www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www planetfeeds.it.html philosophy/can-you-trus...


From: GNUN
Subject: www planetfeeds.it.html philosophy/can-you-trus...
Date: Sat, 12 Dec 2015 23:28:36 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     15/12/12 23:28:35

Modified files:
        .              : planetfeeds.it.html 
        philosophy     : can-you-trust.it.html 
        philosophy/po  : can-you-trust.it-en.html can-you-trust.it.po 
        po             : planetfeeds.it.po 
        proprietary    : malware-apple.it.html malware-mobiles.it.html 
        proprietary/po : malware-apple.it-en.html malware-apple.it.po 
                         malware-mobiles.it-en.html 
                         malware-mobiles.it.po 
                         proprietary-back-doors.it.po 
        server         : body-include-2.it.html 
        server/gnun/compendia: compendium.it.po 
        server/po      : body-include-2.it.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/planetfeeds.it.html?cvsroot=www&r1=1.437&r2=1.438
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/can-you-trust.it.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.it-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.it.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/po/planetfeeds.it.po?cvsroot=www&r1=1.613&r2=1.614
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.it.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.it.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/server/body-include-2.it.html?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/server/gnun/compendia/compendium.it.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/body-include-2.it.po?cvsroot=www&r1=1.110&r2=1.111

Patches:
Index: planetfeeds.it.html
===================================================================
RCS file: /web/www/www/planetfeeds.it.html,v
retrieving revision 1.437
retrieving revision 1.438
diff -u -b -r1.437 -r1.438
--- planetfeeds.it.html 10 Dec 2015 05:58:21 -0000      1.437
+++ planetfeeds.it.html 12 Dec 2015 23:28:33 -0000      1.438
@@ -1,16 +1,13 @@
 
 <!-- Autogenerated by planetrss.pl 1.13 -->
 <p><a href='http://dustycloud.org/blog/code-of-copylefts/'>
-Parallels Between Code of Conducts and Copyleft (and their objectors)</a>: 
Here's a strawman I'm sure you've seen before: Why all this extra process?
-Shouldn't we trust people to do the right thin...
+I codici di condotta e il Copyleft</a> 
 <a href='http://dustycloud.org/blog/code-of-copylefts/'>&nbsp;<em>leggi 
tutto...</em></a></p>
 <p><a
 
href='http://www.fsf.org/events/flyering-20151216-somerville-ethical-tech-giving-guide'>
-Flyering - Ethical-tech advocacy and socializing (Somerville, MA)</a>: We've 
put together a gorgeous 2015 Giving Guide to encourage people to
-shop ethically for tech gifts, just as they might for...
+Volantinaggio a Somerville, MA, USA</a> 
 <a
 
href='http://www.fsf.org/events/flyering-20151216-somerville-ethical-tech-giving-guide'>&nbsp;<em>leggi
 tutto...</em></a></p>
 <p><a href='http://www.fsf.org/blogs/licensing/send-comments-to-doe-12-15'>
-By 12/15: Send us comments to rally the Dept. of Ed. toward free 
licensing</a>: These proposed regulations are meant to facilitate public reuse 
of works
-funded by Department of Education grants. C...
+Inviateci commenti entro il 15/12 per il Ministero dell'Istruzioen USA</a> 
 <a 
href='http://www.fsf.org/blogs/licensing/send-comments-to-doe-12-15'>&nbsp;<em>leggi
 tutto...</em></a></p>

Index: philosophy/can-you-trust.it.html
===================================================================
RCS file: /web/www/www/philosophy/can-you-trust.it.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- philosophy/can-you-trust.it.html    28 Feb 2015 09:27:09 -0000      1.29
+++ philosophy/can-you-trust.it.html    12 Dec 2015 23:28:33 -0000      1.30
@@ -168,15 +168,17 @@
 <h3>Appendici</h3>
 
 <ol>
-<li>Il termine &ldquo;informatica fidata&rdquo; si utilizza nel campo della
+<li><p>
+Il termine &ldquo;informatica fidata&rdquo; si utilizza nel campo della
 sicurezza informatica con un significato diverso; bisogna fare attenzione a
-non confondere i due significati.
-</li>
-<li>Il progetto GNU distribuisce GNU Privacy Guard,  un programma per
+non confondere i due significati.</p></li>
+
+<li><p>
+Il progetto GNU distribuisce GNU Privacy Guard,  un programma per
 l'implementazione di firme digitali e cifratura a chiave pubblica, che può
 essere usato per inviare email sicure e private. È utile esplorare il modo
 in cui GPG differisce dall'informatica infida, e vedere cosa rende
-vantaggioso uno e pericolosa l'altra.
+vantaggioso uno e pericolosa l'altra.</p>
 <p>
 Quando si usa GPG per l'invio di un documento cifrato, e se si usa GPG per
 decodificarlo, il risultato è un documento non cifrato che è possibile
@@ -189,10 +191,10 @@
 progettata per imporre delle restrizioni sugli utenti; è <em>essa</em> ad
 usare <em>gli utenti</em>.</p></li>
 
-<li>
+<li><p>
 I sostenitori dell'informatica infida focalizzano i loro discorsi nei <a
 name="beneficial">benefici</a> di questa tecnologia.  Ciò che dicono è
-spesso vero, ma non è importante.
+spesso vero, ma non è importante.</p>
 <p>
 Come buona parte dell'hardware, l'hardware utilizzato per l'informatica
 infida può essere usato anche per scopi non dannosi, ma a questi fini si
@@ -206,12 +208,13 @@
 tempo dei piccoli benefici per distrarci e non farci capire quel che
 perderemmo.</p></li>
 
-<li>Microsoft presenta Palladium come una misura di sicurezza ed afferma che
+<li><p>
+Microsoft presenta Palladium come una misura di sicurezza ed afferma che
 proteggerà gli utenti dai virus, ma tale affermazione è evidentemente
 falsa. Una presentazione tenuta da Microsoft Research nell'Ottobre 2002, ha
 affermato che una delle specifiche di Palladium è che i sistemi operativi e
 le applicazioni esistenti continueranno a funzionare; quindi i virus
-continueranno a poter fare tutte le cose che possono fare oggi.
+continueranno a poter fare tutte le cose che possono fare oggi.</p>
 <p>
 Quando Microsoft parla di &ldquo;sicurezza&rdquo; riferendosi a Palladium,
 non utilizza il termine per il significato che esso normalmente ha: il
@@ -237,7 +240,8 @@
 vi stava raggirando, ma significava che voi stavate raggirando Palladium. E
 così via.  </p></li>
 
-<li>Una affermazione precedente degli sviluppatori di Palladium stabiliva la
+<li><p>
+Una affermazione precedente degli sviluppatori di Palladium stabiliva la
 premessa di base che chiunque avesse sviluppato o raccolto delle
 informazioni avrebbe dovuto avere il controllo totale su come l'utente le
 avrebbe potute utilizzare.  Questo potrebbe rappresentare una svolta
@@ -245,7 +249,7 @@
 creazione di un sistema di controllo senza precedenti.  I problemi
 particolari che derivano da questo sistema non sono casuali: essi sono il
 risultato del fine per il quale il sistema è stato progettato.  E' questo
-fine che deve essere rifiutato. </li>
+fine che deve essere rifiutato. </p></li>
 </ol>
 
 <hr />
@@ -330,9 +334,8 @@
 <p>Copyright &copy; 2002, 2007, 2014, 2015 Richard Stallman</p>
   
 <p>Questa pagina è distribuita secondo i termini della licenza <a 
rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.it";>Creative
-Commons Attribuzione - Non opere derivate 3.0 Stati Uniti</a> (CC BY-ND
-3.0).</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
+Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0).</p>
 
 <!--#include virtual="/server/bottom-notes.it.html" -->
 <div class="translators-credits">
@@ -345,7 +348,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/02/28 09:27:09 $
+$Date: 2015/12/12 23:28:33 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/can-you-trust.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/can-you-trust.it-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- philosophy/po/can-you-trust.it-en.html      28 Feb 2015 09:27:09 -0000      
1.19
+++ philosophy/po/can-you-trust.it-en.html      12 Dec 2015 23:28:33 -0000      
1.20
@@ -152,15 +152,17 @@
 <h3>Postscripts</h3>
 
 <ol>
-<li>The computer security field uses the term &ldquo;trusted
+<li><p>
+The computer security field uses the term &ldquo;trusted
 computing&rdquo; in a different way&mdash;beware of confusion
-between the two meanings.
-</li>
-<li>The GNU Project distributes the GNU Privacy Guard, a program that
+between the two meanings.</p></li>
+
+<li><p>
+The GNU Project distributes the GNU Privacy Guard, a program that
 implements public-key encryption and digital signatures, which you can
 use to send secure and private email.  It is useful to explore how GPG
 differs from treacherous computing, and see what makes one helpful and
-the other so dangerous.
+the other so dangerous.</p>
 <p>
 When someone uses GPG to send you an encrypted document, and you use
 GPG to decode it, the result is an unencrypted document that you can
@@ -172,10 +174,10 @@
 Treacherous computing is designed to impose restrictions on the users;
 <em>it</em> uses <em>them</em>.</p></li>
 
-<li>
+<li><p>
 The supporters of treacherous computing focus their discourse on its
 <a name="beneficial">beneficial uses</a>.  What they say is often
-correct, just not important.
+correct, just not important.</p>
 <p>
 Like most hardware, treacherous-computing hardware can be used for
 purposes which are not harmful.  But these features can be implemented in
@@ -188,12 +190,13 @@
 freedom, while offering minor benefits to distract us from what we
 would lose.</p></li>
 
-<li>Microsoft presents Palladium as a security measure, and claims that
+<li><p>
+Microsoft presents Palladium as a security measure, and claims that
 it will protect against viruses, but this claim is evidently false.  A
 presentation by Microsoft Research in October 2002 stated that one of
 the specifications of Palladium is that existing operating systems and
 applications will continue to run; therefore, viruses will continue to
-be able to do all the things that they can do today.
+be able to do all the things that they can do today.</p>
 <p>
 When Microsoft employees speak of &ldquo;security&rdquo; in connection with
 Palladium, they do not mean what we normally mean by that word:
@@ -216,13 +219,14 @@
 do.  &ldquo;Spoofing&rdquo; doesn't mean someone's fooling you, it means
 your fooling Palladium.  And so on.</p></li>
 
-<li>A previous statement by the Palladium developers stated the basic
+<li><p>
+A previous statement by the Palladium developers stated the basic
 premise that whoever developed or collected information should have
 total control of how you use it.  This would represent a revolutionary
 overturn of past ideas of ethics and of the legal system, and create
 an unprecedented system of control.  The specific problems of these
 systems are no accident; they result from the basic goal.  It is the
-goal we must reject.</li>
+goal we must reject.</p></li>
 </ol>
 
 <hr />
@@ -296,14 +300,14 @@
 <p>Copyright &copy; 2002, 2007, 2014, 2015 Richard Stallman</p>
   
 <p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/02/28 09:27:09 $
+$Date: 2015/12/12 23:28:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/can-you-trust.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/can-you-trust.it.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- philosophy/po/can-you-trust.it.po   12 Dec 2015 22:59:17 -0000      1.21
+++ philosophy/po/can-you-trust.it.po   12 Dec 2015 23:28:34 -0000      1.22
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-12-11 10:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -634,12 +633,7 @@
 msgid "Copyright &copy; 2002, 2007, 2014, 2015 Richard Stallman"
 msgstr "Copyright &copy; 2002, 2007, 2014, 2015 Richard Stallman"
 
-# || No change detected.  The change might only be in amounts of spaces.
 #. type: Content of: <div><p>
-#| msgid ""
-#| "This page is licensed under a <a rel=\"license\" href=\"http://";
-#| "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
-#| "NoDerivatives 4.0 International License</a>."
 msgid ""
 "This page is licensed under a <a rel=\"license\" href=\"http://";
 "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"

Index: po/planetfeeds.it.po
===================================================================
RCS file: /web/www/www/po/planetfeeds.it.po,v
retrieving revision 1.613
retrieving revision 1.614
diff -u -b -r1.613 -r1.614
--- po/planetfeeds.it.po        12 Dec 2015 22:59:18 -0000      1.613
+++ po/planetfeeds.it.po        12 Dec 2015 23:28:34 -0000      1.614
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-12-07 05:56+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <p><a>
@@ -59,10 +58,7 @@
 "shop ethically for tech gifts, just as they might for..."
 msgstr " "
 
-# | <a [-href='http://www.fsf.org/blogs/rms/rms-20151017-kent'>-]
-# | {+href='http://www.fsf.org/blogs/licensing/send-comments-to-doe-12-15'>+}
 #. type: Content of: <p><a>
-#| msgid "<a href='http://www.fsf.org/blogs/rms/rms-20151017-kent'>"
 msgid ""
 "<a href='http://www.fsf.org/blogs/licensing/send-comments-to-doe-12-15'>"
 msgstr ""

Index: proprietary/malware-apple.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.it.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/malware-apple.it.html   24 Oct 2015 21:59:00 -0000      1.8
+++ proprietary/malware-apple.it.html   12 Dec 2015 23:28:34 -0000      1.9
@@ -52,6 +52,7 @@
 
 <!--<li>
 <a href="#insecurity">Insecurity</a></li>-->
+<li><a href="#pressuring">Pressioni</a></li>
 <li><a href="#sabotage">Sabotaggio</a></li>
 
 <!--<li>
@@ -123,6 +124,21 @@
 </p></li>
 </ul>
 
+<h3 id="pressuring">Pressioni di Apple</h3>
+
+<p>Le aziende di software proprietario si approfittano dei loro clienti
+imponendo restrizioni arbitrarie all'uso che si può fare del
+software. Questa sezione mostre esempi di aggressività e altre tattiche
+commerciali discutibili da parte di Apple.</p>
+
+<ul>
+  <li><p>Apple Siri <a
+href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>non
+vi darà informazioni</a> sulle classifiche musicali se non siete iscritti ad
+Apple Music.</p>
+  </li>
+</ul>
+
 <h3 id="sabotage">Sabotaggio di Apple</h3>
 
 <p>I problemi mostrati in questa sezione non sono precisamente malware, perché
@@ -387,7 +403,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/10/24 21:59:00 $
+$Date: 2015/12/12 23:28:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-mobiles.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.it.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/malware-mobiles.it.html 29 Jun 2015 08:28:52 -0000      1.3
+++ proprietary/malware-mobiles.it.html 12 Dec 2015 23:28:34 -0000      1.4
@@ -135,6 +135,23 @@
 
 <h3 id="surveillance">Sorveglianza in dispositivi mobili</h3>
 <ul>
+  <li><p>Sono state trovate attività di &ldquo;comunicazione non 
chiara&rdquo;, non
+collegata all'attività dell'applicazione, <a
+href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119";>
+nelle 500 applicazioni gratuite per Android più diffuse</a>.</p>
+
+  <p>L'articolo è in inglese e usa &ldquo;free&rdquo; nel senso di
+&ldquo;gratuito&rdquo;; dato che &ldquo;free&rdquo; significa anche
+&ldquo;libero&rdquo;, in inglese preferiamo che si usi &ldquo;gratis&rdquo;
+in questi casi.</p>
+
+  <p>L'articolo dà per scontato che gli strumenti di analisi comuni siano
+legittimi, ma questo è vero? Gli sviluppatori di software non hanno il
+diritto di analizzare quello che gli utenti fanno o come lo fanno. Gli
+strumenti di "statistica" che spiano sono sbagliati come qualsiasi altro
+sistema di spionaggio.</p>
+  </li>
+
   <li><p>Molte applicazioni proprietarie per dispositivi mobili comunicano agli
 autori la lista delle altre applicazioni installate dall'utente. <a
 href="http://techcrunch.com/2014/11/26/twitter-app-graph/";>Twitter lo sta
@@ -279,7 +296,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/06/29 08:28:52 $
+$Date: 2015/12/12 23:28:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-apple.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/malware-apple.it-en.html     24 Oct 2015 21:59:03 -0000      
1.8
+++ proprietary/po/malware-apple.it-en.html     12 Dec 2015 23:28:34 -0000      
1.9
@@ -44,6 +44,7 @@
 <li><a href="#back-doors">Back doors</a></li>
 <li><a href="#censorship">Censorship</a></li>
 <!--<li><a href="#insecurity">Insecurity</a></li>-->
+<li><a href="#pressuring">Pressuring</a></li>
 <li><a href="#sabotage">Sabotage</a></li>
 <!--<li><a href="#interference">Interference</a></li>-->
 <li><a href="#surveillance">Surveillance</a></li>
@@ -109,6 +110,17 @@
 </p></li>
 </ul>
 
+<h3 id="pressuring">Apple Pressuring</h3>
+
+<p>Proprietary companies can take advantage of their customers by imposing 
arbitrary limits to their use of the software.  This section reports examples 
of hard sell and other unjust commercial tactics by Apple.</p>
+
+<ul>
+  <li><p>Apple Siri
+      <a 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>refuses
 to give you information</a>
+      about music charts if you're not an Apple Music subscriber.</p>
+  </li>
+</ul>
+
 <h3 id="sabotage">Apple Sabotage</h3>
 
 <p>The wrongs in this section are not precisely malware, since they do
@@ -342,7 +354,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/24 21:59:03 $
+$Date: 2015/12/12 23:28:34 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/malware-apple.it.po  12 Dec 2015 22:59:18 -0000      1.29
+++ proprietary/po/malware-apple.it.po  12 Dec 2015 23:28:34 -0000      1.30
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-11-30 17:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -84,10 +83,7 @@
 msgid "<a href=\"#censorship\">Censorship</a>"
 msgstr "<a href=\"#censorship\">Censura</a>"
 
-# | <a [-href=\"#censorship\">Censorship</a>-]
-# | {+href=\"#pressuring\">Pressuring</a>+}
 #. type: Content of: <div><div><ul><li>
-#| msgid "<a href=\"#censorship\">Censorship</a>"
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\">Pressioni</a>"
 
@@ -220,9 +216,7 @@
 "technology/2011/dec/01/siri-abortion-apple-unintenional-omissions\"> anche "
 "in altri dispositivi Apple</a>."
 
-# | Apple [-Censorship-] {+Pressuring+}
 #. type: Content of: <h3>
-#| msgid "Apple Censorship"
 msgid "Apple Pressuring"
 msgstr "Pressioni di Apple"
 
@@ -237,19 +231,7 @@
 "Questa sezione mostre esempi di aggressività e altre tattiche commerciali "
 "discutibili da parte di Apple."
 
-# | Apple {+Siri+} <a
-# | 
[-href=\"http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs\";>
-# | deleted from iPods the-]
-# | 
{+href=\"http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions\";>refuses
-# | to give you information</a> about+} music [-that users had got from
-# | internet music stores that competed with iTunes</a>.-] {+charts if you're
-# | not an Apple Music subscriber.+}
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Apple <a href=\"http://www.theguardian.com/technology/2014/dec/04/apple-";
-#| "deleted-music-ipods-rivals-steve-jobs\"> deleted from iPods the music "
-#| "that users had got from internet music stores that competed with iTunes</"
-#| "a>."
+#. type: Content of: <ul><li><p>
 msgid ""
 "Apple Siri <a href=\"http://www.theguardian.com/technology/2015/oct/27/apple-";
 "music-subscribers-siri-questions\">refuses to give you information</a> about "

Index: proprietary/po/malware-mobiles.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/malware-mobiles.it-en.html   29 Jun 2015 08:28:53 -0000      
1.3
+++ proprietary/po/malware-mobiles.it-en.html   12 Dec 2015 23:28:34 -0000      
1.4
@@ -119,6 +119,20 @@
 
 <h3 id="surveillance">Mobile Surveillance</h3>
 <ul>
+  <li><p>&ldquo;Cryptic communication,&rdquo; unrelated to the app's 
functionality,
+  was <a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119";>
+  found in the 500 most popular gratis Android apps</a>.</p>
+
+  <p>The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;</p>
+
+  <p>The article takes for granted that the usual analytics tools are
+  legitimate, but is that valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.</p>
+  </li>
+
   <li><p>Many proprietary apps for mobile devices report which other
   apps the user has
   installed.  <a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/";>Twitter
@@ -240,7 +254,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/06/29 08:28:53 $
+$Date: 2015/12/12 23:28:34 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/malware-mobiles.it.po        12 Dec 2015 22:59:19 -0000      
1.7
+++ proprietary/po/malware-mobiles.it.po        12 Dec 2015 23:28:35 -0000      
1.8
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-11-24 14:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/proprietary-back-doors.it.po 12 Dec 2015 22:59:19 -0000      
1.26
+++ proprietary/po/proprietary-back-doors.it.po 12 Dec 2015 23:28:35 -0000      
1.27
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-12-07 16:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -54,10 +53,7 @@
 "che dice se &ldquo;aggiornare&rdquo; a Windows 10 anche quando gli utenti lo "
 "hanno disattivato."
 
-# | [-This seems to involve use-]{+This, by the way, reaffirms the presence+}
-# | of a {+universal+} back door in Windows 7 and 8.
 #. type: Content of: <ul><li><p>
-#| msgid "This seems to involve use of a back door in Windows 7 and 8."
 msgid ""
 "This, by the way, reaffirms the presence of a universal back door in Windows "
 "7 and 8."
@@ -408,19 +404,7 @@
 "Ecco un sospetto che non possiamo provare, ma che vale la pena prendere in "
 "considerazione."
 
-# | <a
-# | 
[-href=\"http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI\";>-]
-# | 
{+href=\"http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI\";>+}
-# | Writable microcode for Intel and AMD microprocessors</a> may be a vehicle
-# | for the NSA to invade computers, with the help of Microsoft, say respected
-# | security experts.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://www.afr.com/p/technology/";
-#| "intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI\"> Writable "
-#| "microcode for Intel and AMD microprocessors</a> may be a vehicle for the "
-#| "NSA to invade computers, with the help of Microsoft, say respected "
-#| "security experts."
+#. type: Content of: <ul><li><p>
 msgid ""
 "<a href=\"http://web.archive.org/web/20150206003913/http://www.afr.com/p/";
 "technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI\"> "

Index: server/body-include-2.it.html
===================================================================
RCS file: /web/www/www/server/body-include-2.it.html,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- server/body-include-2.it.html       12 Dec 2015 07:50:52 -0000      1.93
+++ server/body-include-2.it.html       12 Dec 2015 23:28:35 -0000      1.94
@@ -2,21 +2,21 @@
 <!-- start of server/body-include-2 -->
 <div class="fundraiser">
 <div class="donate_btn">
-<p><a href="https://donate.fsf.org";>Donate Now</a></p>
+<p><a href="https://donate.fsf.org";>Dona ora</a></p>
 </div>
 
-<p><strong>For thirty years, the Free Software Foundation has been seen as a
-guiding light for the free software movement, fighting for user
-freedom.</strong></p>
+<p><strong>Da trent'anni la Free Software Foundation è ritenuta una guida
+autorevole per il movimento del software libero e si batte per la libertà
+degli utenti.</strong></p>
 
-<p><a href="//www.fsf.org/appeal/">Help keep our light burning brightly</a> by
-donating to push us towards our goal of raising $450,000 by <i>January
-31st</i>.</p>
+<p><a href="//www.fsf.org/appeal/">Aiutateci a continuare il nostro lavoro</a>
+facendo una donazione che ci avvicini all'obiettivo dei 450.000$ entro il
+<i>31 gennaio</i>.</p>
 
-<div class="crm-amount-bar"><div class="crm-amount-high">$450k</div>
+<div class="crm-amount-bar"><div class="crm-amount-high">450mila $</div>
 <div class="crm-amount-fill"><div
 class="crm-amount-low"><!--#echo var="amount" -->
-k so far</div></div>
+mila finora</div></div>
 </div>
 <!-- /crm-amount-bar -->
 </div>

Index: server/gnun/compendia/compendium.it.po
===================================================================
RCS file: /web/www/www/server/gnun/compendia/compendium.it.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86

Index: server/po/body-include-2.it.po
===================================================================
RCS file: /web/www/www/server/po/body-include-2.it.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- server/po/body-include-2.it.po      12 Dec 2015 22:59:18 -0000      1.110
+++ server/po/body-include-2.it.po      12 Dec 2015 23:28:35 -0000      1.111
@@ -14,13 +14,9 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-12-12 07:42+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
-# | <a [-class=\"btn\" href=\"https://donate.fsf.org\";>Count me in</a>-]
-# | {+href=\"https://donate.fsf.org\";>Donate Now</a>+}
 #. type: Content of: <div><div><p>
-#| msgid "<a class=\"btn\" href=\"https://donate.fsf.org\";>Count me in</a>"
 msgid "<a href=\"https://donate.fsf.org\";>Donate Now</a>"
 msgstr "<a href=\"https://donate.fsf.org\";>Dona ora</a>"
 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]