[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-apple.ru.html proprieta...
From: |
GNUN |
Subject: |
www/proprietary malware-apple.ru.html proprieta... |
Date: |
Mon, 19 Oct 2015 15:58:14 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 15/10/19 15:58:14
Modified files:
proprietary : malware-apple.ru.html
proprietary-back-doors.ru.html
proprietary-censorship.ru.html
proprietary-insecurity.ru.html
proprietary/po : malware-apple.ru-en.html malware-apple.ru.po
proprietary-back-doors.ru-en.html
proprietary-back-doors.ru.po
proprietary-censorship.ru-en.html
proprietary-censorship.ru.po
proprietary-insecurity.ru-en.html
proprietary-insecurity.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.ru.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ru.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.ru.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ru-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ru.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.32&r2=1.33
Patches:
Index: malware-apple.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.ru.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- malware-apple.ru.html 18 Oct 2015 15:29:32 -0000 1.10
+++ malware-apple.ru.html 19 Oct 2015 15:58:12 -0000 1.11
@@ -72,23 +72,36 @@
<h3 id="back-doors">Ðазейки</h3>
<ul>
- <li><p>Ð iPhone еÑÑÑ <a
+<li><p>
+Ð Mac OS X <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+в ÑеÑение 4 Ð»ÐµÑ Ð¿ÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>, коÑоÑÑм
+взломÑики могли воÑполÑзоваÑÑÑÑ, ÑÑобÑ
полÑÑиÑÑ Ð¿Ñава админиÑÑÑаÑоÑа.
+</p></li>
+
+<li><p>Ð iPhone еÑÑÑ <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
лазейка, коÑоÑÐ°Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÐµÑ Apple ÑдалÑÑÑ Ð¿Ð¾
ÑеÑи пÑиложениÑ</a>, коÑоÑÑе
Apple ÑоÑÑÐµÑ “неподÑ
одÑÑими”. ÐжобÑ
говоÑил, ÑÑо ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð¼Ð¾Ð¶ÐµÑ
-обладаÑÑ ÑÑой влаÑÑÑÑ, поÑÐ¾Ð¼Ñ ÑÑо мÑ,
конеÑно, можем довеÑÑÑÑ Apple.</p>
- </li>
+обладаÑÑ ÑÑой влаÑÑÑÑ, поÑÐ¾Ð¼Ñ ÑÑо мÑ,
конеÑно, можем довеÑÑÑÑ Apple.
+</p></li>
- <li><p>Ð iPhone еÑÑÑ Ð»Ð°Ð·ÐµÐ¹ÐºÐ° Ð´Ð»Ñ <a
+<li><p>Ð iPhone еÑÑÑ Ð»Ð°Ð·ÐµÐ¹ÐºÐ° Ð´Ð»Ñ <a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
Ñдаленного ÑÑиÑаниÑ</a>. Ðна не вÑегда
дейÑÑвÑеÑ, но полÑзоваÑели акÑивиÑÑÑÑ
-ее, не понимаÑ, ÑÑо они ÑÑо делаÑÑ.</p>
- </li>
+ее, не понимаÑ, ÑÑо они ÑÑо делаÑÑ.
+</p></li>
</ul>
<h3 id="censorship">ЦензÑÑа</h3>
<ul>
<li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
наложила
+запÑÐµÑ Ð½Ð° пÑогÑÐ°Ð¼Ð¼Ñ Ð¸Ð· App Store</a> за Ñо, ÑÑо ее
ÑазÑабоÑÑики злодейÑки
+вÑкÑÑли какие-Ñо ай-ÑÑÑÑки.
+</p></li>
+
+<li><p>
Apple оÑклонÑла пÑиложение, коÑоÑое
показÑвало меÑÑа ÑбийÑÑва ÑобоÑами в
СШÐ, под ÑазлиÑнÑми пÑедлогами. ÐаждÑй Ñаз,
когда ÑазÑабоÑÑики ÑÑÑÑанÑли
Ð¾Ð´Ð½Ñ “пÑоблемє, Apple жаловалаÑÑ Ð½Ð°
дÑÑгÑÑ. ÐоÑле пÑÑого
@@ -374,7 +387,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2015/10/18 15:29:32 $
+$Date: 2015/10/19 15:58:12 $
<!-- timestamp end -->
</p>
Index: proprietary-back-doors.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ru.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary-back-doors.ru.html 18 Oct 2015 15:29:32 -0000 1.5
+++ proprietary-back-doors.ru.html 19 Oct 2015 15:58:12 -0000 1.6
@@ -18,6 +18,12 @@
<ul>
<li><p>
+Ð Mac OS X <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+в ÑеÑение 4 Ð»ÐµÑ Ð¿ÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>.
+</p></li>
+
+<li><p>
Ðо ÑообÑениÑм полÑзоваÑелей, <a
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
Microsoft вÑнÑÐ¶Ð´Ð°ÐµÑ Ð¸Ñ
замениÑÑ Windows 7 и 8
на ÑпионÑÑÑÑ Ð·Ð° вÑем
@@ -293,7 +299,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2015/10/18 15:29:32 $
+$Date: 2015/10/19 15:58:12 $
<!-- timestamp end -->
</p>
Index: proprietary-censorship.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.ru.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary-censorship.ru.html 16 Oct 2015 20:00:55 -0000 1.4
+++ proprietary-censorship.ru.html 19 Oct 2015 15:58:13 -0000 1.5
@@ -22,6 +22,12 @@
<ul>
<li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
наложила
+запÑÐµÑ Ð½Ð° пÑогÑÐ°Ð¼Ð¼Ñ Ð¸Ð· App Store</a> за Ñо, ÑÑо ее
ÑазÑабоÑÑики злодейÑки
+вÑкÑÑли какие-Ñо ай-ÑÑÑÑки.
+</p></li>
+
+<li><p>
Apple оÑклонÑла пÑиложение, коÑоÑое
показÑвало меÑÑа ÑбийÑÑва ÑобоÑами в
СШÐ, под ÑазлиÑнÑми пÑедлогами. ÐаждÑй Ñаз,
когда ÑазÑабоÑÑики ÑÑÑÑанÑли
Ð¾Ð´Ð½Ñ “пÑоблемє, Apple жаловалаÑÑ Ð½Ð°
дÑÑгÑÑ. ÐоÑле пÑÑого
@@ -128,7 +134,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2015/10/16 20:00:55 $
+$Date: 2015/10/19 15:58:13 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-insecurity.ru.html 7 Oct 2015 16:00:27 -0000 1.10
+++ proprietary-insecurity.ru.html 19 Oct 2015 15:58:13 -0000 1.11
@@ -26,31 +26,40 @@
вводÑÑ ÐµÐµ пÑеднамеÑенно, а <em>полÑзоваÑели
не в ÑоÑÑоÑнии заделаÑÑ ÐµÐµ</em>.</p>
<ul>
+<li>
+<p>
+Ð Mac OS X <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+в ÑеÑение 4 Ð»ÐµÑ Ð¿ÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>, коÑоÑÑм
+взломÑики могли воÑполÑзоваÑÑÑÑ, ÑÑобÑ
полÑÑиÑÑ Ð¿Ñава админиÑÑÑаÑоÑа.
+</p>
+</li>
<li>
<p>СпеÑиалиÑÑÑ Ð¿Ð¾ безопаÑноÑÑи обнаÑÑжили <a
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
ÑÑзвимоÑÑÑ Ð² диагноÑÑиÑеÑкиÑ
ÑÑÑÑойÑÑваÑ
,
пÑименÑемÑÑ
Ð´Ð»Ñ ÑÑÑаÑ
Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¸
оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¼Ð°ÑÑÑÑÑов</a>, коÑоÑаÑ
позволÑла им полÑÑиÑÑ ÑдаленнÑй конÑÑолÑ
-над авÑомобилÑми поÑÑедÑÑвом SMS.</p>
+над авÑомобилÑми поÑÑедÑÑвом SMS.
+</p>
</li>
- <li>
- <p>
- ÐзломÑикам ÑдалоÑÑ <a
+<li>
+<p>
+ÐзломÑикам ÑдалоÑÑ <a
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">
полÑÑиÑÑ ÑдаленнÑй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ джипом</a>
“Ñ Ñоединением”.
- <br/>Ðни могли ÑледиÑÑ Ð·Ð° авÑомобилем,
запÑÑкаÑÑ Ð¸ оÑÑанавливаÑÑ Ð´Ð²Ð¸Ð³Ð°ÑелÑ,
+<br/>Ðни могли ÑледиÑÑ Ð·Ð° авÑомобилем,
запÑÑкаÑÑ Ð¸ оÑÑанавливаÑÑ Ð´Ð²Ð¸Ð³Ð°ÑелÑ,
вклÑÑаÑÑ Ð¸ вÑклÑÑаÑÑ ÑоÑмоз, а Ñакже
многое дÑÑгое.
- </p>
- <p>
- Я дÑмаÑ, ÑÑо ÐÑайÑÐ»ÐµÑ Ð¸ ÐÐÐ Ñоже ÑÑо
могÑÑ.
- </p>
- <p>
- ÐÑли Ñ Ð¼ÐµÐ½Ñ ÐºÐ¾Ð³Ð´Ð°-нибÑÐ´Ñ Ð±ÑÐ´ÐµÑ Ð¼Ð°Ñина и
в ней бÑÐ´ÐµÑ Ð¼Ð¾Ð±Ð¸Ð»ÑнÑй ÑелеÑон, Ñ ÐµÐ³Ð¾
+</p>
+<p>
+Я дÑмаÑ, ÑÑо ÐÑайÑÐ»ÐµÑ Ð¸ ÐÐÐ Ñоже ÑÑо могÑÑ.
+</p>
+<p>
+ÐÑли Ñ Ð¼ÐµÐ½Ñ ÐºÐ¾Ð³Ð´Ð°-нибÑÐ´Ñ Ð±ÑÐ´ÐµÑ Ð¼Ð°Ñина и в
ней бÑÐ´ÐµÑ Ð¼Ð¾Ð±Ð¸Ð»ÑнÑй ÑелеÑон, Ñ ÐµÐ³Ð¾
вÑклÑÑÑ.
- </p>
- </li>
+</p>
+</li>
<li>
<p>
@@ -274,7 +283,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2015/10/07 16:00:27 $
+$Date: 2015/10/19 15:58:13 $
<!-- timestamp end -->
</p>
Index: po/malware-apple.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-apple.ru-en.html 18 Oct 2015 15:29:33 -0000 1.9
+++ po/malware-apple.ru-en.html 19 Oct 2015 15:58:13 -0000 1.10
@@ -61,23 +61,36 @@
<h3 id="back-doors">Apple Back Doors</h3>
<ul>
- <li><p>The iPhone has a back door <a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
- that allows Apple to remotely delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's OK for Apple to have this
- power because of course we can trust Apple.</p>
- </li>
+<li><p>
+Mac OS X had an
+<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p></li>
- <li><p>The iPhone has a back door for <a
-
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
- remote wipe</a>. It's not always enabled, but users are led into
- enabling it without understanding.</p>
- </li>
+<li><p>The iPhone has a back door <a
+href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+that allows Apple to remotely delete apps</a> which Apple considers
+“inappropriate”. Jobs said it's OK for Apple to have this
+power because of course we can trust Apple.
+</p></li>
+
+<li><p>The iPhone has a back door for <a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into
+enabling it without understanding.
+</p></li>
</ul>
<h3 id="censorship">Apple Censorship</h3>
<ul>
<li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+banned a program from the App Store</a> because its developers
+committed the enormity of disassembling some iThings.
+</p></li>
+
+<li><p>
Apple rejected an app that displayed the locations of US drone
assassinations, giving various excuses. Each time the developers
fixed one “problem”, Apple complained about another.
@@ -329,7 +342,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/18 15:29:33 $
+$Date: 2015/10/19 15:58:13 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- po/malware-apple.ru.po 19 Oct 2015 15:47:17 -0000 1.30
+++ po/malware-apple.ru.po 19 Oct 2015 15:58:13 -0000 1.31
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-19 13:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -132,9 +131,9 @@
"privileges."
msgstr ""
"Ð Mac OS X <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\"> в ÑеÑение
4 Ð»ÐµÑ Ð¿ÑеднамеÑенно "
-"ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>, коÑоÑÑм
взломÑики могли воÑполÑзоваÑÑÑÑ, ÑÑобÑ
полÑÑиÑÑ "
-"пÑава админиÑÑÑаÑоÑа."
+"backdoor-api-to-root-privileges-in-apple-os-x/\"> в ÑеÑение
4 Ð»ÐµÑ "
+"пÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>,
коÑоÑÑм взломÑики могли "
+"воÑполÑзоваÑÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ Ð¿Ñава
админиÑÑÑаÑоÑа."
#. type: Content of: <ul><li><p>
msgid ""
@@ -172,9 +171,9 @@
"program from the App Store</a> because its developers committed the enormity "
"of disassembling some iThings."
msgstr ""
-"Apple <a href=\"http://ifixit.org/blog/7401/ifixit-app-pulled/\">
наложила запÑÐµÑ "
-"на пÑогÑÐ°Ð¼Ð¼Ñ Ð¸Ð· App Store</a> за Ñо, ÑÑо ее
ÑазÑабоÑÑики злодейÑки вÑкÑÑли "
-"какие-Ñо ай-ÑÑÑÑки."
+"Apple <a href=\"http://ifixit.org/blog/7401/ifixit-app-pulled/\">
наложила "
+"запÑÐµÑ Ð½Ð° пÑогÑÐ°Ð¼Ð¼Ñ Ð¸Ð· App Store</a> за Ñо, ÑÑо
ее ÑазÑабоÑÑики злодейÑки "
+"вÑкÑÑли какие-Ñо ай-ÑÑÑÑки."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/proprietary-back-doors.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-back-doors.ru-en.html 18 Oct 2015 15:29:33 -0000
1.5
+++ po/proprietary-back-doors.ru-en.html 19 Oct 2015 15:58:13 -0000
1.6
@@ -11,6 +11,11 @@
<ul>
<li><p>
+Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>.
+</p></li>
+
+<li><p>
Users report <a
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
Microsoft is forcing them to replace Windows 7 and 8 with
all-spying Windows 10</a>.</p>
@@ -254,7 +259,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/18 15:29:33 $
+$Date: 2015/10/19 15:58:13 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/proprietary-back-doors.ru.po 19 Oct 2015 15:47:17 -0000 1.15
+++ po/proprietary-back-doors.ru.po 19 Oct 2015 15:58:13 -0000 1.16
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-19 13:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -46,8 +45,8 @@
"door for 4 years</a>."
msgstr ""
"Ð Mac OS X <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\"> в ÑеÑение
4 Ð»ÐµÑ Ð¿ÑеднамеÑенно "
-"ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>."
+"backdoor-api-to-root-privileges-in-apple-os-x/\"> в ÑеÑение
4 Ð»ÐµÑ "
+"пÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/proprietary-censorship.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ru-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- po/proprietary-censorship.ru-en.html 16 Oct 2015 20:00:56 -0000
1.4
+++ po/proprietary-censorship.ru-en.html 19 Oct 2015 15:58:13 -0000
1.5
@@ -17,6 +17,12 @@
<ul>
<li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+banned a program from the App Store</a> because its developers
+committed the enormity of disassembling some iThings.
+</p></li>
+
+<li><p>
Apple rejected an app that displayed the locations of US drone
assassinations, giving various excuses. Each time the developers
fixed one “problem”, Apple complained about another.
@@ -100,7 +106,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/16 20:00:56 $
+$Date: 2015/10/19 15:58:13 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-censorship.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ru.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/proprietary-censorship.ru.po 19 Oct 2015 15:47:17 -0000 1.12
+++ po/proprietary-censorship.ru.po 19 Oct 2015 15:58:14 -0000 1.13
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-19 13:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Censorship - GNU Project - Free Software Foundation"
@@ -54,9 +53,9 @@
"program from the App Store</a> because its developers committed the enormity "
"of disassembling some iThings."
msgstr ""
-"Apple <a href=\"http://ifixit.org/blog/7401/ifixit-app-pulled/\">
наложила запÑÐµÑ "
-"на пÑогÑÐ°Ð¼Ð¼Ñ Ð¸Ð· App Store</a> за Ñо, ÑÑо ее
ÑазÑабоÑÑики злодейÑки вÑкÑÑли "
-"какие-Ñо ай-ÑÑÑÑки."
+"Apple <a href=\"http://ifixit.org/blog/7401/ifixit-app-pulled/\">
наложила "
+"запÑÐµÑ Ð½Ð° пÑогÑÐ°Ð¼Ð¼Ñ Ð¸Ð· App Store</a> за Ñо, ÑÑо
ее ÑазÑабоÑÑики злодейÑки "
+"вÑкÑÑли какие-Ñо ай-ÑÑÑÑки."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/proprietary-insecurity.ru-en.html 7 Oct 2015 16:00:28 -0000
1.9
+++ po/proprietary-insecurity.ru-en.html 19 Oct 2015 15:58:14 -0000
1.10
@@ -20,31 +20,40 @@
deliberately, and <em>the users are helpless to fix them</em>.</p>
<ul>
+<li>
+<p>
+Mac OS X had an
+<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p>
+</li>
<li>
<p>Security researchers discovered a
<a
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
vulnerability in diagnostic dongles used for vehicle tracking and
insurance</a> that let them take remote control of a car or
-lorry using an SMS.</p>
+lorry using an SMS.
+</p>
</li>
- <li>
- <p>
- Crackers were able to
- <a
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">take
remote control of the Jeep</a>
- “connected car”.
- <br/>They could track the car, start or stop the engine, and
- activate or deactivate the brakes, and more.
- </p>
- <p>
- I expect that Chrysler and the NSA can do this too.
- </p>
- <p>
- If I ever own a car, and it contains a portable phone, I will
- deactivate that.
- </p>
- </li>
+<li>
+<p>
+Crackers were able to
+<a
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">take
remote control of the Jeep</a>
+“connected car”.
+<br/>They could track the car, start or stop the engine, and
+activate or deactivate the brakes, and more.
+</p>
+<p>
+I expect that Chrysler and the NSA can do this too.
+</p>
+<p>
+If I ever own a car, and it contains a portable phone, I will
+deactivate that.
+</p>
+</li>
<li>
<p>
@@ -233,7 +242,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/07 16:00:28 $
+$Date: 2015/10/19 15:58:14 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- po/proprietary-insecurity.ru.po 19 Oct 2015 15:47:17 -0000 1.32
+++ po/proprietary-insecurity.ru.po 19 Oct 2015 15:58:14 -0000 1.33
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-19 13:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -68,9 +67,9 @@
"privileges."
msgstr ""
"Ð Mac OS X <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\"> в ÑеÑение
4 Ð»ÐµÑ Ð¿ÑеднамеÑенно "
-"ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>, коÑоÑÑм
взломÑики могли воÑполÑзоваÑÑÑÑ, ÑÑобÑ
полÑÑиÑÑ "
-"пÑава админиÑÑÑаÑоÑа."
+"backdoor-api-to-root-privileges-in-apple-os-x/\"> в ÑеÑение
4 Ð»ÐµÑ "
+"пÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>,
коÑоÑÑм взломÑики могли "
+"воÑполÑзоваÑÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ Ð¿Ñава
админиÑÑÑаÑоÑа."
#. type: Content of: <ul><li><p>
msgid ""