www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/surveillance-vs-democracy.fr.htm...


From: GNUN
Subject: www philosophy/surveillance-vs-democracy.fr.htm...
Date: Sat, 17 Oct 2015 12:28:43 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     15/10/17 12:28:43

Modified files:
        philosophy     : surveillance-vs-democracy.fr.html 
        philosophy/po  : surveillance-vs-democracy.fr-en.html 
        proprietary    : malware-microsoft.fr.html 
                         proprietary-back-doors.fr.html 
                         proprietary-sabotage.fr.html 
                         proprietary-surveillance.fr.html 
        proprietary/po : malware-microsoft.fr-en.html 
                         proprietary-back-doors.fr-en.html 
                         proprietary-sabotage.fr-en.html 
                         proprietary-sabotage.fr.po 
                         proprietary-surveillance.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.fr.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.fr-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.14&r2=1.15

Patches:
Index: philosophy/surveillance-vs-democracy.fr.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.fr.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- philosophy/surveillance-vs-democracy.fr.html        3 Sep 2015 18:57:46 
-0000       1.27
+++ philosophy/surveillance-vs-democracy.fr.html        17 Oct 2015 12:28:40 
-0000      1.28
@@ -44,8 +44,8 @@
 contrôle de nos vies numériques – qui inclut la prévention de la
 surveillance. Nous ne pouvons faire confiance aux logiciels non libres ; la
 NSA <a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>utilise</a>
-et même <a
+href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>
+utilise</a> et même <a
 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>crée</a>
 des failles de sécurité dans des logiciels non libres afin d'envahir nos
 ordinateurs et nos routeurs. Le logiciel libre nous donne le contrôle de nos
@@ -622,7 +622,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/09/03 18:57:46 $
+$Date: 2015/10/17 12:28:40 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/surveillance-vs-democracy.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.fr-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- philosophy/po/surveillance-vs-democracy.fr-en.html  3 Sep 2015 18:57:46 
-0000       1.23
+++ philosophy/po/surveillance-vs-democracy.fr-en.html  17 Oct 2015 12:28:41 
-0000      1.24
@@ -36,7 +36,7 @@
 I've advocated for 30 years</a>, is the first step in taking control
 of our digital lives, and that includes preventing surveillance.  We
 can't trust nonfree software; the NSA
-<a 
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>uses</a>
+<a 
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>uses</a>
 and
 even <a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>creates</a>
 security weaknesses in nonfree software to invade our own computers
@@ -521,7 +521,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/09/03 18:57:46 $
+$Date: 2015/10/17 12:28:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/malware-microsoft.fr.html       2 Oct 2015 18:58:40 -0000       
1.10
+++ proprietary/malware-microsoft.fr.html       17 Oct 2015 12:28:41 -0000      
1.11
@@ -118,13 +118,14 @@
   </p></li>
 
   <li><p><a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
-renseigne la NSA sur les bogues de Windows avant de les corriger</a>.</p></li>
+href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>
+Microsoft renseigne la NSA sur les bogues de Windows avant de les
+corriger</a>.</p></li>
 
   <li><p><a
-href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>Microsoft
-a arrêté les correctifs de sécurité pour Windows XP, sauf pour quelques 
gros
-utilisateurs qui paient un prix exorbitant</a>.</p>
+href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>
+Microsoft a arrêté les correctifs de sécurité pour Windows XP, sauf pour
+quelques gros utilisateurs qui paient un prix exorbitant</a>.</p>
 
   <p>De même, Microsoft va <a
 
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/";>
@@ -307,7 +308,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/10/02 18:58:40 $
+$Date: 2015/10/17 12:28:41 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/proprietary-back-doors.fr.html  27 Aug 2015 10:58:11 -0000      
1.4
+++ proprietary/proprietary-back-doors.fr.html  17 Oct 2015 12:28:41 -0000      
1.5
@@ -18,6 +18,16 @@
 privateurs.</p>
 
 <ul>
+<li><p>
+Des utilisateurs rapportent que <a
+href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
+Microsoft les force à remplacer Windows 7 et 8 par Windows 10, l'espion tous
+azimuths</a>.</p>
+
+<p>
+Il semble que cela se fasse par le moyen d'une porte dérobée dans Windows 7
+et 8.
+</p></li>
 
 <li>
 <p>La plupart des téléphones ont une porte dérobée universelle qui a été
@@ -290,7 +300,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/08/27 10:58:11 $
+$Date: 2015/10/17 12:28:41 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-sabotage.fr.html    12 Oct 2015 18:27:32 -0000      
1.6
+++ proprietary/proprietary-sabotage.fr.html    17 Oct 2015 12:28:41 -0000      
1.7
@@ -18,11 +18,25 @@
 
 <ul>
 <li><p>
-La société Lenovo <a
+Des utilisateurs rapportent que <a
+href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
+Microsoft les force à remplacer Windows 7 et 8 par Windows 10, l'espion tous
+azimuths</a>.</p>
+
+<p>
+Il semble que cela se fasse par le moyen d'une porte dérobée dans Windows 7
+et 8.
+</p></li>
+
+<li><p>
+<a
 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
-a saboté le BIOS des machines qu'elle vend</a> pour s'assurer que son
-logiciel espion est présent sur chaque système Windows qui y est installé 
–
-même une fois les disques reformatés.
+Lenovo a installé furtivement des logiciels promotionnels et espions via le
+BIOS</a>, sur des installations de Windows. Notez que la méthode
+particulière de sabotage utilisée par Lenovo n'a pas affecté GNU/Linux ; 
par
+ailleurs, une installation « propre » de Windows n'est pas vraiment propre
+puisque <a href="/proprietary/malware-microsoft.html"> Microsoft y ajoute
+ses propres logiciels malveillants</a>.
 </p></li>
 
 <li><p>
@@ -32,16 +46,6 @@
 Windows 10.
 </p></li>
 
-<li><p>
-<a
-href="https://www.techdirt.com/articles/20150812/11395231925/lenovo-busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml";>
-Lenovo a installé furtivement des logiciels promotionnels, via le BIOS,</a>
-sur des installations de Windows. Notez que la méthode particulière de
-sabotage utilisée par Lenovo n'a pas affecté GNU/Linux ; par ailleurs, une
-installation « propre » de Windows n'est pas vraiment propre puisque <a
-href="/proprietary/malware-microsoft.html"> Microsoft y ajoute ses propres
-logiciels malveillants</a>.</p></li>
-
 <li><p>Vizio <a
 href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
 a utilisé une « mise à niveau » du micrologiciel <cite>[firmware]</cite>
@@ -64,8 +68,9 @@
 
 <li><p>
 <a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
-renseigne la NSA sur les bogues de Windows avant de les corriger</a>.
+href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>
+Microsoft renseigne la NSA sur les bogues de Windows avant de les
+corriger</a>.
 </p></li>
 
 <li><p>
@@ -88,9 +93,9 @@
 
 <li><p>
 <a
-href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>Microsoft
-a arrêté les correctifs de sécurité pour Windows XP, sauf pour quelques 
gros
-utilisateurs qui paient un prix exorbitant</a>.</p>
+href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>
+Microsoft a arrêté les correctifs de sécurité pour Windows XP, sauf pour
+quelques gros utilisateurs qui paient un prix exorbitant</a>.</p>
 
 <p>De même, Microsoft va <a
 
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/";>
@@ -262,7 +267,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/10/12 18:27:32 $
+$Date: 2015/10/17 12:28:41 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/proprietary-surveillance.fr.html        2 Oct 2015 18:58:41 
-0000       1.17
+++ proprietary/proprietary-surveillance.fr.html        17 Oct 2015 12:28:41 
-0000      1.18
@@ -34,6 +34,14 @@
     <li><a href="#SpywareInToys">Jouets</a></li>
       </ul>
     </li>
+    <li><a href="#SpywareAtLowLevel">Espions de bas-niveau</a>
+      <ul>
+    <li><a href="#SpywareInBIOS">BIOS</a></li>
+    
+      <!-- <li>
+<a href="#SpywareInFirmware">Spyware in Firmware</a></li> -->
+</ul>
+    </li>
     <li><a href="#SpywareAtWork">Espions sur le lieu de travail</a>
       <ul>
     <li><a href="#SpywareInSkype">Skype</a></li>
@@ -485,6 +493,35 @@
   </li>
 </ul>
 
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+<div class="big-section">
+  <h3 id="SpywareAtLowLevel">Espions de bas-niveau</h3>
+  <span class="anchor-reference-id">(<a
+href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInBIOS">BIOS</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
+href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
+Lenovo a installé furtivement des logiciels promotionnels et espions via le
+BIOS</a>, sur des installations de Windows. Notez que la méthode
+particulière de sabotage utilisée par Lenovo n'a pas affecté GNU/Linux ; 
par
+ailleurs, une installation « propre » de Windows n'est pas vraiment propre
+puisque <a href="/proprietary/malware-microsoft.html"> Microsoft y ajoute
+ses propres logiciels malveillants</a>.
+</p></li>
+</ul>
+
 <!-- #SpywareAtWork -->
 <!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <div class="big-section">
@@ -812,7 +849,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/10/02 18:58:41 $
+$Date: 2015/10/17 12:28:41 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/malware-microsoft.fr-en.html 2 Oct 2015 18:58:41 -0000       
1.10
+++ proprietary/po/malware-microsoft.fr-en.html 17 Oct 2015 12:28:42 -0000      
1.11
@@ -94,10 +94,10 @@
   repeatedly nagging many users to install Windows 10</a>.
   </p></li>
 
-  <li><p><a 
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
+  <li><p><a 
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>
   Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
 
-  <li><p><a 
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>
+  <li><p><a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>
   Microsoft cut off security fixes for Windows XP, except to some big users
   that pay exorbitantly.</a></p>
 
@@ -250,7 +250,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/02 18:58:41 $
+$Date: 2015/10/17 12:28:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-back-doors.fr-en.html    27 Aug 2015 10:58:12 
-0000      1.4
+++ proprietary/po/proprietary-back-doors.fr-en.html    17 Oct 2015 12:28:42 
-0000      1.5
@@ -10,6 +10,14 @@
 <p>Here are examples of demonstrated back doors in proprietary software.</p>
 
 <ul>
+<li><p>
+Users report <a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
+Microsoft is forcing them to replace Windows 7 and 8 with
+all-spying Windows 10</a>.</p>
+
+<p>
+This seems to involve use of a back door in Windows 7 and 8.
+</p></li>
 
 <li>
 <p>Most mobile phones have a universal back door, which has been used to
@@ -246,7 +254,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/08/27 10:58:12 $
+$Date: 2015/10/17 12:28:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-sabotage.fr-en.html      12 Oct 2015 18:27:33 
-0000      1.6
+++ proprietary/po/proprietary-sabotage.fr-en.html      17 Oct 2015 12:28:42 
-0000      1.7
@@ -13,25 +13,27 @@
 
 <ul>
 <li><p>
-Lenovo <a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
-has sabotaged the BIOS of the machines they sell</a> to make
-sure their
-spyware is present on every Windows system that is installed on them -
-even after formatting the disks.
-</p></li>
+Users report <a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
+Microsoft is forcing them to replace Windows 7 and 8 with
+all-spying Windows 10</a>.</p>
 
-<li><p>
-Microsoft is <a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
-repeatedly nagging many users to install Windows 10</a>.
+<p>
+This seems to involve use of a back door in Windows 7 and 8.
 </p></li>
 
 <li><p>
-<a 
href="https://www.techdirt.com/articles/20150812/11395231925/lenovo-busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml";>
-Lenovo stealthily installed crapware via BIOS</a> on Windows installs.
+<a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows 
installs.
 Note that the specific sabotage method Lenovo used did not affect
 GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
 clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.</p></li>
+puts in its own malware</a>.
+</p></li>
+
+<li><p>
+Microsoft is <a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
+repeatedly nagging many users to install Windows 10</a>.
+</p></li>
 
 <li><p>Vizio
 <a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
@@ -50,7 +52,7 @@
 </p></li>
 
 <li><p>
-<a 
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
+<a 
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>Microsoft
 informs the NSA of bugs in Windows before fixing them.</a>
 </p></li>
 
@@ -71,7 +73,7 @@
 </p></li>
 
 <li><p>
-<a 
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>Microsoft
+<a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>Microsoft
 cut off security fixes for Windows XP, except to some big
     users that pay exorbitantly.</a></p>
 
@@ -216,7 +218,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/12 18:27:33 $
+$Date: 2015/10/17 12:28:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/proprietary-sabotage.fr.po   17 Oct 2015 12:04:17 -0000      
1.20
+++ proprietary/po/proprietary-sabotage.fr.po   17 Oct 2015 12:28:42 -0000      
1.21
@@ -72,12 +72,12 @@
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo a installé furtivement des logiciels promotionnels et espions via le 
BIOS</a>, "
-"sur des installations de Windows. Notez que la méthode particulière de "
-"sabotage utilisée par Lenovo n'a pas affecté GNU/Linux ; par ailleurs, une 
"
-"installation « propre » de Windows n'est pas vraiment propre puisque <a 
href="
-"\"/proprietary/malware-microsoft.html\"> Microsoft y ajoute ses propres "
-"logiciels malveillants</a>."
+"Lenovo a installé furtivement des logiciels promotionnels et espions via le "
+"BIOS</a>, sur des installations de Windows. Notez que la méthode "
+"particulière de sabotage utilisée par Lenovo n'a pas affecté GNU/Linux ; 
par "
+"ailleurs, une installation « propre » de Windows n'est pas vraiment 
propre "
+"puisque <a href=\"/proprietary/malware-microsoft.html\"> Microsoft y ajoute "
+"ses propres logiciels malveillants</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: proprietary/po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/proprietary-surveillance.fr-en.html  2 Oct 2015 18:58:41 
-0000       1.14
+++ proprietary/po/proprietary-surveillance.fr-en.html  17 Oct 2015 12:28:42 
-0000      1.15
@@ -29,6 +29,12 @@
     <li><a href="#SpywareInToys">Spyware in Toys</a></li>
       </ul>
     </li>
+    <li><a href="#SpywareAtLowLevel">Spyware at Low Level</a>
+      <ul>
+    <li><a href="#SpywareInBIOS">Spyware in BIOS</a></li>
+    <!-- <li><a href="#SpywareInFirmware">Spyware in Firmware</a></li> -->
+      </ul>
+    </li>
     <li><a href="#SpywareAtWork">Spyware at Work</a>
       <ul>
     <li><a href="#SpywareInSkype">Spyware in Skype</a></li>
@@ -448,6 +454,32 @@
 </ul>
 
 
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+
+<div class="big-section">
+  <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+  <span class="anchor-reference-id">(<a 
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows 
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
 <!-- #SpywareAtWork -->
 <!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 
@@ -733,7 +765,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/02 18:58:41 $
+$Date: 2015/10/17 12:28:42 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]