÑиденÑиалÑноÑÑÑ Ð·Ð°Ð²Ð¸ÑÐ¸Ñ Ð¾Ñ
ÑложивÑейÑÑ Ð² обÑеÑÑве пÑакÑики. ÐÑ Ð¼Ð¾Ð¶ÐµÐ¼
+избегаÑÑ Ð½ÐµÐºÐ¾ÑоÑÑÑ
ÑиÑÑем, коÑоÑÑе
оÑÑлеживаÑÑ Ð½Ð°Ñи ÑообÑÐµÐ½Ð¸Ñ Ð¸ пеÑемеÑениÑ,
+но не вÑе иÑ
. ЯÑно, ÑÑо лÑÑÑе бÑло бÑ
заÑÑавиÑÑ Ð²Ñе ÑÑи ÑиÑÑÐµÐ¼Ñ Ð¿ÑекÑаÑиÑÑ
+ÑÐ»ÐµÐ¶ÐºÑ Ð·Ð° лÑдÑми, за иÑклÑÑением законно
подозÑеваемÑÑ
.</p>
<h3>ÐаждÑÑ ÑиÑÑÐµÐ¼Ñ Ð½Ñжно пÑоекÑиÑоваÑÑ Ñ
ÑÑеÑом конÑиденÑиалÑноÑÑи</h3>
@@ -380,6 +390,16 @@
Ñакого Ñода ÑлежкÑ, оно не полÑÑило бÑ
даннÑе о ÑелеÑоннÑÑ
пеÑеговоÑаÑ
каждого, пÑоведеннÑÑ
до ÑÑого вÑемени.</p>
+<p>ЧÑо каÑаеÑÑÑ ÑÐ°Ð¹Ð½Ñ ÑлекÑÑонной
пеÑепиÑки, пÑоÑÑÑм ÑаÑÑиÑнÑм ÑеÑением длÑ
ваÑ
+и дÑÑгиÑ
бÑÐ´ÐµÑ Ð¿Ð¾Ð»ÑзоваÑÑÑÑ ÑлÑжбами
ÑлекÑÑонной поÑÑÑ Ð² ÑÑÑане, коÑоÑаÑ
+никогда не ÑÑала Ð±Ñ ÑоÑÑÑдниÑаÑÑ Ñ Ð²Ð°Ñим
пÑавиÑелÑÑÑвом, и ÑвÑзÑваÑÑÑÑ Ð´ÑÑг
+Ñ Ð´ÑÑгом Ñ Ð¸ÑполÑзованием кÑипÑогÑаÑии.
Ðднако Ñ ÐейдеÑа ÐевиÑона (владелеÑа
+поÑÑовой ÑлÑÐ¶Ð±Ñ Lavabit, коÑоÑÑÑ Ñлежка СШÐ
пÑÑалаÑÑ Ð¿Ð¾Ð»Ð½Ð¾ÑÑÑÑ ÑазложиÑÑ)
+еÑÑÑ Ð¼ÑÑÐ»Ñ Ð¾ кÑипÑогÑаÑиÑеÑкой ÑиÑÑеме, Ñ
помоÑÑÑ ÐºÐ¾ÑоÑой ваÑей ÑлÑжбе
+ÑлекÑÑонной поÑÑÑ Ð±Ñло Ð±Ñ Ð¸Ð·Ð²ÐµÑÑно ÑолÑко
Ñо, ÑÑо Ð²Ñ Ð¿Ð¾Ñлали ÑообÑение
+какомÑ-Ñо полÑзоваÑÐµÐ»Ñ Ð¼Ð¾ÐµÐ¹ ÑлÑжбÑ
ÑлекÑÑонной поÑÑÑ, но бÑло Ð±Ñ ÑÑÑдно
+опÑеделиÑÑ, ÑÑо Ð²Ñ Ð¿Ð¾Ñлали ÑообÑение мне.</p>
+
<h3>Ðо иногда Ñлежка необÑ
одима</h3>
<p>ÐÐ»Ñ ÑозÑÑка пÑеÑÑÑпников гоÑÑдаÑÑÑвÑ
необÑ
одима возможноÑÑÑ ÑаÑÑледоваÑÑ
@@ -508,7 +528,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2014/04/15 04:01:36 $
+$Date: 2014/05/31 18:27:46 $
<!-- timestamp end -->
</p>
Index: philosophy/po/free-sw.ru-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/free-sw.ru-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- philosophy/po/free-sw.ru-en.html 12 Apr 2014 13:58:49 -0000 1.33
+++ philosophy/po/free-sw.ru-en.html 31 May 2014 18:27:47 -0000 1.34
@@ -51,7 +51,8 @@
</p>
<ul>
- <li>The freedom to run the program, for any purpose (freedom 0).</li>
+ <li>The freedom to run the program as you wish,
+ for any purpose (freedom 0).</li>
<li>The freedom to study how the program works, and change it so it
does your computing as you wish (freedom 1). Access to the source
code is a precondition for this.
@@ -102,6 +103,12 @@
</p>
<p>
+The freedom to run the program as you wish means that you are not
+forbidden or stopped from doing so. It has nothing to do with what
+functionality the program has, or whether it is useful for what you
+want to do.</p>
+
+<p>
The freedom to redistribute copies must include binary or executable
forms of the program, as well as source code, for both modified and
unmodified versions. (Distributing programs in runnable form is necessary
@@ -374,6 +381,13 @@
<ul>
+<li><a
href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&r1=1.134&r2=1.135">Version
+1.135</a>: Say each time that freedom 0 is the freedom to run the program
+as you wish.</li>
+
+<li><a
href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&r1=1.133&r2=1.134">Version
+1.134</a>: Freedom 0 is not a matter of the program's functionality.</li>
+
<li><a
href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&r1=1.130&r2=1.131">Version
1.131</a>: A free license may not require compliance with a nonfree license
of another program.</li>
@@ -541,7 +555,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/04/12 13:58:49 $
+$Date: 2014/05/31 18:27:47 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/free-sw.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-sw.ru.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- philosophy/po/free-sw.ru.po 31 May 2014 18:10:55 -0000 1.63
+++ philosophy/po/free-sw.ru.po 31 May 2014 18:27:47 -0000 1.64
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2014-05-26 10:56+0000\n"
# type: Content of: <title>
#. type: Content of: <title>
@@ -114,9 +113,6 @@
# type: Content of: <ul><li>
#. type: Content of: <ul><li>
-# | The freedom to run the [-program,-] {+program as you wish,+} for any
-# | purpose (freedom 0).
-#| msgid "The freedom to run the program, for any purpose (freedom 0)."
msgid ""
"The freedom to run the program as you wish, for any purpose (freedom 0)."
msgstr "Свобода вÑполнÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ°Ðº вам
Ñгодно в лÑбÑÑ
ÑелÑÑ
(Ñвобода 0)."
@@ -226,10 +222,9 @@
"or stopped from doing so. It has nothing to do with what functionality the "
"program has, or whether it is useful for what you want to do."
msgstr ""
-"Свобода вÑполнÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ°Ðº вам
Ñгодно ознаÑаеÑ, ÑÑо вам не запÑеÑено "
-"и не меÑаÑÑ Ð´ÐµÐ»Ð°ÑÑ ÑÑо. ÐÑо никак не
ÑвÑзано ни Ñ Ñем, какой "
-"ÑÑнкÑионалÑноÑÑÑÑ Ð¾Ð±Ð»Ð°Ð´Ð°ÐµÑ Ð¿ÑогÑамма, ни
Ñ Ñем, полезна ли она Ð´Ð»Ñ Ñого, "
-"ÑÑо Ð²Ñ Ñ
оÑиÑе делаÑÑ."
+"Свобода вÑполнÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ°Ðº вам
Ñгодно ознаÑаеÑ, ÑÑо вам не запÑеÑено и "
+"не меÑаÑÑ Ð´ÐµÐ»Ð°ÑÑ ÑÑо. ÐÑо никак не ÑвÑзано
ни Ñ Ñем, какой ÑÑнкÑионалÑноÑÑÑÑ "
+"Ð¾Ð±Ð»Ð°Ð´Ð°ÐµÑ Ð¿ÑогÑамма, ни Ñ Ñем, полезна ли
она Ð´Ð»Ñ Ñого, ÑÑо Ð²Ñ Ñ
оÑиÑе делаÑÑ."
# type: Content of: <p>
#. type: Content of: <p>
@@ -743,18 +738,6 @@
# type: Content of: <ul><li>
#. type: Content of: <ul><li>
-# | <a
-# |
[-href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&r1=1.130&r2=1.131\">Version
-# | 1.131</a>: A free license may not require compliance with a nonfree
-# | license of another program.-]
-# |
{+href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&r1=1.134&r2=1.135\">Version
-# | 1.135</a>: Say each time that freedom 0 is the freedom to run the program
-# | as you wish.+}
-#| msgid ""
-#| "<a href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw."
-#| "html?root=www&r1=1.130&r2=1.131\">Version 1.131</a>: A free "
-#| "license may not require compliance with a nonfree license of another "
-#| "program."
msgid ""
"<a href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?"
"root=www&r1=1.134&r2=1.135\">Version 1.135</a>: Say each time that "
@@ -762,22 +745,11 @@
msgstr ""
"<a href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?"
"root=www&r1=1.134&r2=1.135\">ÐеÑÑÐ¸Ñ 1.135</a>: ÐаждÑй
Ñаз говоÑиÑÑÑ, "
-"ÑÑо Ñвобода 0 — ÑÑо Ñвобода
вÑполнÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ°Ðº вам Ñгодно."
+"ÑÑо Ñвобода 0 — ÑÑо Ñвобода
вÑполнÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ°Ðº вам "
+"Ñгодно."
# type: Content of: <ul><li>
#. type: Content of: <ul><li>
-# | <a
-# |
[-href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&r1=1.130&r2=1.131\">Version
-# | 1.131</a>: A free license may-]
-# |
{+href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&r1=1.133&r2=1.134\">Version
-# | 1.134</a>: Freedom 0 is+} not [-require compliance with-] a [-nonfree
-# | license-] {+matter+} of [-another program.-] {+the program's
-# | functionality.+}
-#| msgid ""
-#| "<a href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw."
-#| "html?root=www&r1=1.130&r2=1.131\">Version 1.131</a>: A free "
-#| "license may not require compliance with a nonfree license of another "
-#| "program."
msgid ""
"<a href=\"http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?"
"root=www&r1=1.133&r2=1.134\">Version 1.134</a>: Freedom 0 is not a "
Index: philosophy/po/surveillance-vs-democracy.ru-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ru-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/po/surveillance-vs-democracy.ru-en.html 24 Apr 2014 07:02:12
-0000 1.5
+++ philosophy/po/surveillance-vs-democracy.ru-en.html 31 May 2014 18:27:47
-0000 1.6
@@ -8,9 +8,9 @@
<p>by <a href="http://www.stallman.org/">Richard Stallman</a></p>
-<blockquote><p>A version of this article was first published in <a
-href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/">
-Wired</a> in October 2013.</p></blockquote>
+<blockquote><p>A version of this article was first published
+in <a
href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/">Wired</a>
+in October 2013.</p></blockquote>
<p>Thanks to Edward Snowden's disclosures, we know that the current
level of general surveillance in society is incompatible with human
@@ -25,26 +25,24 @@
<p>Faced with government secrecy, we the people depend on
whistleblowers
-to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">
-tell us what the state is doing</a>. However, today's surveillance
+to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
+us what the state is doing</a>. However, today's surveillance
intimidates potential whistleblowers, which means it is too much. To
recover our democratic control over the state, we must reduce
surveillance to the point where whistleblowers know they are safe.</p>
<p>Using free/libre
-software, <a href="/philosophy/free-software-even-more-important.html">
-as I've advocated for 30 years</a>, is the first step in taking
-control of our digital lives, and that includes preventing
-surveillance. We can't trust nonfree software; the NSA
-<a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
-uses</a> and
-even <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">
-creates</a> security weaknesses in nonfree software to invade our own
-computers and routers. Free software gives us control of our own
-computers, but <a href="http://www.wired.com/opinion/2013/10/149481/">
-that won't protect our privacy once we set foot on the
-Internet</a>.</p>
+software, <a href="/philosophy/free-software-even-more-important.html">as
+I've advocated for 30 years</a>, is the first step in taking control
+of our digital lives, and that includes preventing surveillance. We
+can't trust nonfree software; the NSA
+<a
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a>
+and
+even <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
+security weaknesses in nonfree software to invade our own computers
+and routers. Free software gives us control of our own computers,
+but <a href="http://www.wired.com/opinion/2013/10/149481/">that won't
+protect our privacy once we set foot on the Internet</a>.</p>
<p><a
href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
@@ -65,22 +63,22 @@
<p>An unnamed U.S. government official ominously told journalists in
2011 that
-the <a
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">
-U.S. would not subpoena reporters because “We know who you're
-talking to.”</a>
-Sometimes <a
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">
-journalists' phone call records are subpoenaed</a> to find this out,
-but Snowden has shown us that in effect they subpoena all the phone
-call records of everyone in the U.S., all the
-time, <a
href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">
-from Verizon </a>
-and <a
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">
-from other companies too</a>.</p>
+the <a
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">U.S.
would
+not subpoena reporters because “We know who you're talking
+to.”</a>
+Sometimes <a
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
+phone call records are subpoenaed</a> to find this out, but Snowden
+has shown us that in effect they subpoena all the phone call records
+of everyone in the U.S., all the
+time, <a
href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from
+Verizon</a>
+and <a
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
+other companies too</a>.</p>
<p>Opposition and dissident activities need to keep secrets from
states that are willing to play dirty tricks on them. The ACLU has
demonstrated the U.S. government's <a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"> systematic
+href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
practice of infiltrating peaceful dissident groups</a> on the pretext
that there might be terrorists among them. The point at which
surveillance is too much is the point at which the state can find who
@@ -92,23 +90,23 @@
high, the first response is to propose limits on access to the
accumulated data. That sounds nice, but it won't fix the problem, not
even slightly, even supposing that the government obeys the rules.
-(The NSA has misled the FISA court, which said it was <a
-href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">
-unable to effectively hold the NSA accountable</a>.) Suspicion of a
-crime will be grounds for access, so once a whistleblower is accused
-of “espionage,” finding the “spy” will provide
-an excuse to access the accumulated material.</p>
+(The NSA has misled the FISA court, which said it
+was <a href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
+to effectively hold the NSA accountable</a>.) Suspicion of a crime
+will be grounds for access, so once a whistleblower is accused of
+“espionage,” finding the “spy” will provide an
+excuse to access the accumulated material.</p>
<p>The state's surveillance staff will misuse the data for personal
-reasons too. Some NSA agents <a
-href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">
-used U.S. surveillance systems to track their lovers</a>—past,
+reasons too. Some NSA
+agents <a
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
+U.S. surveillance systems to track their lovers</a>—past,
present, or wished-for—in a practice called
“LOVEINT.” The NSA says it has caught and punished this a
few times; we don't know how many other times it wasn't caught. But
-these events shouldn't surprise us, because police have long <a
-href="http://www.sweetliberty.org/issues/privacy/lein1.htm">used their
-access to driver's license records to track down someone
+these events shouldn't surprise us, because police have
+long <a href="http://www.sweetliberty.org/issues/privacy/lein1.htm">used
+their access to driver's license records to track down someone
attractive</a>, a practice known as “running a plate for a
date.”</p>
@@ -116,10 +114,9 @@
this is prohibited. Once the data has been accumulated and the state
has the possibility of access to it, it can misuse that data in
dreadful ways, as shown by examples
-from <a
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">
-Europe</a>
-and <a href="https://en.wikipedia.org/wiki/Japanese_American_internment">
-the US </a>.</p>
+from <a
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>
+and <a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the
+US </a>.</p>
<p>Total surveillance plus vague law provides an opening for a massive
fishing expedition against any desired target. To make journalism and
@@ -130,7 +127,7 @@
<p>The Electronic Frontier Foundation and other organizations propose
a set of legal principles designed to <a
-href="https://en.necessaryandproportionate.org/text"> prevent the
+href="https://en.necessaryandproportionate.org/text">prevent the
abuses of massive surveillance</a>. These principles include,
crucially, explicit legal protection for whistleblowers; as a
consequence, they would be adequate for protecting democratic
@@ -140,8 +137,7 @@
<p>However, such legal protections are precarious: as recent history
shows, they can be repealed (as in the FISA Amendments Act),
suspended, or <a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html">
-ignored</a>.</p>
+href="http://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>
<p>Meanwhile, demagogues will cite the usual excuses as grounds for
total surveillance; any terrorist attack, even one that kills just a
@@ -160,32 +156,45 @@
<h3>First, Don't Be Foolish</h3>
<p>To have privacy, you must not throw it away: the first one who has
-to protect your privacy is you. Don't tell a company such as Facebook
-anything about you that you hesitate to publish in a newspaper. Don't
-tell a company such as Facebook anything about your friends that they
-might not wish to publish in a newspaper. Better yet, don't be one
-of Facebook's users at all.</p>
+to protect your privacy is you. Avoid identifying yourself to web
+sites, contact them with Tor, and use browsers that block the schemes
+they use to track visitors. Use the GNU Privacy Guard to encrypt the
+contents of your email. Pay for things with cash.</p>
-<p>Never give any web site your entire list of email or phone
-contacts. Keep your own data; don't store your data in a company's
+<p>Keep your own data; don't store your data in a company's
“convenient” server. It's safe, however, to entrust a
-data backup to a commercial service, provided you encrypted the data,
-including the file names, with free software on your own computer
-before uploading it.</p>
+data backup to a commercial service, provided you put the files in an
+archive and encrypt the whole archive, including the names of the
+files, with free software on your own computer before uploading
+it.</p>
<p>For privacy's sake, you must avoid nonfree software since, as a
consequence of giving others control of your computing, it
-is <a href="/philosophy/proprietary-surveillance.html"> likely to spy
-on you </a>.
-Avoid <a href="/philosophy/who-does-that-server-really-serve.html">
-service as a software substitute </a>; as well as giving others
-control of your computing, it requires you to hand over all the
-pertinent data to the server.</p>
-
-<p>However, even the most rigorous self-protection is insufficient to
-protect your privacy on or from systems that don't belong to you.
-When we communicate with others or move around the city, our
-privacy depends on the practices of society.</p>
+is <a href="/philosophy/proprietary-surveillance.html">likely to spy
+on you</a>.
+Avoid <a href="/philosophy/who-does-that-server-really-serve.html">service
+as a software substitute</a>; as well as giving others control of your
+computing, it requires you to hand over all the pertinent data to the
+server.</p>
+
+<p>Protect your friends' and acquaintances' privacy,
+too. <a
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
+give out their personal information</a> except how to contact them,
+and never give any web site your list of email or phone contacts.
+Don't tell a company such as Facebook anything about your friends that
+they might not wish to publish in a newspaper. Better yet, don't be
+used by Facebook at all. Reject communication systems that require
+users to give their real names, even if you are going to give yours,
+since they pressure other people to surrender their privacy.</p>
+
+<p>Self-protection is essential, but even the most rigorous
+self-protection is insufficient to protect your privacy on or from
+systems that don't belong to you. When we communicate with others or
+move around the city, our privacy depends on the practices of society.
+We can avoid some of the systems that surveil our communications and
+movements, but not all of them. Clearly, the better solution is to
+make all these systems stop surveilling people other than legitimate
+suspects.</p>
<h3>We Must Design Every System for Privacy</h3>
@@ -209,15 +218,14 @@
<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
-<p>One way to make monitoring safe for privacy is to <a name="dispersal">
-keep the data
-dispersed and inconvenient to access</a>. Old-fashioned security cameras
-were no threat to privacy. The recording was stored on the premises,
-and kept for a few weeks at most. Because of the inconvenience of
-accessing these recordings, it was never done massively; they were
-accessed only in the places where someone reported a crime. It would
-not be feasible to physically collect millions of tapes every day and
-watch them or copy them.</p>
+<p>One way to make monitoring safe for privacy is
+to <a name="dispersal">keep the data dispersed and inconvenient to
+access</a>. Old-fashioned security cameras were no threat to privacy.
+The recording was stored on the premises, and kept for a few weeks at
+most. Because of the inconvenience of accessing these recordings, it
+was never done massively; they were accessed only in the places where
+someone reported a crime. It would not be feasible to physically
+collect millions of tapes every day and watch them or copy them.</p>
<p>Nowadays, security cameras have become surveillance cameras: they
are connected to the Internet so recordings can be collected in a data
@@ -227,12 +235,12 @@
who they talk with.</p>
<p>Internet-connected cameras often have lousy digital security
-themselves, so <a
-href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">
-anyone could watch what the camera sees</a>. To restore privacy, we
-should ban the use of Internet-connected cameras aimed where and when
-the public is admitted, except when carried by people. Everyone must
-be free to post photos and video recordings occasionally, but the
+themselves,
+so <a
href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">anyone
+could watch what the camera sees</a>. To restore privacy, we should
+ban the use of Internet-connected cameras aimed where and when the
+public is admitted, except when carried by people. Everyone must be
+free to post photos and video recordings occasionally, but the
systematic accumulation of such data on the Internet must be
limited.</p>
@@ -245,12 +253,12 @@
business, because the data that the companies collect is
systematically available to the state.</p>
-<p>The NSA, through PRISM, has <a
-href="https://www.commondreams.org/headline/2013/08/23-2"> gotten into
-the databases of many large Internet corporations</a>. AT&T has
-saved all its phone call records since 1987 and <a
-href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">
-makes them available to the DEA</a> to search on request. Strictly
+<p>The NSA, through PRISM,
+has <a href="https://www.commondreams.org/headline/2013/08/23-2">gotten
+into the databases of many large Internet corporations</a>. AT&T
+has saved all its phone call records since 1987
+and <a
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
+them available to the DEA</a> to search on request. Strictly
speaking, the U.S. government does not possess that data, but in
practical terms it may as well possess it.</p>
@@ -273,11 +281,11 @@
<p>We could correct both problems by adopting a system of anonymous
payments—anonymous for the payer, that is. (We don't want the
-payee to dodge taxes.) <a
-href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">
-Bitcoin is not anonymous</a>, though there are efforts to develop
-ways to pay anonymously with Bitcoin. However, technology for <a
-href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"> digital
+payee to dodge
+taxes.) <a
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
+is not anonymous</a>, though there are efforts to develop ways to pay
+anonymously with Bitcoin. However, technology
+for <a href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
cash was first developed in the 1980s</a>; we need only suitable
business arrangements, and for the state not to obstruct them.</p>
@@ -291,19 +299,18 @@
<p>We must convert digital toll collection to anonymous payment (using
digital cash, for instance). License-plate recognition systems
-recognize all license plates, and the <a
-href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">
-data can be kept indefinitely</a>; they should be required by law to
-notice and record only those license numbers that are on a list of
-cars sought by court orders. A less secure alternative would record
-all cars locally but only for a few days, and not make the full data
+recognize all license plates, and
+the <a
href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">data
+can be kept indefinitely</a>; they should be required by law to notice
+and record only those license numbers that are on a list of cars
+sought by court orders. A less secure alternative would record all
+cars locally but only for a few days, and not make the full data
available over the Internet; access to the data should be limited to
searching for a list of court-ordered license-numbers.</p>
<p>The U.S. “no-fly” list must be abolished because it is
-<a
-href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">
-punishment without trial</a>.</p>
+<a
href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">punishment
+without trial</a>.</p>
<p>It is acceptable to have a list of people whose person and luggage
will be searched with extra care, and anonymous passengers on domestic
@@ -349,15 +356,14 @@
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
-mobile phones, they also <a
-href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">
-record the user's physical location</a>. They keep these dossiers for
-a long time: over 30 years, in the case of AT&T. Soon they will
-even <a
-href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">
-record the user's body activities</a>. It appears that the <a
-href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">
-NSA collects cell phone location data</a> in bulk.</p>
+mobile phones, they
+also <a
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
+the user's physical location</a>. They keep these dossiers for a long
+time: over 30 years, in the case of AT&T. Soon they will
+even <a
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
+the user's body activities</a>. It appears that
+the <a
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSA
+collects cell phone location data</a> in bulk.</p>
<p>Unmonitored communication is impossible where systems create such
dossiers. So it should be illegal to create or keep them. ISPs and
@@ -366,15 +372,26 @@
<p>This solution is not entirely satisfactory, because it won't
physically stop the government from collecting all the information
-immediately as it is generated—which is what the <a
-href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">
-U.S. does with some or all phone companies</a>. We would have to rely
-on prohibiting that by law. However, that would be better than the
+immediately as it is generated—which is what
+the <a
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.
does
+with some or all phone companies</a>. We would have to rely on
+prohibiting that by law. However, that would be better than the
current situation, where the relevant law (the PATRIOT Act) does not
clearly prohibit the practice. In addition, if the government did
resume this sort of surveillance, it would not get data about
everyone's phone calls made prior to that time.</p>
+<p>For privacy about who you exchange email with, a simple partial
+solution is for you and others to use email services in a country that
+would never cooperate with your own government, and which communicate
+with each other using encryption. However, Ladar Levison (owner of
+the mail service Lavabit that US surveillance sought to corrupt
+completely) has a more sophisticated idea for an encryption system
+through which your email service would know only that you sent mail to
+some user of my email service, and my email service would know only
+that I received mail from some user of your email service, but it
+would be hard to determine that you had sent mail to me.</p>
+
<h3>But Some Surveillance Is Necessary</h3>
<p>For the state to find criminals, it needs to be able to investigate
@@ -387,14 +404,14 @@
<p>Individuals with special state-granted power, such as police,
forfeit their right to privacy and must be monitored. (In fact,
-police have their own jargon term for perjury, “<a
-href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">testilying</a>,”
since they do
-it so frequently, particularly about protesters and <a
-href="http://photographyisnotacrime.com/"> photographers</a>.) One
-city in California that required police to wear video cameras all the
-time found <a
-href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">
-their use of force fell by 60%</a>. The ACLU is in favor of this.</p>
+police have their own jargon term for perjury,
+“<a
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">testilying</a>,”
+since they do it so frequently, particularly about protesters
+and <a href="http://photographyisnotacrime.com/">photographers</a>.)
+One city in California that required police to wear video cameras all
+the time
+found <a
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
+use of force fell by 60%</a>. The ACLU is in favor of this.</p>
<p><a
href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
@@ -414,11 +431,11 @@
<p>Digital technology has brought about a tremendous increase in the
level of surveillance of our movements, actions, and communications.
-It is far more than we experienced in the 1990s, and <a
-href="http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html">
-far more than people behind the Iron Curtain experienced</a> in the
-1980s, and would still be far more even with additional legal limits
-on state use of the accumulated data.</p>
+It is far more than we experienced in the 1990s,
+and <a
href="http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html">far
+more than people behind the Iron Curtain experienced</a> in the 1980s,
+and would still be far more even with additional legal limits on state
+use of the accumulated data.</p>
<p>Unless we believe that our free countries previously suffered from
a grave surveillance deficit, and ought to be surveilled more than the
@@ -483,7 +500,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/04/24 07:02:12 $
+$Date: 2014/05/31 18:27:47 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/surveillance-vs-democracy.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ru.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- philosophy/po/surveillance-vs-democracy.ru.po 31 May 2014 18:10:56
-0000 1.14
+++ philosophy/po/surveillance-vs-democracy.ru.po 31 May 2014 18:27:47
-0000 1.15
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2014-05-26 10:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -35,13 +34,6 @@
msgstr "<a href=\"http://www.stallman.org/\">РиÑаÑд СÑолмен</a>"
#. type: Content of: <blockquote><p>
-# | A version of this article was first published in <a
-# |
href=\"http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/\">[-
-# | -]Wired</a> in October 2013.
-#| msgid ""
-#| "A version of this article was first published in <a href=\"http://www."
-#| "wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-"
-#| "survive-surveillance/\"> Wired</a> in October 2013."
msgid ""
"A version of this article was first published in <a href=\"http://www.wired."
"com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-"
@@ -74,19 +66,6 @@
"оÑведомиÑелей (ÑакиÑ
как СноÑден), как
пÑавило, оÑлавливаÑÑ."
#. type: Content of: <p>
-# | Faced with government secrecy, we the people depend on whistleblowers to
-# | <a href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">[- -]tell
-# | us what the state is doing</a>. However, today's surveillance intimidates
-# | potential whistleblowers, which means it is too much. To recover our
-# | democratic control over the state, we must reduce surveillance to the
-# | point where whistleblowers know they are safe.
-#| msgid ""
-#| "Faced with government secrecy, we the people depend on whistleblowers to "
-#| "<a href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\"> tell us "
-#| "what the state is doing</a>. However, today's surveillance intimidates "
-#| "potential whistleblowers, which means it is too much. To recover our "
-#| "democratic control over the state, we must reduce surveillance to the "
-#| "point where whistleblowers know they are safe."
msgid ""
"Faced with government secrecy, we the people depend on whistleblowers to <a "
"href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">tell us what "
@@ -104,30 +83,6 @@
"оÑведомиÑели бÑдÑÑ Ð·Ð½Ð°ÑÑ, ÑÑо они в
безопаÑноÑÑи."
#. type: Content of: <p>
-# | Using free/libre software, <a
-# | href=\"/philosophy/free-software-even-more-important.html\">[- -]as I've
-# | advocated for 30 years</a>, is the first step in taking control of our
-# | digital lives, and that includes preventing surveillance. We can't trust
-# | nonfree software; the NSA <a
-# |
href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">[-
-# | -]uses</a> and even <a
-# |
href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">[-
-# | -]creates</a> security weaknesses in nonfree software to invade our own
-# | computers and routers. Free software gives us control of our own
-# | computers, but <a href=\"http://www.wired.com/opinion/2013/10/149481/\">[-
-# | -]that won't protect our privacy once we set foot on the Internet</a>.
-#| msgid ""
-#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
-#| "important.html\"> as I've advocated for 30 years</a>, is the first step "
-#| "in taking control of our digital lives, and that includes preventing "
-#| "surveillance. We can't trust nonfree software; the NSA <a href=\"http://"
-#| "blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-"
-#| "ever-trust-microsoft-again/index.htm\"> uses</a> and even <a href="
-#| "\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-"
-#| "security\"> creates</a> security weaknesses in nonfree software to invade "
-#| "our own computers and routers. Free software gives us control of our own "
-#| "computers, but <a href=\"http://www.wired.com/opinion/2013/10/149481/\"> "
-#| "that won't protect our privacy once we set foot on the Internet</a>."
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -191,35 +146,6 @@
"ÑлиÑком велика, ÑÑÐ¾Ð±Ñ Ð´ÐµÐ¼Ð¾ÐºÑаÑÐ¸Ñ Ð¼Ð¾Ð³Ð»Ð° ее
вÑдеÑжаÑÑ."
#. type: Content of: <p>
-# | An unnamed U.S. government official ominously told journalists in 2011
-# | that the <a
-# |
href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\">[-
-# | -]U.S. would not subpoena reporters because “We know who you're
-# | talking to.”</a> Sometimes <a
-# |
href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">[-
-# | -]journalists' phone call records are subpoenaed</a> to find this out, but
-# | Snowden has shown us that in effect they subpoena all the phone call
-# | records of everyone in the U.S., all the time, <a
-# |
[-href=\"http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\">
-# | from Verizon </a>-]
-# |
{+href=\"http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\">from
-# | Verizon</a>+} and <a
-# |
href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">[-
-# | -]from other companies too</a>.
-#| msgid ""
-#| "An unnamed U.S. government official ominously told journalists in 2011 "
-#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
-#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\"> U.S. would "
-#| "not subpoena reporters because “We know who you're talking to."
-#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
-#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\"> journalists' "
-#| "phone call records are subpoenaed</a> to find this out, but Snowden has "
-#| "shown us that in effect they subpoena all the phone call records of "
-#| "everyone in the U.S., all the time, <a href=\"http://www.theguardian.com/"
-#| "world/interactive/2013/jun/06/verizon-telephone-data-court-order\"> from "
-#| "Verizon </a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
-#| "mining-digs-into-networks-beyond-verizon-2013-06-07\"> from other "
-#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
@@ -248,22 +174,6 @@
"into-networks-beyond-verizon-2013-06-07\"> а Ñакже Ð¾Ñ Ð´ÑÑгиÑ
компаний</a>."
#. type: Content of: <p>
-# | Opposition and dissident activities need to keep secrets from states that
-# | are willing to play dirty tricks on them. The ACLU has demonstrated the
-# | U.S. government's <a
-# | href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">[- -]systematic
-# | practice of infiltrating peaceful dissident groups</a> on the pretext that
-# | there might be terrorists among them. The point at which surveillance is
-# | too much is the point at which the state can find who spoke to a known
-# | journalist or a known dissident.
-#| msgid ""
-#| "Opposition and dissident activities need to keep secrets from states that "
-#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
-#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
-#| "pdf\"> systematic practice of infiltrating peaceful dissident groups</a> "
-#| "on the pretext that there might be terrorists among them. The point at "
-#| "which surveillance is too much is the point at which the state can find "
-#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
@@ -287,27 +197,6 @@
msgstr "ÐÐ´Ð½Ð°Ð¶Ð´Ñ ÑобÑаннÑми ÑведениÑми бÑдÑÑ
злоÑпоÑÑеблÑÑÑ"
#. type: Content of: <p>
-# | When people recognize that the level of general surveillance is too high,
-# | the first response is to propose limits on access to the accumulated data.
-# | That sounds nice, but it won't fix the problem, not even slightly, even
-# | supposing that the government obeys the rules. (The NSA has misled the
-# | FISA court, which said it was <a
-# | href=\"http://www.wired.com/threatlevel/2013/09/nsa-violations/\">[-
-# | -]unable to effectively hold the NSA accountable</a>.) Suspicion of a
-# | crime will be grounds for access, so once a whistleblower is accused of
-# | “espionage,” finding the “spy” will provide an
-# | excuse to access the accumulated material.
-#| msgid ""
-#| "When people recognize that the level of general surveillance is too high, "
-#| "the first response is to propose limits on access to the accumulated "
-#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
-#| "even supposing that the government obeys the rules. (The NSA has misled "
-#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
-#| "threatlevel/2013/09/nsa-violations/\"> unable to effectively hold the NSA "
-#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
-#| "once a whistleblower is accused of “espionage,” finding the "
-#| "“spy” will provide an excuse to access the accumulated "
-#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
@@ -332,29 +221,6 @@
"Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа к Ð½Ð°ÐºÐ¾Ð¿Ð»ÐµÐ½Ð½Ð¾Ð¼Ñ Ð¼Ð°ÑеÑиалÑ."
#. type: Content of: <p>
-# | The state's surveillance staff will misuse the data for personal reasons
-# | too. Some NSA agents <a
-# |
href=\"http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">[-
-# | -]used U.S. surveillance systems to track their lovers</a>—past,
-# | present, or wished-for—in a practice called “LOVEINT.”
-# | The NSA says it has caught and punished this a few times; we don't know
-# | how many other times it wasn't caught. But these events shouldn't
-# | surprise us, because police have long <a
-# | href=\"http://www.sweetliberty.org/issues/privacy/lein1.htm\">used their
-# | access to driver's license records to track down someone attractive</a>, a
-# | practice known as “running a plate for a date.”
-#| msgid ""
-#| "The state's surveillance staff will misuse the data for personal reasons "
-#| "too. Some NSA agents <a href=\"http://www.theguardian.com/world/2013/"
-#| "aug/24/nsa-analysts-abused-surveillance-systems\"> used U.S. surveillance "
-#| "systems to track their lovers</a>—past, present, or wished-"
-#| "for—in a practice called “LOVEINT.” The NSA says it has "
-#| "caught and punished this a few times; we don't know how many other times "
-#| "it wasn't caught. But these events shouldn't surprise us, because police "
-#| "have long <a href=\"http://www.sweetliberty.org/issues/privacy/lein1.htm"
-#| "\">used their access to driver's license records to track down someone "
-#| "attractive</a>, a practice known as “running a plate for a date."
-#| "”"
msgid ""
"The state's surveillance staff will misuse the data for personal reasons "
"too. Some NSA agents <a href=\"http://www.theguardian.com/world/2013/aug/24/"
@@ -381,22 +247,6 @@
"назнаÑиÑÑ Ñвидание”."
#. type: Content of: <p>
-# | Surveillance data will always be used for other purposes, even if this is
-# | prohibited. Once the data has been accumulated and the state has the
-# | possibility of access to it, it can misuse that data in dreadful ways, as
-# | shown by examples from <a
-# |
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\">[-
-# | -]Europe</a> and <a
-# | href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">[-
-# | -]the US </a>.
-#| msgid ""
-#| "Surveillance data will always be used for other purposes, even if this is "
-#| "prohibited. Once the data has been accumulated and the state has the "
-#| "possibility of access to it, it can misuse that data in dreadful ways, as "
-#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
-#| "collected-personal-data-will-always-be-used-against-the-citizens/\"> "
-#| "Europe</a> and <a href=\"https://en.wikipedia.org/wiki/"
-#| "Japanese_American_internment\"> the US </a>."
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -430,21 +280,6 @@
msgstr "СÑÐ¾Ð¹ÐºÐ°Ñ Ð·Ð°ÑиÑа лиÑной жизни должна
бÑÑÑ ÑеÑ
ниÑеÑкой"
#. type: Content of: <p>
-# | The Electronic Frontier Foundation and other organizations propose a set
-# | of legal principles designed to <a
-# | href=\"https://en.necessaryandproportionate.org/text\">[- -]prevent the
-# | abuses of massive surveillance</a>. These principles include, crucially,
-# | explicit legal protection for whistleblowers; as a consequence, they would
-# | be adequate for protecting democratic freedoms—if adopted completely
-# | and enforced without exception forever.
-#| msgid ""
-#| "The Electronic Frontier Foundation and other organizations propose a set "
-#| "of legal principles designed to <a href=\"https://en."
-#| "necessaryandproportionate.org/text\"> prevent the abuses of massive "
-#| "surveillance</a>. These principles include, crucially, explicit legal "
-#| "protection for whistleblowers; as a consequence, they would be adequate "
-#| "for protecting democratic freedoms—if adopted completely and "
-#| "enforced without exception forever."
msgid ""
"The Electronic Frontier Foundation and other organizations propose a set of "
"legal principles designed to <a href=\"https://en.necessaryandproportionate."
@@ -462,13 +297,6 @@
"и без иÑклÑÑений."
#. type: Content of: <p>
-# | However, such legal protections are precarious: as recent history shows,
-# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
-# | href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">[- -]ignored</a>.
-#| msgid ""
-#| "However, such legal protections are precarious: as recent history shows, "
-#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
-#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\"> ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -531,19 +359,6 @@
"ÑодеÑжимого Ñвоей ÑлекÑÑонной поÑÑÑ.
ÐплаÑивайÑе покÑпки налиÑнÑми."
#. type: Content of: <p>
-# | [-Never give any web site your entire list of email or phone
-# | contacts.-]Keep your own data; don't store your data in a company's
-# | “convenient” server. It's safe, however, to entrust a data
-# | backup to a commercial service, provided you [-encrypted-] {+put the files
-# | in an archive and encrypt+} the [-data,-] {+whole archive,+} including the
-# | [-file names,-] {+names of the files,+} with free software on your own
-# | computer before uploading it.
-#| msgid ""
-#| "Never give any web site your entire list of email or phone contacts. "
-#| "Keep your own data; don't store your data in a company's “"
-#| "convenient” server. It's safe, however, to entrust a data backup "
-#| "to a commercial service, provided you encrypted the data, including the "
-#| "file names, with free software on your own computer before uploading it."
msgid ""
"Keep your own data; don't store your data in a company's “"
"convenient” server. It's safe, however, to entrust a data backup to a "
@@ -551,31 +366,13 @@
"whole archive, including the names of the files, with free software on your "
"own computer before uploading it."
msgstr ""
-"ÐеÑжиÑе Ñвои "
-"даннÑе Ñ ÑебÑ; не Ñ
ÑаниÑе Ñвои даннÑе на
“Ñдобном” ÑеÑвеÑе "
-"компании. Ðднако вполне безопаÑно ввеÑÑÑÑ
ÑезеÑвнÑе копии даннÑÑ
"
+"ÐеÑжиÑе Ñвои даннÑе Ñ ÑебÑ; не Ñ
ÑаниÑе
Ñвои даннÑе на “Ñдобном” "
+"ÑеÑвеÑе компании. Ðднако вполне безопаÑно
ввеÑÑÑÑ ÑезеÑвнÑе копии даннÑÑ
"
"коммеÑÑеÑкой ÑлÑжбе пÑи ÑÑловии, ÑÑо вÑ
Ñложили ÑÐ°Ð¹Ð»Ñ Ð² аÑÑ
ив и заÑиÑÑовали "
-"веÑÑ ÑÑÐ¾Ñ Ð°ÑÑ
ив, в Ñом ÑиÑле "
-"имена Ñайлов, на Ñвоем компÑÑÑеÑе Ñ
помоÑÑÑ ÑвободнÑÑ
пÑогÑамм пеÑед Ñем, "
-"как оÑпÑавлÑÑÑ Ð¸Ñ
на ÑеÑвеÑ."
-
-#. type: Content of: <p>
-# | For privacy's sake, you must avoid nonfree software since, as a
-# | consequence of giving others control of your computing, it is <a
-# | href=\"/philosophy/proprietary-surveillance.html\">[- -]likely to spy on
-# | you[- -]</a>. Avoid <a
-# | href=\"/philosophy/who-does-that-server-really-serve.html\">[- -]service
-# | as a software substitute[- -]</a>; as well as giving others control of
-# | your computing, it requires you to hand over all the pertinent data to the
-# | server.
-#| msgid ""
-#| "For privacy's sake, you must avoid nonfree software since, as a "
-#| "consequence of giving others control of your computing, it is <a href=\"/"
-#| "philosophy/proprietary-surveillance.html\"> likely to spy on you </a>. "
-#| "Avoid <a href=\"/philosophy/who-does-that-server-really-serve.html\"> "
-#| "service as a software substitute </a>; as well as giving others control "
-#| "of your computing, it requires you to hand over all the pertinent data to "
-#| "the server."
+"веÑÑ ÑÑÐ¾Ñ Ð°ÑÑ
ив, в Ñом ÑиÑле имена Ñайлов,
на Ñвоем компÑÑÑеÑе Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ "
+"ÑвободнÑÑ
пÑогÑамм пеÑед Ñем, как
оÑпÑавлÑÑÑ Ð¸Ñ
на ÑеÑвеÑ."
+
+#. type: Content of: <p>
msgid ""
"For privacy's sake, you must avoid nonfree software since, as a consequence "
"of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -611,23 +408,11 @@
"ÑпиÑка ÑелеÑоннÑÑ
и ÑлекÑÑоннÑÑ
конÑакÑов. Ðе говоÑиÑе Ñаким компаниÑм, как
"
"Facebook, ниÑего Ñакого о ÑвоиÑ
дÑÑзÑÑÑ
, ÑÑо
они могли Ð±Ñ Ð½Ðµ Ñ
оÑеÑÑ "
"опÑбликоваÑÑ Ð² газеÑе. РеÑе лÑÑÑе не
полÑзÑйÑеÑÑ Facebook вообÑе. "
-"ÐÑказÑвайÑеÑÑ Ð¾Ñ ÑиÑÑем ÑвÑзи, в коÑоÑÑÑ
Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей ÑÑебÑеÑÑÑ "
-"назÑваÑÑ Ñвои наÑÑоÑÑие имена, даже еÑли
Ð²Ñ ÑобиÑаеÑеÑÑ Ð½Ð°Ð·Ð²Ð°ÑÑ Ñвои, "
-"поÑколÑÐºÑ ÑÑо пооÑÑÑÐµÑ Ð´ÑÑгиÑ
лÑдей
оÑказаÑÑÑÑ Ð¾Ñ Ñвоей конÑиденÑиалÑноÑÑи."
-
-#. type: Content of: <p>
-# | [-However,-]{+Self-protection is essential, but+} even the most rigorous
-# | self-protection is insufficient to protect your privacy on or from systems
-# | that don't belong to you. When we communicate with others or move around
-# | the city, our privacy depends on the practices of society. {+We can avoid
-# | some of the systems that surveil our communications and movements, but not
-# | all of them. Clearly, the better solution is to make all these systems
-# | stop surveilling people other than legitimate suspects.+}
-#| msgid ""
-#| "However, even the most rigorous self-protection is insufficient to "
-#| "protect your privacy on or from systems that don't belong to you. When "
-#| "we communicate with others or move around the city, our privacy depends "
-#| "on the practices of society."
+"ÐÑказÑвайÑеÑÑ Ð¾Ñ ÑиÑÑем ÑвÑзи, в коÑоÑÑÑ
Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей ÑÑебÑеÑÑÑ Ð½Ð°Ð·ÑваÑÑ "
+"Ñвои наÑÑоÑÑие имена, даже еÑли вÑ
ÑобиÑаеÑеÑÑ Ð½Ð°Ð·Ð²Ð°ÑÑ Ñвои, поÑколÑÐºÑ ÑÑо "
+"пооÑÑÑÐµÑ Ð´ÑÑгиÑ
лÑдей оÑказаÑÑÑÑ Ð¾Ñ Ñвоей
конÑиденÑиалÑноÑÑи."
+
+#. type: Content of: <p>
msgid ""
"Self-protection is essential, but even the most rigorous self-protection is "
"insufficient to protect your privacy on or from systems that don't belong to "
@@ -637,13 +422,13 @@
"better solution is to make all these systems stop surveilling people other "
"than legitimate suspects."
msgstr ""
-"СамозаÑиÑа важна, но даже Ñамой
бдиÑелÑной ÑамозаÑиÑÑ Ð½ÐµÐ´Ð¾ÑÑаÑоÑно, ÑÑобÑ
заÑиÑиÑÑ Ð²Ð°ÑÑ "
-"конÑиденÑиалÑноÑÑÑ Ð½Ð° ÑиÑÑемаÑ
, коÑоÑÑе
вам не пÑинадлежаÑ. Ðогда Ð¼Ñ "
-"обÑаемÑÑ Ñ Ð´ÑÑгими или пеÑедвигаемÑÑ Ð¿Ð¾
гоÑодÑ, наÑа конÑиденÑиалÑноÑÑÑ "
-"завиÑÐ¸Ñ Ð¾Ñ ÑложивÑейÑÑ Ð² обÑеÑÑве
пÑакÑики. ÐÑ Ð¼Ð¾Ð¶ÐµÐ¼ избегаÑÑ Ð½ÐµÐºÐ¾ÑоÑÑÑ
"
-"ÑиÑÑем, коÑоÑÑе оÑÑлеживаÑÑ Ð½Ð°Ñи
ÑообÑÐµÐ½Ð¸Ñ Ð¸ пеÑемеÑениÑ, но не вÑе иÑ
. "
-"ЯÑно, ÑÑо лÑÑÑе бÑло Ð±Ñ Ð·Ð°ÑÑавиÑÑ Ð²Ñе ÑÑи
ÑиÑÑÐµÐ¼Ñ Ð¿ÑекÑаÑиÑÑ ÑÐ»ÐµÐ¶ÐºÑ Ð·Ð° "
-"лÑдÑми, за иÑклÑÑением законно
подозÑеваемÑÑ
."
+"СамозаÑиÑа важна, но даже Ñамой
бдиÑелÑной ÑамозаÑиÑÑ Ð½ÐµÐ´Ð¾ÑÑаÑоÑно, ÑÑÐ¾Ð±Ñ "
+"заÑиÑиÑÑ Ð²Ð°ÑÑ ÐºÐ¾Ð½ÑиденÑиалÑноÑÑÑ Ð½Ð°
ÑиÑÑемаÑ
, коÑоÑÑе вам не пÑинадлежаÑ. "
+"Ðогда Ð¼Ñ Ð¾Ð±ÑаемÑÑ Ñ Ð´ÑÑгими или
пеÑедвигаемÑÑ Ð¿Ð¾ гоÑодÑ, наÑа "
+"конÑиденÑиалÑноÑÑÑ Ð·Ð°Ð²Ð¸ÑÐ¸Ñ Ð¾Ñ
ÑложивÑейÑÑ Ð² обÑеÑÑве пÑакÑики. ÐÑ Ð¼Ð¾Ð¶ÐµÐ¼ "
+"избегаÑÑ Ð½ÐµÐºÐ¾ÑоÑÑÑ
ÑиÑÑем, коÑоÑÑе
оÑÑлеживаÑÑ Ð½Ð°Ñи ÑообÑÐµÐ½Ð¸Ñ Ð¸ пеÑемеÑениÑ, "
+"но не вÑе иÑ
. ЯÑно, ÑÑо лÑÑÑе бÑло бÑ
заÑÑавиÑÑ Ð²Ñе ÑÑи ÑиÑÑÐµÐ¼Ñ Ð¿ÑекÑаÑиÑÑ "
+"ÑÐ»ÐµÐ¶ÐºÑ Ð·Ð° лÑдÑми, за иÑклÑÑением законно
подозÑеваемÑÑ
."
#. type: Content of: <h3>
msgid "We Must Design Every System for Privacy"
@@ -695,23 +480,6 @@
msgstr "ÐеÑа пÑоÑив ÑбоÑа даннÑÑ
: оÑÑавлÑÑÑ Ð¸Ñ
ÑаÑÑÑедоÑоÑеннÑми"
#. type: Content of: <p>
-# | One way to make monitoring safe for privacy is to <a name=\"dispersal\">[-
-# | -]keep the data dispersed and inconvenient to access</a>. Old-fashioned
-# | security cameras were no threat to privacy. The recording was stored on
-# | the premises, and kept for a few weeks at most. Because of the
-# | inconvenience of accessing these recordings, it was never done massively;
-# | they were accessed only in the places where someone reported a crime. It
-# | would not be feasible to physically collect millions of tapes every day
-# | and watch them or copy them.
-#| msgid ""
-#| "One way to make monitoring safe for privacy is to <a name=\"dispersal\"> "
-#| "keep the data dispersed and inconvenient to access</a>. Old-fashioned "
-#| "security cameras were no threat to privacy. The recording was stored on "
-#| "the premises, and kept for a few weeks at most. Because of the "
-#| "inconvenience of accessing these recordings, it was never done massively; "
-#| "they were accessed only in the places where someone reported a crime. It "
-#| "would not be feasible to physically collect millions of tapes every day "
-#| "and watch them or copy them."
msgid ""
"One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
"the data dispersed and inconvenient to access</a>. Old-fashioned security "
@@ -748,23 +516,6 @@
"ÑвидеÑÑ, Ñ ÐºÐµÐ¼ они обÑаÑÑÑÑ."
#. type: Content of: <p>
-# | Internet-connected cameras often have lousy digital security themselves,
-# | so <a
-# |
href=\"http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances\">[-
-# | -]anyone could watch what the camera sees</a>. To restore privacy, we
-# | should ban the use of Internet-connected cameras aimed where and when the
-# | public is admitted, except when carried by people. Everyone must be free
-# | to post photos and video recordings occasionally, but the systematic
-# | accumulation of such data on the Internet must be limited.
-#| msgid ""
-#| "Internet-connected cameras often have lousy digital security themselves, "
-#| "so <a href=\"http://www.networkworld.com/community/blog/cia-wants-spy-you-"
-#| "through-your-appliances\"> anyone could watch what the camera sees</a>. "
-#| "To restore privacy, we should ban the use of Internet-connected cameras "
-#| "aimed where and when the public is admitted, except when carried by "
-#| "people. Everyone must be free to post photos and video recordings "
-#| "occasionally, but the systematic accumulation of such data on the "
-#| "Internet must be limited."
msgid ""
"Internet-connected cameras often have lousy digital security themselves, so "
"<a href=\"http://www.networkworld.com/community/blog/cia-wants-spy-you-"
@@ -804,23 +555,6 @@
"гоÑÑдаÑÑÑвÑ."
#. type: Content of: <p>
-# | The NSA, through PRISM, has <a
-# | href=\"https://www.commondreams.org/headline/2013/08/23-2\">[- -]gotten
-# | into the databases of many large Internet corporations</a>. AT&T has
-# | saved all its phone call records since 1987 and <a
-# |
href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">[-
-# | -]makes them available to the DEA</a> to search on request. Strictly
-# | speaking, the U.S. government does not possess that data, but in
-# | practical terms it may as well possess it.
-#| msgid ""
-#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-#| "headline/2013/08/23-2\"> gotten into the databases of many large Internet "
-#| "corporations</a>. AT&T has saved all its phone call records since "
-#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
-#| "vast-phone-trove-eclipsing-nsas.html?_r=0\"> makes them available to the "
-#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
-#| "does not possess that data, but in practical terms it may as well possess "
-#| "it."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -877,25 +611,6 @@
"конÑиденÑиалÑноÑÑи, Ñем намеÑениÑ
ÑоблÑдаÑÑ ÐµÐµ."
#. type: Content of: <p>
-# | We could correct both problems by adopting a system of anonymous
-# | payments—anonymous for the payer, that is. (We don't want the payee
-# | to dodge taxes.) <a
-# |
href=\"http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">[-
-# | -]Bitcoin is not anonymous</a>, though there are efforts to develop ways
-# | to pay anonymously with Bitcoin. However, technology for <a
-# | href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.html\">[-
-# | -]digital cash was first developed in the 1980s</a>; we need only suitable
-# | business arrangements, and for the state not to obstruct them.
-#| msgid ""
-#| "We could correct both problems by adopting a system of anonymous "
-#| "payments—anonymous for the payer, that is. (We don't want the "
-#| "payee to dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
-#| "lets-cut-through-the-bitcoin-hype/\"> Bitcoin is not anonymous</a>, "
-#| "though there are efforts to develop ways to pay anonymously with "
-#| "Bitcoin. However, technology for <a href=\"http://www.wired.com/wired/"
-#| "archive/2.12/emoney_pr.html\"> digital cash was first developed in the "
-#| "1980s</a>; we need only suitable business arrangements, and for the state "
-#| "not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want the payee "
@@ -933,27 +648,6 @@
msgstr "ÐеÑÑ Ð¿ÑоÑив Ñлежки за пеÑедвижениÑми"
#. type: Content of: <p>
-# | We must convert digital toll collection to anonymous payment (using
-# | digital cash, for instance). License-plate recognition systems recognize
-# | all license plates, and the <a
-# |
href=\"http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm\">[-
-# | -]data can be kept indefinitely</a>; they should be required by law to
-# | notice and record only those license numbers that are on a list of cars
-# | sought by court orders. A less secure alternative would record all cars
-# | locally but only for a few days, and not make the full data available over
-# | the Internet; access to the data should be limited to searching for a list
-# | of court-ordered license-numbers.
-#| msgid ""
-#| "We must convert digital toll collection to anonymous payment (using "
-#| "digital cash, for instance). License-plate recognition systems recognize "
-#| "all license plates, and the <a href=\"http://news.bbc.co.uk/2/hi/"
-#| "programmes/whos_watching_you/8064333.stm\"> data can be kept "
-#| "indefinitely</a>; they should be required by law to notice and record "
-#| "only those license numbers that are on a list of cars sought by court "
-#| "orders. A less secure alternative would record all cars locally but only "
-#| "for a few days, and not make the full data available over the Internet; "
-#| "access to the data should be limited to searching for a list of court-"
-#| "ordered license-numbers."
msgid ""
"We must convert digital toll collection to anonymous payment (using digital "
"cash, for instance). License-plate recognition systems recognize all "
@@ -977,14 +671,6 @@
"в ÑозÑÑке."
#. type: Content of: <p>
-# | The U.S. “no-fly” list must be abolished because it is <a
-# |
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes\">[-
-# | -]punishment without trial</a>.
-#| msgid ""
-#| "The U.S. “no-fly” list must be abolished because it is <a "
-#| "href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-"
-#| "racial-justice/victory-federal-court-recognizes\"> punishment without "
-#| "trial</a>."
msgid ""
"The U.S. “no-fly” list must be abolished because it is <a href="
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
@@ -1083,28 +769,6 @@
msgstr "ÐеÑÑ Ð¿ÑоÑив коммÑникаÑионнÑÑ
доÑÑе"
#. type: Content of: <p>
-# | Internet service providers and telephone companies keep extensive data on
-# | their users' contacts (browsing, phone calls, etc). With mobile phones,
-# | they also <a
-# |
href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">[-
-# | -]record the user's physical location</a>. They keep these dossiers for a
-# | long time: over 30 years, in the case of AT&T. Soon they will even <a
-# |
href=\"http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">[-
-# | -]record the user's body activities</a>. It appears that the <a
-# |
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">[-
-# | -]NSA collects cell phone location data</a> in bulk.
-#| msgid ""
-#| "Internet service providers and telephone companies keep extensive data on "
-#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
-#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-#| "protection-malte-spitz\"> record the user's physical location</a>. They "
-#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
-#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
-#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
-#| "become-qs-activity-trackers/\"> record the user's body activities</a>. "
-#| "It appears that the <a href=\"https://www.aclu.org/blog/national-security-"
-#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\"> NSA "
-#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
@@ -1146,27 +810,6 @@
"ÑÑдебном поÑÑдке."
#. type: Content of: <p>
-# | This solution is not entirely satisfactory, because it won't physically
-# | stop the government from collecting all the information immediately as it
-# | is generated—which is what the <a
-# |
href=\"http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">[-
-# | -]U.S. does with some or all phone companies</a>. We would have to rely
-# | on prohibiting that by law. However, that would be better than the
-# | current situation, where the relevant law (the PATRIOT Act) does not
-# | clearly prohibit the practice. In addition, if the government did resume
-# | this sort of surveillance, it would not get data about everyone's phone
-# | calls made prior to that time.
-#| msgid ""
-#| "This solution is not entirely satisfactory, because it won't physically "
-#| "stop the government from collecting all the information immediately as it "
-#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
-#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\"> U.S. does with "
-#| "some or all phone companies</a>. We would have to rely on prohibiting "
-#| "that by law. However, that would be better than the current situation, "
-#| "where the relevant law (the PATRIOT Act) does not clearly prohibit the "
-#| "practice. In addition, if the government did resume this sort of "
-#| "surveillance, it would not get data about everyone's phone calls made "
-#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
@@ -1201,15 +844,15 @@
"service would know only that I received mail from some user of your email "
"service, but it would be hard to determine that you had sent mail to me."
msgstr ""
-"ЧÑо каÑаеÑÑÑ ÑÐ°Ð¹Ð½Ñ ÑлекÑÑонной пеÑепиÑки,
пÑоÑÑÑм ÑаÑÑиÑнÑм ÑеÑением "
-"Ð´Ð»Ñ Ð²Ð°Ñ Ð¸ дÑÑгиÑ
бÑÐ´ÐµÑ Ð¿Ð¾Ð»ÑзоваÑÑÑÑ
ÑлÑжбами ÑлекÑÑонной поÑÑÑ Ð² ÑÑÑане, "
-"коÑоÑÐ°Ñ Ð½Ð¸ÐºÐ¾Ð³Ð´Ð° не ÑÑала Ð±Ñ ÑоÑÑÑдниÑаÑÑ
Ñ Ð²Ð°Ñим пÑавиÑелÑÑÑвом, и "
-"ÑвÑзÑваÑÑÑÑ Ð´ÑÑг Ñ Ð´ÑÑгом Ñ
иÑполÑзованием кÑипÑогÑаÑии. Ðднако Ñ
ÐейдеÑа "
-"ÐевиÑона (владелеÑа поÑÑовой ÑлÑÐ¶Ð±Ñ Lavabit,
коÑоÑÑÑ Ñлежка СШРпÑÑалаÑÑ "
-"полноÑÑÑÑ ÑазложиÑÑ) еÑÑÑ Ð¼ÑÑÐ»Ñ Ð¾
кÑипÑогÑаÑиÑеÑкой ÑиÑÑеме, Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ "
-"коÑоÑой ваÑей ÑлÑжбе ÑлекÑÑонной поÑÑÑ
бÑло Ð±Ñ Ð¸Ð·Ð²ÐµÑÑно ÑолÑко Ñо, ÑÑо "
-"Ð²Ñ Ð¿Ð¾Ñлали ÑообÑение какомÑ-Ñо
полÑзоваÑÐµÐ»Ñ Ð¼Ð¾ÐµÐ¹ ÑлÑÐ¶Ð±Ñ ÑлекÑÑонной
поÑÑÑ, "
-"но бÑло Ð±Ñ ÑÑÑдно опÑеделиÑÑ, ÑÑо вÑ
поÑлали ÑообÑение мне."
+"ЧÑо каÑаеÑÑÑ ÑÐ°Ð¹Ð½Ñ ÑлекÑÑонной пеÑепиÑки,
пÑоÑÑÑм ÑаÑÑиÑнÑм ÑеÑением Ð´Ð»Ñ Ð²Ð°Ñ "
+"и дÑÑгиÑ
бÑÐ´ÐµÑ Ð¿Ð¾Ð»ÑзоваÑÑÑÑ ÑлÑжбами
ÑлекÑÑонной поÑÑÑ Ð² ÑÑÑане, коÑоÑÐ°Ñ "
+"никогда не ÑÑала Ð±Ñ ÑоÑÑÑдниÑаÑÑ Ñ Ð²Ð°Ñим
пÑавиÑелÑÑÑвом, и ÑвÑзÑваÑÑÑÑ Ð´ÑÑг "
+"Ñ Ð´ÑÑгом Ñ Ð¸ÑполÑзованием кÑипÑогÑаÑии.
Ðднако Ñ ÐейдеÑа ÐевиÑона (владелеÑа "
+"поÑÑовой ÑлÑÐ¶Ð±Ñ Lavabit, коÑоÑÑÑ Ñлежка СШÐ
пÑÑалаÑÑ Ð¿Ð¾Ð»Ð½Ð¾ÑÑÑÑ ÑазложиÑÑ) "
+"еÑÑÑ Ð¼ÑÑÐ»Ñ Ð¾ кÑипÑогÑаÑиÑеÑкой ÑиÑÑеме, Ñ
помоÑÑÑ ÐºÐ¾ÑоÑой ваÑей ÑлÑжбе "
+"ÑлекÑÑонной поÑÑÑ Ð±Ñло Ð±Ñ Ð¸Ð·Ð²ÐµÑÑно ÑолÑко
Ñо, ÑÑо Ð²Ñ Ð¿Ð¾Ñлали ÑообÑение "
+"какомÑ-Ñо полÑзоваÑÐµÐ»Ñ Ð¼Ð¾ÐµÐ¹ ÑлÑжбÑ
ÑлекÑÑонной поÑÑÑ, но бÑло Ð±Ñ ÑÑÑдно "
+"опÑеделиÑÑ, ÑÑо Ð²Ñ Ð¿Ð¾Ñлали ÑообÑение мне."
#. type: Content of: <h3>
msgid "But Some Surveillance Is Necessary"
@@ -1232,27 +875,6 @@
"ÑÑаÑÑÑÑ, ÑÑо не Ð´Ð°ÐµÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑи наÑ
одиÑÑ
оÑведомиÑелей задним ÑиÑлом."
#. type: Content of: <p>
-# | Individuals with special state-granted power, such as police, forfeit
-# | their right to privacy and must be monitored. (In fact, police have their
-# | own jargon term for perjury, “<a
-# |
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,”
-# | since they do it so frequently, particularly about protesters and <a
-# | href=\"http://photographyisnotacrime.com/\">[- -]photographers</a>.) One
-# | city in California that required police to wear video cameras all the time
-# | found <a
-# |
href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">[-
-# | -]their use of force fell by 60%</a>. The ACLU is in favor of this.
-#| msgid ""
-#| "Individuals with special state-granted power, such as police, forfeit "
-#| "their right to privacy and must be monitored. (In fact, police have "
-#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
-#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
-#| "” since they do it so frequently, particularly about protesters and "
-#| "<a href=\"http://photographyisnotacrime.com/\"> photographers</a>.) One "
-#| "city in California that required police to wear video cameras all the "
-#| "time found <a href=\"http://www.motherjones.com/kevin-drum/2013/08/"
-#| "ubiquitous-surveillance-police-edition\"> their use of force fell by 60%</"
-#| "a>. The ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1311,21 +933,6 @@
"Ñ
оде пÑедпÑинимаÑелÑÑкой деÑÑелÑноÑÑи."
#. type: Content of: <p>
-# | Digital technology has brought about a tremendous increase in the level of
-# | surveillance of our movements, actions, and communications. It is far
-# | more than we experienced in the 1990s, and <a
-# |
href=\"http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html\">[-
-# | -]far more than people behind the Iron Curtain experienced</a> in the
-# | 1980s, and would still be far more even with additional legal limits on
-# | state use of the accumulated data.
-#| msgid ""
-#| "Digital technology has brought about a tremendous increase in the level "
-#| "of surveillance of our movements, actions, and communications. It is far "
-#| "more than we experienced in the 1990s, and <a href=\"http://blogs.hbr.org/"
-#| "cs/2013/06/your_iphone_works_for_the_secret_police.html\"> far more than "
-#| "people behind the Iron Curtain experienced</a> in the 1980s, and would "
-#| "still be far more even with additional legal limits on state use of the "
-#| "accumulated data."
msgid ""
"Digital technology has brought about a tremendous increase in the level of "
"surveillance of our movements, actions, and communications. It is far more "