[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy surveillance-vs-democracy.uk.htm...
From: |
GNUN |
Subject: |
www/philosophy surveillance-vs-democracy.uk.htm... |
Date: |
Mon, 24 Oct 2016 08:58:32 +0000 (UTC) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 16/10/24 08:58:32
Modified files:
philosophy : surveillance-vs-democracy.uk.html
philosophy/po : surveillance-vs-democracy.uk-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.uk.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk-diff.html?cvsroot=www&r1=1.1&r2=1.2
Patches:
Index: surveillance-vs-democracy.uk.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.uk.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- surveillance-vs-democracy.uk.html 9 Jul 2016 07:31:25 -0000 1.16
+++ surveillance-vs-democracy.uk.html 24 Oct 2016 08:58:31 -0000 1.17
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE"
value="/philosophy/surveillance-vs-democracy.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/surveillance-vs-democracy.uk.po">
+ https://www.gnu.org/philosophy/po/surveillance-vs-democracy.uk.po</a>'
+ --><!--#set var="ORIGINAL_FILE"
value="/philosophy/surveillance-vs-democracy.html"
+ --><!--#set var="DIFF_FILE"
value="/philosophy/po/surveillance-vs-democracy.uk-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-08-25" --><!--#set
var="ENGLISH_PAGE" value="/philosophy/surveillance-vs-democracy.en.html" -->
<!--#include virtual="/server/header.uk.html" -->
<!-- Parent-Version: 1.77 -->
@@ -9,6 +14,7 @@
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.uk.html" -->
+<!--#include virtual="/server/outdated.uk.html" -->
<h2>СкÑлÑки ÑÑÐµÐ¶ÐµÐ½Ñ Ð¼Ð¾Ð¶Ðµ виÑÑимаÑи
демокÑаÑÑÑ?</h2>
<p><a href="http://www.stallman.org/">Ð ÑÑаÑд СÑолмен</a></p>
@@ -551,7 +557,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðновлено:
-$Date: 2016/07/09 07:31:25 $
+$Date: 2016/10/24 08:58:31 $
<!-- timestamp end -->
</p>
Index: po/surveillance-vs-democracy.uk-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/surveillance-vs-democracy.uk-diff.html 1 Jul 2016 12:29:26 -0000
1.1
+++ po/surveillance-vs-democracy.uk-diff.html 24 Oct 2016 08:58:32 -0000
1.2
@@ -14,6 +14,7 @@
<!-- Parent-Version: 1.77 -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
+<span class="inserted"><ins><em><!-- GNUN: localize URL
/graphics/dog.small.jpg --></em></ins></span>
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist"
-->
<!--#include virtual="/server/banner.html" -->
<h2>How Much Surveillance Can Democracy Withstand?</h2>
@@ -25,6 +26,12 @@
<blockquote><p>A version of this article was first published in
Wired
in October 2013.</p></blockquote>
+<span class="inserted"><ins><em><div class="pict medium">
+<a href="/graphics/dog.html">
+<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the
three ads that popped up on his computer screen..." /></a>
+<p>“How did they find out I'm a dog?”</p>
+</div></em></ins></span>
+
<p>Thanks to Edward Snowden's disclosures, we know that the current
level of general surveillance in society is incompatible with human
rights. The repeated harassment and prosecution of dissidents,
@@ -49,7 +56,7 @@
I've advocated for 30 years</a>, is the first step in taking control
of our digital lives, and that includes preventing surveillance. We
can't trust nonfree software; the NSA
-<a
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">uses</a>
+<a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">uses</a></strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a></em></ins></span>
and
even <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
security weaknesses in nonfree software to invade our own computers
@@ -83,7 +90,7 @@
phone call records are subpoenaed</a> to find this out, but Snowden
has shown us that in effect they subpoena all the phone call records
of everyone in the U.S., all the
-time, <a
href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from
+time, <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20131226044537/http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from</em></ins></span>
Verizon</a>
and <a
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
other companies too</a>.</p>
@@ -118,7 +125,7 @@
“LOVEINT.” The NSA says it has caught and punished this a
few times; we don't know how many other times it wasn't caught. But
these events shouldn't surprise us, because police have
-long <a href="http://www.sweetliberty.org/issues/privacy/lein1.htm">used
+long <a <span
class="removed"><del><strong>href="http://www.sweetliberty.org/issues/privacy/lein1.htm">used</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I">used</em></ins></span>
their access to driver's license records to track down someone
attractive</a>, a practice known as “running a plate for a
date.” This practice has expanded with <a
href="https://theyarewatching.org/issues/risks-increase-once-data-shared">new
digital systems</a>.
@@ -258,13 +265,11 @@
who they talk with.</p>
<p>Internet-connected cameras often have lousy digital security
-themselves,
-<span class="removed"><del><strong>so</strong></del></span> <span
class="inserted"><ins><em>which
-means</em></ins></span> <a
href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">anyone
-<span class="removed"><del><strong>could</strong></del></span>
-<span class="inserted"><ins><em>can</em></ins></span> watch what <span
class="removed"><del><strong>the camera sees</a>. To restore
privacy,</strong></del></span> <span class="inserted"><ins><em>those cameras
see</a>. This makes internet-connected
+themselves, which
+means <a
href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">anyone
+can watch what those cameras see</a>. This makes internet-connected
cameras a major threat to security as well as privacy. For privacy's
-sake,</em></ins></span> we should ban the use of Internet-connected cameras
aimed where
+sake, we should ban the use of Internet-connected cameras aimed where
and when the public is admitted, except when carried by people.
Everyone must be free to post photos and video recordings
occasionally, but the systematic accumulation of such data on the
@@ -322,8 +327,10 @@
is not anonymous</a>, though there are efforts to develop ways to pay
anonymously with Bitcoin. However, technology
for <a
href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
-cash was first developed in the 1980s</a>; we need only suitable
-business arrangements, and for the state not to obstruct them.</p>
+cash was first developed in the 1980s</a>; <span
class="inserted"><ins><em>the GNU software for doing
+this is called <a href="http://taler.net/">GNU Taler</a>.
Now</em></ins></span> we need
+only suitable business arrangements, and for the state not to obstruct
+them.</p>
<p>A further threat from sites' collection of personal data is that
security breakers might get in, take it, and misuse it. This includes
@@ -468,16 +475,16 @@
<p>Digital technology has brought about a tremendous increase in the
level of surveillance of our movements, actions, and communications.
-It is far more than we experienced in the 1990s, and <a <span
class="removed"><del><strong>href="http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html">far</strong></del></span>
-<span
class="inserted"><ins><em>href="https://hbr.org/2013/06/your-iphone-works-for-the-secret-police">far</em></ins></span>
+It is far more than we experienced in the 1990s, and <a
+href="https://hbr.org/2013/06/your-iphone-works-for-the-secret-police">far
more than people behind the Iron Curtain experienced</a> in the 1980s,
and proposed legal limits on state use of the accumulated data would
not alter that.</p>
<p>Companies are designing even more intrusive surveillance. Some
project that pervasive surveillance, hooked to companies such as
-Facebook, could have deep effects on <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/10/internet-of-things-predictable-people">how</strong></del></span>
-<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2015/aug/10/internet-of-things-predictable-people">how</em></ins></span>
+Facebook, could have deep effects on <a
+href="https://www.theguardian.com/technology/2015/aug/10/internet-of-things-predictable-people">how
people think</a>. Such possibilities are imponderable; but the threat
to democracy is not speculation. It exists and is visible today.</p>
@@ -543,7 +550,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/07/01 12:29:26 $
+$Date: 2016/10/24 08:58:32 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy surveillance-vs-democracy.uk.htm...,
GNUN <=