[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy right-to-read.de.html right-to-r...
From: |
GNUN |
Subject: |
www/philosophy right-to-read.de.html right-to-r... |
Date: |
Sun, 6 Nov 2016 21:28:17 +0000 (UTC) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 16/11/06 21:28:16
Modified files:
philosophy : right-to-read.de.html right-to-read.es.html
right-to-read.fr.html right-to-read.it.html
right-to-read.ja.html right-to-read.ru.html
right-to-read.uk.html
surveillance-vs-democracy.es.html
surveillance-vs-democracy.fr.html
surveillance-vs-democracy.it.html
surveillance-vs-democracy.ja.html
surveillance-vs-democracy.ru.html
surveillance-vs-democracy.sq.html
surveillance-vs-democracy.uk.html
philosophy/po : right-to-read.ar.po right-to-read.bg.po
right-to-read.ca.po right-to-read.cs-diff.html
right-to-read.cs.po right-to-read.de-en.html
right-to-read.de.po right-to-read.el-diff.html
right-to-read.el.po right-to-read.es-en.html
right-to-read.es.po right-to-read.fa.po
right-to-read.fr-en.html right-to-read.fr.po
right-to-read.it-en.html right-to-read.it.po
right-to-read.ja-en.html right-to-read.ja.po
right-to-read.ko-diff.html right-to-read.ko.po
right-to-read.lt-diff.html right-to-read.lt.po
right-to-read.nl-diff.html right-to-read.nl.po
right-to-read.pl-diff.html right-to-read.pl.po
right-to-read.pot right-to-read.pt-br-diff.html
right-to-read.pt-br.po right-to-read.ru-en.html
right-to-read.ru.po right-to-read.sr.po
right-to-read.sv.po right-to-read.tr.po
right-to-read.uk-diff.html right-to-read.uk.po
surveillance-vs-democracy.es-en.html
surveillance-vs-democracy.es.po
surveillance-vs-democracy.fr-en.html
surveillance-vs-democracy.fr.po
surveillance-vs-democracy.it-en.html
surveillance-vs-democracy.it.po
surveillance-vs-democracy.ja-en.html
surveillance-vs-democracy.ja.po
surveillance-vs-democracy.lt-diff.html
surveillance-vs-democracy.lt.po
surveillance-vs-democracy.nl-diff.html
surveillance-vs-democracy.nl.po
surveillance-vs-democracy.pot
surveillance-vs-democracy.pt-br.po
surveillance-vs-democracy.ru-en.html
surveillance-vs-democracy.ru.po
surveillance-vs-democracy.sq-en.html
surveillance-vs-democracy.sq.po
surveillance-vs-democracy.uk-diff.html
surveillance-vs-democracy.uk.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.de.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.es.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.fr.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.it.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.ja.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.ru.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.uk.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.es.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.fr.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.it.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ja.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ru.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.sq.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.uk.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ar.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.bg.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ca.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.cs-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.cs.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.de-en.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.de.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.el-diff.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.el.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.es-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.es.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.fa.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.fr-en.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.fr.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.it-en.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.it.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ja-en.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ja.po?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ko-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ko.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.lt-diff.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.lt.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.nl-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.nl.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.pl-diff.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.pl.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.pt-br-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.pt-br.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ru-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ru.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.sr.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.sv.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.tr.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.uk-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.uk.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.es-en.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.es.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.fr-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.fr.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ja-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ja.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.lt-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.lt.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.nl-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.nl.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.pot?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.pt-br.po?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru-en.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.sq-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.sq.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk-diff.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk.po?cvsroot=www&r1=1.46&r2=1.47
Patches:
Index: right-to-read.de.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.de.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- right-to-read.de.html 28 Oct 2016 11:58:13 -0000 1.68
+++ right-to-read.de.html 6 Nov 2016 21:28:14 -0000 1.69
@@ -6,31 +6,62 @@
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Das Recht zu lesen - GNU-Projekt - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns >
+ p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
-->
</style>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.de.html" -->
-<h2>Das Recht zu lesen</h2>
+<h2 class="center">Das Recht zu lesen</h2>
-<p>
+<p class="byline center">
von <strong><a href="//www.stallman.org/">Richard Stallman</a></strong></p>
-
-<p>
+<p class="center">
Die englische Originalausgabe erschien unter dem Titel <cite xml:lang="en"
lang="en">The Right to Read</cite> in <span xml:lang="en"
lang="en">Communications of the ACM</span>, New York, Jg. 40, 1997, 2.</p>
-<hr />
+<hr class="thin" />
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
Aus: <cite>Der Weg nach Tycho</cite>, einer Sammlung von Artikeln
über die
Vorgeschichte der Lunarischen Revolution, veröffentlicht 2096 in Luna City.
</p></blockquote>
+<div class="columns">
<p>
Für Dan Halbert begann der Weg nach Tycho an der
Hochschule ‑ als Lissa Lenz darum bat, ihr seinen Rechner zu
@@ -73,7 +104,10 @@
konnte er hoffen, dass seine eigenen Forschungsarbeiten, wenn häufig darauf
Bezug genommen wird, genug einbringen würden, diese Darlehen
zurückzuzahlen.]</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Später würde Dan erfahren, dass es eine Zeit gab, als jeder in die
Bibliothek gehen und Zeitschriftenartikel lesen konnte, und sogar
@@ -123,7 +157,10 @@
Root-Passwort seines Rechners zu kennen nicht installieren. Und weder die
US-Bundespolizei <span xml:lang="en" lang="en">FBI</span> noch der <span
xml:lang="en" lang="en">Microsoft Support</span> würden es aushändigen.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Dan beschloÃ, dass er Lissa nicht einfach seinen Rechner leihen konnte. Doch
er konnte nicht ablehnen ihr zu helfen, da er sie liebte. Jede Gelegenheit
@@ -162,7 +199,10 @@
nutzen. Vorher hatten Hochschulen einen anderen Ansatz zur Disziplinierung
von Studenten; sie haben Tätigkeiten bestraft, die schädlich waren, nicht
solche, die lediglich Verdacht erregten.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Lissa meldete Dan nicht bei der SPA. Seine Entscheidung, ihr zu helfen,
führte zu ihrer Ehe und auch zur Infragestellung dessen, was ihnen als
@@ -173,6 +213,7 @@
Luna, wo sie andere gefunden haben, die sich ebenfalls dem langen Arm der
SPA entzogen hatten. Als 2062 der Aufstand von Tycho begann, wurde das
allgemeine Recht zu lesen schnell eines seiner zentralen Ziele.</p>
+</div>
<div class="announcement">
<blockquote>
@@ -184,8 +225,10 @@
<div id="AuthorsNote">
<h3>Anmerkungen<!-- des Autors --></h3>
-<ul>
-<li>Diese Geschichte ist vermeintlich ein historischer Artikel, der von jemand
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>Diese Geschichte ist vermeintlich ein historischer Artikel, der von jemand
anderem in der Zukunft geschrieben werden wird, Dan Halberts Jugend unter
einer repressiven durch ungerechte Kräfte geprägte Gesellschaft
beschreibend, die <em><a
@@ -193,27 +236,36 @@
Propaganda benutzt. Daher verwendet er die Terminologie dieser
Gesellschaft. Um sichtlich noch beklemmender zu klingen, habe ich versucht
dies <!--aus heutiger Sicht -->zu projizieren.
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>Rechner-erzwungene Restriktionen von Verleih- oder Lesebüchern (und anderer
publizierter Werke) sind als <em>DRM</em> bekannt, kurz für <em>Digitale
Rechte-Minderung</em>. Zur Beseitigung von DRM führte die Free Software
Foundation die Kampagne <em><a
href="//DefectiveByDesign.org">Defective-by-Design</a></em> ein. Bitte
unterstützen Sie die Kampagne.</p>
-</li>
-<li>
<p>Die Electronic Frontier Foundation, eine eigenständige, nicht mit der Free
Software Foundation in Beziehung stehende Organisation, kämpft auch gegen
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>Die folgende(n) Anmerkung(en) wurde(n) seit der Erstveröffentlichung der
Geschichte mehrmals aktualisiert.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns">
<p>
Der Kampf um das Recht zu lesen wird bereits ausgefochten. Es wird
vielleicht noch 50 Jahre andauern bis unsere letzten Freiheiten in
@@ -256,15 +308,20 @@
Consortium</span></i> (kurz W3C) ist in den Schatten der
Urheberrechtsindustrie geratenen; es steht kurz davor ein DRM-System als
offiziellen Teil der Internet-Spezifikationen zu genehmigen.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Unfreie Software tendiert zu <a href="/proprietary/">vielerlei
missbräuchlichen Eigenschaften</a>, die zu dem Schluss führen, dass man <a
href="/philosophy/free-software-even-more-important">zu keiner Zeit einem
unfreien Programm vertrauen kann</a>. Wir müssen bloà auf Freie (Libre)
Software bestehen und unfreie Programme zurückweisen.</p>
-<p>
+<p class="inline-block">
Mit Windows Vista gab Microsoft zu, dass sie eine Hintertür eingebaut
hatten: Microsoft kann sie benutzen, um zwangsweise
Software-âVerbesserungenâ zu installieren, selbst wenn Nutzer eher erwägen
@@ -273,7 +330,12 @@
bestimmten Gerätetreibers zu verweigern. Der Hauptzweck von Vistas rigorosen
Vorgehen gegen Nutzer war DRM aufzuerlegen, das Nutzer nicht überwinden
können. Natürlich ist Windows 10 nicht besser.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
Einer der Gedanken in der Geschichte wurde in der Realität nicht
vorgeschlagen, jedenfalls nicht bis 2002: Die Vorstellung, dass das FBI und
@@ -306,7 +368,12 @@
Microsofts Schlüssel, und ob der Eigentümer des Rechners jedes andere System
(wie GNU/Linux) installieren kann, ist unter Kontrolle Microsofts. Wir
nennen dies <em><span xml:lang="en" lang="en">Restricted Boot</span></em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
Im Jahr 1997, als diese Geschichte erstmals publiziert wurde, drohte die SPA
kleinen Internetdienstanbietern mit der Aufforderung, der SPA die
@@ -330,7 +397,12 @@
gemachte Schreckenskampagne der BSA machte leicht verschleierte Drohungen,
dass Personen, die Software gemeinsam benutzen, also teilen, im Gefängnis
vergewaltigt werden würden.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width">
<p>
Die beschriebenen Hochschulsicherheitsrichtlinien sind keine
Erfindung. Beispielsweise zeigt ein Rechner einer Universität in der Gegend
@@ -354,12 +426,15 @@
Dies ist ein interessanter Ansatz zum Vierten Zusatzartikel zur
US-Verfassung: fast jedermann im Voraus zu zwingen, auf die entsprechenden
Rechte zu verzichten.</p>
+</div>
</li>
</ul>
+<div class="column-limit"></div>
</div>
<h3 id="BadNews">Schlechte Nachrichten</h3>
+<div class="columns">
<p>
Der Kampf um das Recht zu lesen ist ‑ zu unseren
Ungunsten ‑ im Gange. Der ist Feind organisiert, wir
@@ -383,11 +458,11 @@
<li><p>Es verfügt über DRM, die Nutzer von der gemeinsamen Nutzung von Kopien
abhalten soll.</p></li>
-<li><p>Es verfügt über eine Hintertür, mit der Amazon jedes Buch aus der
Ferne
+<li><p class="inline-block">Es verfügt über eine Hintertür, mit der Amazon
jedes Buch aus der Ferne
löschen kann. Im Jahr 2009 wurden so Tausende Kopien von George Orwells
<cite>1984</cite> entfernt.</p></li>
-<li><p>Für den Fall, dass das alles nicht Orwellsch genug ist, gibt es noch
eine
+<li><p class="inline-block">Für den Fall, dass das alles nicht Orwellsch
genug ist, gibt es noch eine
universelle Hintertür, mit der Amazon die Software aus der Ferne ändern und
jede andere Form von Bosheit einführen kann.</p></li>
</ul>
@@ -411,6 +486,7 @@
FSF</a>. Es gibt auch eine Reihe von <a href="/help/">Möglichkeiten, an
unserer Arbeit zu partizipieren</a>.
</p>
+</div>
<h3 id="References">Referenzen</h3>
@@ -442,13 +518,7 @@
Urheber- und Patentrechts zu widersetzen und rückgängig zu machen.</li>
</ul>
-<hr />
-<blockquote id="fsfs"><p class="big">Dieser Aufsatz wurde englischsprachig in
<cite><a
-href="//shop.fsf.org/product/free-software-free-society/" xml:lang="en"
-lang="en">Free Software, Free Society: The Selected Essays of Richard
-M. Stallman</a></cite> veröffentlicht.</p></blockquote>
-
-<h5>Weitere Texte</h5>
+<h4>Weitere Texte</h4>
<ul>
<li><a href="/philosophy/">Philosophie des GNU-Projekts</a></li>
@@ -457,6 +527,13 @@
id="copy-protection" xml:lang="en" lang="en">Copy Protection: Just Say
No</a></cite>, in: Computerworld 2000.</li>
</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">Dieser Aufsatz wurde englischsprachig in
<cite><a
+href="//shop.fsf.org/product/free-software-free-society/" xml:lang="en"
+lang="en">Free Software, Free Society: The Selected Essays of Richard
+M. Stallman</a></cite> veröffentlicht.</p></blockquote>
<div class="translators-notes">
@@ -550,7 +627,7 @@
<p class="unprintable"><!-- timestamp start -->
Aktualisierung:
-$Date: 2016/10/28 11:58:13 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: right-to-read.es.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.es.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- right-to-read.es.html 20 Oct 2016 11:28:32 -0000 1.49
+++ right-to-read.es.html 6 Nov 2016 21:28:14 -0000 1.50
@@ -6,30 +6,61 @@
<!-- This file is automatically generated by GNUnited Nations! -->
<title>El derecho a leer - Proyecto GNU - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns >
+ p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
-->
</style>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.es.html" -->
-<h2>El derecho a leer</h2>
+<h2 class="center">El derecho a leer</h2>
-<p>
+<p class="byline center">
por <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
-
-<p>
+<p class="center">
<em>Este artÃculo se publicó en febrero de 1997 en <cite>Communications of
the ACM</cite> (Vol. 40, Número 2).</em></p>
-<hr />
+<hr class="thin" />
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
De <cite>El camino a Tycho</cite>, una colección de artÃculos
sobre los
antecedentes de la Revolución Lunar, publicado en Luna City en 2096.
</p></blockquote>
+<div class="columns">
<p>
Para Dan Halbert el viaje a Tycho comenzó en la universidad, cuando un dÃa
Lissa Lenz le pidió prestado el ordenador. El suyo se habÃa averiado, y a
@@ -68,7 +99,10 @@
Dan pretendÃa hacer carrera en la universidad, esperaba que sus propios
artÃculos de investigación, en caso de ser citados frecuentemente, le
reportaran los suficientes beneficios como para pagar el préstamo).</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Más tarde Dan descubrió que habÃa habido un tiempo en el que todo el mundo
podÃa ir a una biblioteca y leer artÃculos, incluso libros, sin tener que
@@ -115,7 +149,10 @@
se podÃan instalar sin conocer la clave del administrador de nuestro
ordenador, cosa que ni el FBI ni el servicio técnico de Microsoft estaban
dispuestos a revelar.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Dan llegó a la conclusión de que no podÃa prestarle sin más el ordenador a
Lissa. Sin embargo, no podÃa negarse a ayudarla porque estaba enamorado de
@@ -151,7 +188,10 @@
masivamente. Antes de eso, las universidades mantenÃan una actitud diferente
en relación con la disciplina estudiantil: se castigaban las actividades
perniciosas, no las que simplemente levantaran sospechas.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Lissa no denunció a Dan a la APS. Su decisión de ayudarla los condujo al
matrimonio y también a que cuestionasen lo que les habÃan enseñado acerca de
@@ -163,6 +203,7 @@
al igual que ellos intentaban librarse del largo brazo de la APS. Cuando
empezó el Levantamiento de Tycho, en 2062, el derecho universal a leer se
convirtió en una de sus proclamas fundamentales.</p>
+</div>
<div class="announcement">
<blockquote>
@@ -174,17 +215,23 @@
<div id="AuthorsNote">
<h3>Notas del autor</h3>
-<ul>
-<li>Este relato es un artÃculo histórico ficticio supuestamente escrito por
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>Este relato es un artÃculo histórico ficticio supuestamente escrito por
alguien en el futuro. En él se narra la juventud de Dan Halbert en una
sociedad modelada por poderes injustos que utilizan el término «pirata» de
manera engañosa y partidista. El artÃculo emplea la terminologÃa propia de
esa sociedad. He tratado de trasladar ese uso del lenguaje al futuro, a una
sociedad en la que su opresividad resulta más patente. Véase <a
href="/philosophy/words-to-avoid.html#Piracy">«PiraterÃa»</a>.
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>Las restricciones informáticas impuestas sobre el préstamo o la lectura de
libros (y otros tipos de publicaciones) se conocen como DRM, sigla en inglés
de «Digital Restrictions Management» (gestión digital de
@@ -192,17 +239,22 @@
Foundation ha emprendido la campaña <a
href="http://DefectiveByDesign.org">Defective by Design</a>, para la que
solicitamos su apoyo.</p>
-</li>
-<li>
<p>La Electronic Frontier Foundation, una organización independiente, no
vinculada a la Free Software Foundation, también hace campaña contra el
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>La siguiente nota ha sido actualizada varias veces desde la primera
publicación del cuento.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns">
<p>
La batalla por el derecho a leer se está librando ya en la
actualidad. Aunque pudieran pasar 50 años antes de que nuestras libertades
@@ -239,15 +291,20 @@
La sombra de la industria del copyright planea incluso sobre el <cite>World
Wide Web Consortium</cite>, que está a punto de aprobar un sistema DRM como
parte oficial de las especificaciones de la red.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
El software que no es libre suele presentar <a href="/proprietary/">todo
tipo de caracterÃsticas abusivas</a>, lo que lleva a la conclusión de que <a
href="/philosophy/free-software-even-more-important.html">nunca se puede
confiar en un programa que no sea libre</a>. Debemos exigir software libre,
y rechazar programas privativos.</p>
-<p>
+<p class="inline-block">
Microsoft ha admitido la incorporación en Windows Vista de una puerta
trasera: Microsoft puede usarla para instalar por la fuerza
«actualizaciones» de software, incluso aunque los usuarios las consideren
@@ -256,7 +313,12 @@
dispositivos. El principal propósito de las medidas restrictivas de Vista
era imponer a los usuarios un DRM que no pudieran saltarse. Por supuesto,
Windows 10 no es mejor.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
Una de las ideas que se presentan en este cuento se hizo realidad en
2002. Es la idea de que el FBI y Microsoft guarden las claves de
@@ -286,7 +348,12 @@
Microsoft, y aunque el propietario de la máquina pueda instalar cualquier
otro sistema (como GNU/Linux), lo hará bajo el control de Microsoft. A esto
lo llamamos <em>arranque restringido</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
Cuando se escribió esta historia por primera vez, en 1997, la SPA estaba
amenazando a pequeños proveedores de servicios de Internet (<abbr
@@ -307,7 +374,12 @@
amigos. En una campaña de terror organizada por la BSA en Argentina, en
2001, se lanzaron veladas amenazas de que las personas que comparten
software serÃan violadas en prisión.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width">
<p>
Las polÃticas de seguridad descritas anteriormente no son imaginarias. Por
ejemplo, un ordenador de una universidad del área de Chicago mostraba este
@@ -332,12 +404,15 @@
Es una curiosa forma de entender la Cuarta Enmienda: presionar a casi todo
el mundo para que acceda a renunciar de antemano a los derechos que la
enmienda les otorga. </p>
+</div>
</li>
</ul>
+<div class="column-limit"></div>
</div>
<h3 id="BadNews">Malas noticias</h3>
+<div class="columns">
<p>
Hasta ahora la batalla por el derecho a leer no se está resolviendo a
nuestro favor. El enemigo está organizado, y nosotros no.
@@ -361,10 +436,10 @@
<li><p>Tiene DRM, para evitar que los usuarios compartan copias.</p></li>
-<li><p>Tiene una puerta trasera que permite a Amazon borrar por control remoto
+<li><p class="inline-block">Tiene una puerta trasera que permite a Amazon
borrar por control remoto
cualquier libro. En 2009 borraron miles de copias de 1984, de George
Orwell.</p></li>
-<li><p>Por si todo eso no fuera suficientemente «orwelliano», hay una puerta
+<li><p class="inline-block">Por si todo eso no fuera suficientemente
«orwelliano», hay una puerta
trasera universal mediante la cual Amazon puede cambiar el software por
control remoto, y hacer cualquier otra fechorÃa.</p></li>
</ul>
@@ -386,6 +461,7 @@
labor más en general. Hay también una <a href="/help/help.html">lista de
maneras de participar en nuestro trabajo</a>.
</p>
+</div>
<h3 id="References">Referencias</h3>
@@ -415,13 +491,7 @@
revertir esta situación.</li>
</ul>
-<hr />
-<blockquote id="fsfs"><p class="big">Este ensayo está publicado en el libro <a
-href="http://shop.fsf.org/product/free-software-free-society/"><cite>Software
-libre para una sociedad libre: Selección de ensayos de Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Otros textos para leer</h5>
+<h4>Otros textos para leer</h4>
<ul>
<li><a href="/philosophy/philosophy.html">FilosofÃa del Proyecto
GNU</a></li>
@@ -430,6 +500,13 @@
id="copy-protection"><cite>Copy Protection: Just Say No</cite></a>,
publicado en <cite>Computer World</cite>.</li>
</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">Este ensayo está publicado en el libro <a
+href="http://shop.fsf.org/product/free-software-free-society/"><cite>Software
+libre para una sociedad libre: Selección de ensayos de Richard
+M. Stallman</cite></a>.</p></blockquote>
<div class="translators-notes">
@@ -511,7 +588,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2016/10/20 11:28:32 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: right-to-read.fr.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.fr.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- right-to-read.fr.html 20 Oct 2016 18:57:39 -0000 1.107
+++ right-to-read.fr.html 6 Nov 2016 21:28:14 -0000 1.108
@@ -6,30 +6,61 @@
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Le droit de lire - Projet GNU - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns >
+ p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
-->
</style>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.fr.html" -->
-<h2>Le droit de lire</h2>
+<h2 class="center">Le droit de lire</h2>
-<p>
+<p class="byline center">
par <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
-
-<p>
+<p class="center">
<em>Cet article a été publié dans la parution de février 1997 de
<cite>Communications of the ACM</cite> (volume 40, numéro 2).</em></p>
-<hr />
+<hr class="thin" />
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
Extrait de <cite>The Road to Tycho</cite>, une collection
d'articles sur les
antécédents de la révolution lunaire publiée à Luna City en 2096.
</p></blockquote>
+<div class="columns">
<p>
Pour Dan Halbert, la route vers Tycho commença à l'université, quand Lissa
Lenz lui demanda de lui prêter son ordinateur. Le sien était en panne et, Ã
@@ -69,7 +100,10 @@
puisque Dan visait une carrière universitaire, il pouvait espérer que ses
propres articles scientifiques, s'ils étaient souvent référencés, lui
rapporteraient assez pour rembourser sa dette).</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Par la suite, Dan apprendrait qu'il y avait eu une époque où n'importe qui
pouvait aller à la bibliothèque lire des articles de revues, et même des
@@ -118,7 +152,10 @@
vous en aviez un, sans connaître le mot de passe administrateur de votre
ordinateur. Or, ni le FBI ni l'Aide technique Microsoft ne vous le
révèlerait.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Dan conclut qu'il ne pouvait pas se contenter de prêter son ordinateur Ã
Lissa. Mais il ne pouvait refuser de l'aider, car il l'aimait. Chaque
@@ -156,7 +193,10 @@
avaient une approche différente de la discipline des étudiants ; elles
punissaient les activités qui causaient du tort et pas celles qui
éveillaient simplement des soupçons.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Lissa ne dénonça pas Dan à la SPA. Sa décision de l'aider les amena à se
marier et aussi à remettre en question ce qu'on leur avait enseigné dans
@@ -167,6 +207,7 @@
pris leurs distances par rapport au long bras de la SPA. Quand la révolte de
Tycho commença en 2062, le droit universel de lire devint bientôt un de ses
objectifs principaux.</p>
+</div>
<div class="announcement">
<blockquote>
@@ -179,17 +220,23 @@
<div id="AuthorsNote">
<h3>Notes de l'auteur</h3>
-<ul>
-<li>Cette histoire est un article historique fictif qui sera écrit dans le
futur
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>Cette histoire est un article historique fictif qui sera écrit dans le
futur
par quelqu'un d'autre pour décrire la jeunesse de Dan Halbert au sein d'une
société répressive mise en place par des forces injustes utilisant le mot
« pirate » dans leur propagande. La terminologie de cette société y est
donc
employée. J'ai tenté de la projeter dans un univers plus visiblement
tyrannique. Consultez « <a
href="/philosophy/words-to-avoid.html#Piracy">Piratage</a> ».
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>Les restrictions imposées par ordinateur sur le prêt ou la lecture de
livres
(et autres sortes d'Åuvres publiées) sont connues sous le nom de DRM,
raccourci pour <cite>Digital Restrictions Management</cite> (gestion
@@ -198,18 +245,23 @@
href="http://DefectiveByDesign.org">Defective by Design</a></cite>.<a
id="TransNote2-rev" href="#TransNote2"><sup>2</sup></a>. Nous demandons
votre soutien.</p>
-</li>
-<li>
<p>L'<cite>Electronic Frontier Foundation</cite>, une organisation séparée
sans
lien avec la <cite>Free Software Fondation</cite>, fait également campagne
contre les DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>La note suivante a été modifiée plusieurs fois depuis la première
publication de cette histoire.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns">
<p>
La bataille pour le droit de lire fait déjà rage. Bien qu'il puisse
s'écouler 50 ans avant que nos libertés d'antan s'effacent dans
l'obscurité,
@@ -252,8 +304,13 @@
Le <cite>World Wide Web Consortium</cite> lui-même est tombé sous la coupe
de l'industrie du copyright; il est sur le point d'approuver l'inscription
officielle d'un système de DRM dans les spécifications du web.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Le logiciel non libre a tendance à posséder <a href="/proprietary/"> des
fonctionnalités abusives de toutes sortes</a>, ce qui conduit naturellement
à la conclusion qu'<a
@@ -261,7 +318,7 @@
faire confiance à un programme non libre</a>. Nous devons exiger du logiciel
exclusivement libre et rejeter les programmes non libres.</p>
-<p>
+<p class="inline-block">
Microsoft a admis avoir intégré une porte dérobée à Windows Vista. Cette
société peut s'en servir pour installer de force des « mises à niveau »
de
logiciels, même si les utilisateurs les considèrent plutôt comme des
@@ -270,7 +327,12 @@
périphérique. L'objectif principal de cette répression des utilisateurs par
Vista était d'imposer des DRM que les utilisateurs ne pourraient pas
outrepasser. Bien sûr, Windows 10 n'a rien à lui envier.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
L'une des idées contenues dans cette histoire n'a en fait été proposée
qu'en
2002. C'est l'idée que le FBI et Microsoft garderaient les mot de passe
@@ -301,7 +363,12 @@
clé de Microsoft ; le choix de laisser ou non l'utilisateur installer un
autre système (GNU/Linux par exemple) appartient à Microsoft. Nous appelons
cela <em>démarrage restreint</em> <cite>[restricted boot]</cite>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
En 1997, quand cette histoire a été publiée, la SPA menaçait de petits
fournisseurs d'accès à Internet (FAI) en exigeant qu'ils lui permettent de
@@ -322,7 +389,12 @@
et amis ; dans une campagne de terreur orchestrée par la BSA en 2001 en
Argentine, des menaces à peine voilées ont été faites, selon lesquelles les
gens partageant du logiciel seraient violés en prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width">
<p>
Les politiques universitaires de sécurité décrites précédemment ne sont
pas
imaginaires. Par exemple, un ordinateur dans une université de la région de
@@ -347,12 +419,15 @@
Il s'agit d'une approche intéressante du quatrième amendement : pousser
presque tous les gens à accepter d'avance de renoncer aux droits qu'il leur
accorde.</p>
+</div>
</li>
</ul>
+<div class="column-limit"></div>
</div>
<h3 id="BadNews">Mauvaises nouvelles</h3>
+<div class="columns">
<p>
Jusqu'à présent, la bataille pour le droit de lire tourne à notre
détriment. L'ennemi est organisé alors que nous ne le sommes pas.
@@ -376,11 +451,11 @@
<li><p>Elle a un DRM conçu pour empêcher l'utilisateur de partager des
copies.</p></li>
-<li><p>Elle a une porte dérobée par laquelle Amazon peut effacer à distance
+<li><p class="inline-block">Elle a une porte dérobée par laquelle Amazon
peut effacer à distance
n'importe quel livre. En 2009, elle a effacé des milliers de copies de
« 1984 », le roman de George Orwell.</p></li>
-<li><p>Et si tout ça n'est pas encore assez orwellien, il y a une porte
dérobée
+<li><p class="inline-block">Et si tout ça n'est pas encore assez orwellien,
il y a une porte dérobée
universelle par laquelle Amazon peut modifier le logiciel à distance et
introduire n'importe quelle autre forme de vilainie.</p></li>
</ul>
@@ -404,6 +479,7 @@
la FSF</a> pour soutenir l'ensemble de notre travail. Il y a aussi de
nombreux moyens d'y <a href="/help/help.html">participer</a>.
</p>
+</div>
<h3 id="References">Références</h3>
@@ -432,13 +508,7 @@
de faire marche arrière.</li>
</ul>
-<hr />
-<blockquote id="fsfs"><p class="big">Cet essai est publié dans <a
-href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Autres textes à lire</h5>
+<h4>Autres textes à lire</h4>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophie du projet
GNU</a></li>
@@ -447,6 +517,13 @@
id="copy-protection"> Copy Protection: Just Say No</a>, publié dans
<cite>Computer World</cite>.</li>
</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">Cet essai est publié dans <a
+href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
<div class="translators-notes">
@@ -541,7 +618,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2016/10/20 18:57:39 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: right-to-read.it.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.it.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- right-to-read.it.html 20 Oct 2016 20:27:37 -0000 1.58
+++ right-to-read.it.html 6 Nov 2016 21:28:14 -0000 1.59
@@ -6,30 +6,61 @@
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Il diritto a leggere - Progetto GNU - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns >
+ p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
-->
</style>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.it.html" -->
-<h2>Il diritto a leggere</h2>
+<h2 class="center">Il diritto a leggere</h2>
-<p>
+<p class="byline center">
di <a href="http://www.stallman.org/"><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
<em>Questo articolo è apparso nel numero di febbraio 1997 di
<cite>Communications of the ACM</cite> (volume 40, numero 2).</em></p>
-<hr />
+<hr class="thin" />
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
Da <cite>La strada per Tycho</cite>, una raccolta di articoli sugli
antefatti della Rivoluzione Lunare, pubblicata a Città della Luna nel 2096.
</p></blockquote>
+<div class="columns">
<p>
Per Dan Halbert, la strada per Tycho cominciò al college, quando Lissa Lenz
gli chiese in prestito il computer. Il suo le si era rotto, e non sarebbe
@@ -67,7 +98,10 @@
siccome Dan puntava alla carriera accademica, poteva sperare che i suoi
stessi articoli gli avrebbero reso abbastanza da ripagare il prestito, se
citati abbastanza spesso.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Più in là Dan avrebbe imparato che c'era stato un tempo in cui chiunque
poteva andare in biblioteca e leggere gli articoli delle riviste, e persino
@@ -113,7 +147,10 @@
per installarli dovevi conoscere la parola segreta primaria del tuo
computer, quella più segreta di tutte, e né l'FBI né il supporto clienti
della Microsoft te l'avrebbero mai svelata.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Dan si rese conto che non poteva semplicemente prestare il suo computer a
Lissa. Ma come poteva rifiutarsi di aiutarla? lui la amava. Ogni volta che
@@ -150,7 +187,10 @@
adottavano un approccio differente alla disciplina degli studenti, punivano
le attività che causavano dei danni, non quelle che sollevavano solo
sospetti.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Lissa non denunciò Dan all'APS. La sua decisione di aiutarla portò al loro
matrimonio, come li portò anche a mettere in dubbio quello che era stato
@@ -161,6 +201,7 @@
s'erano sottratti al lungo braccio dell'APS. Quando cominciò la Rivolta di
Tycho nel 2062, il diritto universale a leggere ne divenne presto uno degli
obiettivi centrali.</p>
+</div>
<div class="announcement">
<blockquote>
@@ -172,34 +213,45 @@
<div id="AuthorsNote">
<h3>Note dell'autore</h3>
-<ul>
-<li>Questa storia finge di essere un articolo storico scritto nel futuro da
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>Questa storia finge di essere un articolo storico scritto nel futuro da
altri autori, per descrivere la giovinezza di Dan Halbert in una societÃ
repressiva forgiata dalle forze ingiuste che usano "pirata" come termine di
propaganda. Quindi usa la terminologia di quella società . Ho cercato di
rendere la storia come se si svolgesse in un futuro ancora più
opprimente. Vedere <a
href="/philosophy/words-to-avoid.html#Piracy">“Pirateria”</a>.
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>Le restrizioni imposte tramite computer per il prestito e la lettura dei
liberi (e altre opere pubblicate) sono note come DRM, che noi chiamiamo
“Digital Restrictions Management”. Per eliminare i DRM, la Free
Software Foundation ha lanciato la campagna <a
href="http://DefectiveByDesign.org">Defective by Design</a> e chiede il
vostro aiuto.</p>
-</li>
-<li>
<p>Anche la Electronic Frontier Foundation, un'organizzazione separata non
collegata alla Free Software Foundation, organizza campagne contro i DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>Questa nota è stata aggiornata più volte dalla prima pubblicazione di
questa
storia.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns">
<p>
Il diritto a leggere è una battaglia che si combatte oggi. Sebbene possano
volerci 50 anni perché le nostre libertà presenti si dissolvano
@@ -233,21 +285,31 @@
<p>
Anche il World Wide Web Consortium sta cedendo al potere delle aziende; sta
per approvare un sistema DRM come parte ufficiale delle specifiche del web.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Il software non libero tende ad avere <a href="/proprietary/">abusi di vario
genere</a>, che fanno concludere che <a
href="/philosophy/free-software-even-more-important.html">non si può mai
avere fiducia in un programma non libero</a>. Dobbiamo respingere i
programmi non liberi.</p>
-<p>
+<p class="inline-block">
Con Windows vista, Microsoft ha ammesso di avere inserito una backdoor per
installare "aggiornamenti" software anche se indesiderati dall'utente. Può
anche imporre a tutti i PC che usano Vista di non eseguire un certo driver
di dispositivo hardware. Lo scopo principale era quello di imporre DRM che
l'utente non potesse superare. Ovviamente Windows 10 non è migliore.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
Una delle idee nel racconto non è stata proposta nella realtà prima del
2002, quella che l'FBI e Microsoft terranno le parole segrete primarie per
@@ -275,7 +337,12 @@
progettati per Windows 10 hanno solo la chiave di Microsoft e il fatto di
poter installare un altro sistema (come GNU/Linux) è sotto il controllo di
Microsoft. Noi lo chiamiamo <em>restricted boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
Nel 1997, quando fu scritta la prima versione di questo racconto, la SPA
stava minacciando dei piccoli fornitori di accesso a Internet, pretendendo
@@ -294,7 +361,12 @@
lavoro e gli amici. Una campagna mediatica terroristica della BSA in
Argentina nel 2001 avanzava velate minacce che le persone che condividevano
il software sarebbero state violentate in carcere.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width">
<p>
Le politiche di sicurezza delle università descritte sopra non sono
immaginarie. Per esempio, sullo schermo di un computer in un'universitÃ
@@ -317,12 +389,15 @@
<p>
à invero un approccio interessante al Quarto Emendamento: pressare da subito
i più a rinunciare ai propri diritti che questo garantisce.</p>
+</div>
</li>
</ul>
+<div class="column-limit"></div>
</div>
<h3 id="BadNews">Cattive notizie</h3>
+<div class="columns">
<p>
La battaglia per il diritto a leggere è già in corso, e stiamo subendo. Il
nemico è organizzato e noi non lo siamo.
@@ -342,11 +417,11 @@
<li><p>Ha DRM per evitare che gli utenti condividano copie.</p></li>
-<li><p>Ha una backdoor che Amazon può usare per cancellare da remoto qualsiasi
+<li><p class="inline-block">Ha una backdoor che Amazon può usare per
cancellare da remoto qualsiasi
libro e che nel 2009 è stata usata per cancellare copie del libro "1984" di
George Orwell.</p></li>
-<li><p>Se questo non è abbastanza Orwelliano c'è una backdoor universale con
cui
+<li><p class="inline-block">Se questo non è abbastanza Orwelliano c'è una
backdoor universale con cui
Amazon può cambiare il software da remoto, introducendo qualsiasi tipo di
funzioni.</p></li>
</ul>
@@ -365,6 +440,7 @@
alla FSF</a> per darci un sostegno generico, oppure vedete questi altri <a
href="/help/help.html">modi per aiutare il nostro lavoro</a>.
</p>
+</div>
<h3 id="References">Riferimenti</h3>
@@ -393,13 +469,7 @@
dai brevetti.</li>
</ul>
-<hr />
-<blockquote id="fsfs"><p class="big">Questo testo è stato pubblicato in <a
-href="http://shop.fsf.org/product/free-software-free-society/"><cite> Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Altri testi da leggere</h5>
+<h4>Altri testi da leggere</h4>
<ul>
<li><a href="/philosophy/philosophy.html">Filosofia del progetto
GNU</a></li>
@@ -408,6 +478,13 @@
id="copy-protection">Copy Protection: Just Say No</a>, Pubblicato in
Computer World.</li>
</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">Questo testo è stato pubblicato in <a
+href="http://shop.fsf.org/product/free-software-free-society/"><cite> Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
<div class="translators-notes">
@@ -486,7 +563,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/10/20 20:27:37 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: right-to-read.ja.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.ja.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- right-to-read.ja.html 31 Oct 2016 04:28:15 -0000 1.51
+++ right-to-read.ja.html 6 Nov 2016 21:28:14 -0000 1.52
@@ -6,29 +6,60 @@
<!-- This file is automatically generated by GNUnited Nations! -->
<title>èªãæ¨©å© - GNUããã¸ã§ã¯ã -
ããªã¼ã½ããã¦ã§ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns >
+ p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
-->
</style>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.ja.html" -->
-<h2>èªã権å©</h2>
+<h2 class="center">èªã権å©</h2>
-<p>
+<p class="byline center">
<a
href="http://www.stallman.org/"><strong>ãªãã£ã¼ãã»ã¹ãã¼ã«ãã³</strong></a>è</p>
-
-<p>
+<p class="center">
<em>ãã®è¨äºã¯<cite>Communications of the
ACM</cite>1997å¹´2æå·(第40å·»No.2)ã«æ²è¼ããã¾ããã</em></p>
-<hr />
+<hr class="thin" />
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
æé¢é©å½ã®å
è¡è
ã«é¢ããè¨äºéã<cite>ãã£ã³ã¸ã®é</cite>ãã«ãã·ãã£çºè¡ã2096å¹´ãããã
</p></blockquote>
+<div class="columns">
<p>
ãã³ã»ãã«ãã¼ãã«ã¨ã£ã¦ããã£ã³ã¸ã®éã¯å¤§å¦ããå§ã¾ã£ãã—ãªããµã»ã¬ã³ãããå½¼ã®ã³ã³ãã¥ã¼ã¿ã貸ãã¦æ¬²ããã¨è¨ã£ã¦ããã¨ãã«ãèªåã®ã³ã³ãã¥ã¼ã¿ãæ
éãã¦ãã¾ã£ã彼女ã¯ãä»ã®ã³ã³ãã¥ã¼ã¿ãåããããªãéãå¦æã®ä¸éããã¸ã§ã¯ããçµãããããã¨ãã§ããªãã£ãããã³ãé¤ãã°ãä»ã«å½¼å¥³ãé
¼ããè
ã¯ããªãã£ãã</p>
@@ -42,7 +73,10 @@
<p>
ãã¡ããããªããµãå½¼ã®æ¬ãèªããã¨ãæå³ãã¦ããã¨ã¯éããªãã彼女ã¯ã³ã³ãã¥ã¼ã¿ãä¸éã¬ãã¼ããæ¸ãããã
ãã«ä½¿ãããã®ããç¥ããªããããããã³ã¯ã彼女ãä¸æµéç´ã®å®¶åºã®åºã§ææ¥ææ¯æãã®ä½è£ã¯ãªããèªæ¸æã¯è¨ãã¾ã§ããªããã¨ãç¥ã£ã¦ãããå½¼ã®æ¬ãèªãã®ãã彼女ãåæ¥ã§ããå¯ä¸ã®éã
ãããå½¼ã¯ãã®ç¶æ³ãç解ãã¦ãããå½¼èªèº«ãèªåãèªãç
究è«æã®å
¨ã¦ã«å¯¾ããèªæ¸æãæãããã«ãéãåããªããã°ãªããªãã£ãã®ã
ã(ãããã£ãèªæ¸æã®10%ã¯ãã®è«æãæ¸ããç 究è
ãã¡ã«æ¯æãããããã³ã¯å¦è
ã«ãªãã¤ããã
ã£ãã®ã§ãå°æ¥å½¼èªèº«ã®ç 究è«æãé »ç¹ã«åç
§ãããã°ããã®ãã¼ã³ãè¿æ¸ã§ããã¨æããã¨ãã§ããã®ã
ã)</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
å¾ã«ãã³ã¯ããã¤ã¦èª°ã§ãå³æ¸é¤¨ã«è¡ãã°ãå¦è¡éèªã®è¨äºãããããã¯æ¸ç±ãããæéãæ¯æããã¨ãªãèªããã¨ãã§ããæ代ããã£ããã¨ãç¥ã£ããå½æã¯ãæ¿åºã®å³æ¸é¤¨å©ç¨å©æéç¡ãã§ä½åãã¼ã¸ãèªç
´ããå¨éã®ç 究è
ãã¡ãããã®ã ãããã1990年代ã«å
¥ããå¶å©ã®ã¿ãªããéå¶å©ã®å¦è¡åºç社ãã¾ããã¢ã¯ã»ã¹ã«æéã課ãããã«ãªã£ãã2047å¹´ã¾ã§ã«ããã¤ã¦å³æ¸é¤¨ã§ã¯å¦è¡æç®ã«èªç±ã«èª°ã§ãã¢ã¯ã»ã¹ã§ãããã¨ãªã©ããã¼ãããªè¨æ¶ã®å½¼æ¹ã«æ¶ãã¦ãã¾ã£ãã®ã§ããã</p>
@@ -57,7 +91,10 @@
<p>
èä½æ¨©ç£è¦è£
ç½®ããæ¹å¤ããã·ã¹ãã
ã«ã¼ãã«ãã¤ã³ã¹ãã¼ã«ãããã¨ã§åé¿ãããã¨ãå¯è½ã
ã£ãããã³ã¯ãèªç±ãªã«ã¼ãã«ããå®å
¨ã«èªç±ãªãªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã
ãããåä¸ç´æ«ã«ã¯åå¨ãã¦ãããã¨ãç¥ã£ãããããç¾å¨ã§ã¯ãããã¯ãããã¬åæ§éæ³ã§ããã
ãã§ãªãããããã®ãããªã·ã¹ãã
ãæã£ã¦ããã¨ãã¦ããã³ã³ãã¥ã¼ã¿ã®ã«ã¼ãã»ãã¹ã¯ã¼ããç¥ããªããã¨ã«ã¯ã¤ã³ã¹ãã¼ã«ã§ããªãã®ã
ã£ããFBIããã¤ã¯ãã½ããã»ãµãã¼ãããã¹ã¯ã¼ããæãã¦ã¯ãããªãã</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
ãã³ã¯ãåã«ãªããµã«å½¼ã®ã³ã³ãã¥ã¼ã¿ã貸ããã¨ã¯ã§ããªãã¨çµè«ã¥ããããããå½¼ã¯å½¼å¥³ãå©ãããã¨ãæå¦ã§ããªãã£ãããã³ã¯å½¼å¥³ã®ãã¨ãæãã¦ããããã
ã彼女ã¨è©±ãæã¯ãã¤ãããã³ã®å¿ã¯åã³ã«æºã¡ããµããã®ã
ã£ããããã¦ãªããµã¯ä»ãªãã¬å½¼ã«å©ããæ±ãã¦ããã®ã
ããã彼女ãå½¼ãæãã¦ããã®ãããããªãã£ãã</p>
@@ -72,9 +109,13 @@
<p>
å¾ã«ããã³ã¯ãã®ç¨®ã®å¤§å¦ã®æ¹éã¯ç¸å½æ°ã®å¤§å¦çãã³ã³ãã¥ã¼ã¿ã使ãå§ãã1980年代ããå§ã¾ã£ããã®ã«éããªããã¨ãç¥ã£ããããã¾ã§ã¯ã大å¦ã¯å¦çè¦åã«é¢ãã¦ç°ãªã£ãæ¹éãä¿æãã¦ãããå½æã®å½¼ãã¯ãæ害ãªæ´»åãç½°ããã®ã§ãã£ã¦ãçããæãããã
ãã®è
ã¯ç½°ããªãã£ãã®ã§ããã</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
ãªããµã¯ãã³ãSPAã«å
±åããªãã£ããå½¼ã®å½¼å¥³ãå©ããã¨ãã決æã¯ãã¤ãã«ã¯å½¼å¥³ã¨ã®çµå©ã«å½¼ãå°ããããããã«å½¼ãã¯åä¾ã®ã¨ãããæµ·è³è¡çºã¨ãã¦æãããã¦ãããã¨ã«çåãæã¤ããã«ãªã£ãããã³ã¨ãªããµã¯èä½æ¨©ã®æ´å²ã«ã¤ãã¦èª¿ã¹å§ããã½ãã¨ãé£é¦ã¨ããã§ã®è¤è£½ã®å¶éãããã¦å
ã
ã®åè¡å½æ²æ³ããèªãã
ãå½¼ãã¯æã«ç§»ä½ããããå½¼ãã®ä»ã«ãåæ§ã«SPAã®é·ãè
ããéãã人ã
ããããã¨ãç¥ã£ãã2062å¹´ã«ãã£ã³èèµ·ãå§ã¾ã£ãã¨ããä¸äººã«ã¨ã£ã¦ã®èªã権å©ã¯ã¾ããªããã®ä¸å¿çãªç®çã®ä¸ã¤ã¨ãªã£ãã®ã§ããã</p>
+</div>
<div class="announcement">
<blockquote>
@@ -86,24 +127,35 @@
<div id="AuthorsNote">
<h3>ä½è
ã®æ³¨é</h3>
-<ul>
-<li>ãã®ç©èªã¯ã誰ãã«ãã£ã¦æªæ¥ã«æ¸ãããæ´å²çãªè¨äºã¨æ³å®ããã¦ããããã³ã»ãã«ãã¼ãã®è¥ãæ代ãæãã¦ãã¾ããããã¯ãæµ·è³ãããããã¬ã³ãã¨ãã¦ä½¿ãä¸æ£ãªåã«å¶ãããæå§çãªç¤¾ä¼ã§ããã§ãããããã®ç©èªã¯ããã®ç¤¾ä¼ã®ç¨èªãç¨ãã¦ãã¾ããããæããã«å¼¾å§çãªæããããããã«ããããã¯ãæãããã«ãã¾ããããã¡ãã®ã<a
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>ãã®ç©èªã¯ã誰ãã«ãã£ã¦æªæ¥ã«æ¸ãããæ´å²çãªè¨äºã¨æ³å®ããã¦ããããã³ã»ãã«ãã¼ãã®è¥ãæ代ãæãã¦ãã¾ããããã¯ãæµ·è³ãããããã¬ã³ãã¨ãã¦ä½¿ãä¸æ£ãªåã«å¶ãããæå§çãªç¤¾ä¼ã§ããã§ãããããã®ç©èªã¯ããã®ç¤¾ä¼ã®ç¨èªãç¨ãã¦ãã¾ããããæããã«å¼¾å§çãªæããããããã«ããããã¯ãæãããã«ãã¾ããããã¡ãã®ã<a
href="/philosophy/words-to-avoid.html#Piracy">ãæµ·è³è¡çºã</a>ãã覧ãã
ããã
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>ã³ã³ãã¥ã¼ã¿ã«ããå¼·å¶ãããæ¸ç±(ããã³ãã®ã»ãã®å
¬éä½å)ã®è²¸ä¸ãèªæ¸ã«å¯¾ããå¶éã¯DRMã¨ãã¦ç¥ããã¾ãããããã¯ããã£ã¸ã¿ã«å¶é管çãã®ç¥ã§ããDRMããªããããã«ãããªã¼ã½ããã¦ã§ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³ã¯<a
href="http://DefectiveByDesign.org">Defective by
Design</a>(è¨è¨ããééã£ã¦ãã)ãã£ã³ãã¼ã³ãè¨ç½®ãã¾ãããçããã®ãµãã¼ãããé¡ããã¾ãã</p>
-</li>
-<li>
<p>é»åããã³ãã£ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³ããããªã¼ã½ããã¦ã§ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³ã¨ã¯é¢ä¿ãªãå¥ã®å£ä½ã§ãããDRMã«å対ããéåããã¦ãã¾ãã</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>ãã®æ³¨éã¯ã¹ãã¼ãªã¼ã®æåã®çºè¡¨ããä½åãæ´æ°ããã¾ããã</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns">
<p>
èªã権å©ã®ããã®æ¦ãã¯ããã§ã«ä»æ¥éããã¦ããã®ã§ããç¾å¨ã®çæ´»ç¿æ
£ãæ´å²ã®å½¼æ¹ã«æ¶ã失ããã¾ã§ã«ã¯50å¹´ãããããããã¾ããããæ¬æã§è¿°ã¹ãããç¹å®ã®æå§çãªæ³å¾ãæ
£è¡ã®ã»ã¨ãã©ã¯ãã§ã«ææ¡ããã¦ããããã®ããã¤ãã¯ã¢ã¡ãªã«åè¡å½ãä»ã®å½ã
ã§ãã§ã«ç«æ³ããã¦ãã¾ã£ã¦ãã¾ããã¢ã¡ãªã«ã§ã¯ã1998å¹´ãã£ã¸ã¿ã«ã»ãã¬ãã¢ã
èä½æ¨©æ³(Digital
Millennium Copyright
@@ -118,15 +170,25 @@
<p>
WWWã³ã³ã½ã¼ã·ã¢ã ã§ããããèä½æ¨©æ¥çã®å½±ã®å
ã«é¥ã£ã¦ãã¾ãã¾ãããä»ãDRMã·ã¹ãã
ãã¦ã§ãã®ä»æ§ã®å
¬å¼é¨åã¨ããæ¿èªã®ããã«ããã¾ãã</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
ä¸èªç±ãªã½ããã¦ã§ã¢ã¯<a
href="/proprietary/">å¤ç¨®ã®æªç¨æ©è½</a>ãæããå¾åããããããã¯ã<a
href="/philosophy/free-software-even-more-important.html">ä¸èªç±ãªããã°ã©ã
ã¯æ±ºãã¦ä¿¡é
¼ã§ããªã</a>ã¨ããçµè«ãå°ãã¾ããèªç±(ãªãã¬)ã½ããã¦ã§ã¢ã
ãã主張ããä¸èªç±ãªããã°ã©ã
ãæå¦ããªãã¦ã¯ãªãã¾ããã</p>
-<p>
+<p class="inline-block">
ã¦ã£ã³ãã¦ãºVistaã§ãã¤ã¯ãã½ããã¯ããã¯ãã¢ãçµã¿å
¥ãããã¨ãèªãã¾ãã:
ãã¨ãã¦ã¼ã¶ãããã¯ããããã¦ã³ã°ã¬ã¼ãã
ã¨èããã¨ãã¦ãããã¤ã¯ãã½ããã¯å¼·å¶çã«ã½ããã¦ã§ã¢ã®ãã¢ããã°ã¬ã¼ãããã¤ã³ã¹ãã¼ã«ã§ããã®ã§ããVistaã稼åãã¦ãããã¹ã¦ã®ãã·ã³ã«å¯¾ãã¦ãããããã¤ã¹ãã©ã¤ãã®å®è¡ãæ絶ããæ令ããããã¨ãã§ãã¾ããVistaã®ã¦ã¼ã¶ã®å¼¾å§ã®ä¸»ãªç®çã¯ãã¦ã¼ã¶ãå
æã§ããªãDRMã®æ¼ãä»ãã§ããããã¡ãããã¦ã£ã³ãã¦ãºã¯æ±ºãã¦ããã¯ããã¾ããã</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
ãã®ã¹ãã¼ãªã¼ã®ä¸ã®ä¸ã¤ã®ã¢ã¤ãã¢ã¯2002å¹´ã¾ã§ã¯ç¾å®ã«ã¯ææ¡ããã¾ããã§ãããããã¯ãFBIã¨ãã¤ã¯ãã½ãããããªãã®ãã¼ã½ãã«ã»ã³ã³ãã¥ã¼ã¿ã®ã«ã¼ããã¹ã¯ã¼ããä¿æããããªãã«ã¯æãããªãã¨ãããã®ã§ãã</p>
@@ -140,7 +202,12 @@
<p>
ã»ãã¥ã¢ã»ãã¼ãã¯ã¦ã¼ã¶ãç½²åéµãæå®ããã©ã®ã½ããã¦ã§ã¢ãç½²åãããã決ãããã¨ãå¯è½ãªæ¹æ³ã§å®è£
ãããã¨ãã§ãã¾ããå®éãã¦ã£ã³ãã¦ãº10ã®ããã«è¨è¨ãããPCã¯ãã¤ã¯ãã½ããã®éµã
ããä¿æãããã®ãã·ã³ã®ææè
ã(GNU/Linuxã®ãããª)ã»ãã®ã·ã¹ãã
ãã¤ã³ã¹ãã¼ã«ã§ãããã©ããã¯ããã¤ã¯ãã½ããã®ã³ã³ããã¼ã«ä¸ã«ããã¾ãããããããããã¡ã¯<em>å¶éããããã¼ã</em>ã¨å¼ã³ã¾ãã</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
1997å¹´ããã®ã¹ãã¼ãªã¼ãæåã«çºè¡¨ãããã¨ããSPAã¯å°è¦æ¨¡ãªã¤ã³ã¿ã¼ããããµã¼ãã¹ãããã¤ããè
ãã¦ãå½¼ããSPAã«ãã¹ã¦ã®ã¦ã¼ã¶ãç£è¦ãããã¨ã許å¯ããããè¦æ±ãã¦ãã¾ãããã»ã¨ãã©ã®ISPã¯è
ããã¦å±æãã¾ããããããã¯å½¼ããæ³å»·ã§åæããã
ãã®è³éçä½è£ããªãã£ãããã§ããä¸ã¤ã®ISPãã«ãªãã©ã«ãã¢å·ãªã¼ã¯ã©ã³ãã®Community
ConneXionã¯è¦æ±ãæå¦ãå®éã«è¨´ãããã¾ãããSPAã¯å¾ã«è¨´è¨ãåãä¸ãã¾ããããæ±ãã¦ããåãDMCAãä¸ãã¦ãããã®ã§ãã</p>
@@ -148,7 +215,12 @@
<p>
SPAã¯ãæ¬å½ã¯ãã½ããã¦ã§ã¢åºçæ¥åä¼(Software
Publisher'sAssociation)ãã®ç¥ã§ãããBSA(ãã¸ãã¹ã½ããã¦ã§ã¢åç)ã«ããã®è¦å¯ã®ãããªå½¹å²ãç½®ãæãããã¦ãã¾ãã¾ãããä»æ¥ãBSAã¯å
¬å¼ã®è¦å¯æ¨©åã¨ã§ã¯ããã¾ããããéå
¬å¼ã«ã¯è¦å¯ã®ããã«ãµãã¾ã£ã¦ãã¾ãããã¤ã¦ã®ã½ãã¨ãé£é¦ãæãèµ·ãããããããªææ³ãç¨ãã人ã
ããã®ååãå人ãå¯åãããã奨å±ãã¦ããã®ã§ãã2001å¹´ã¢ã«ã¼ã³ãã³ã«ããã¦å±éãããBSAã®æãã¹ããã£ã³ãã¼ã³ã¯ãã½ããã¦ã§ã¢ãå
±æãã人ã
ã¯ç£çã§ã¬ã¤ããããã
ããã¨ãããããªãã¨ãé åãã«è¿°ã¹ã¦è
ããããªå
容ã§ããã</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width">
<p>
æ¬æä¸ã«ãããããªå¤§å¦ã®ã»ãã¥ãªãã£ããªã·ã¼ã¯æ³åã®ç£ç©ã§ã¯ããã¾ããããã¨ãã°ãã·ã«ã´å°åã«ããæ大å¦ã®ã³ã³ãã¥ã¼ã¿ã¯ããã°ã¤ã³ããéã«ä»¥ä¸ã®ãããªã¡ãã»ã¼ã¸ã表示ãã¾ãã</p>
@@ -158,12 +230,15 @@
<p>
ããã¯å¤ãã®äººã«ãå½¼ããä¿®æ£ç¬¬4æ¡ã®ä¸ã§ä¿è¨¼ããã権å©ããããããæ¾æ£ãããã¨ã«åæããããå§åãããã¦ããã¨ããç¹ã§ãæ²æ³ä¿®æ£ç¬¬4æ¡ã¸ã®èå³æ·±ãã¢ããã¼ãã§ãã</p>
+</div>
</li>
</ul>
+<div class="column-limit"></div>
</div>
<h3 id="BadNews">æªããã¥ã¼ã¹</h3>
+<div class="columns">
<p>
èªã権å©ã®æ¦ãã¯ããã¾ã§ããããã¡ã«ä¸å©ã§ãããæµã¯çµç¹åããã¦ãã¾ãããããããã¡ã¯ããã§ã¯ããã¾ããã
</p>
@@ -178,9 +253,9 @@
<li><p>ããã¯DRMãæããã¦ã¼ã¶ãã³ãã¼ãå
±æãããã¨ãé»æ¢ãããã¨ãæå³ãã¦ãã¾ãã</p></li>
-<li><p>ããã¯Amazonãé
éæä½ã§ãããªãæ¬ãåé¤ã§ããããã¯ãã¢ãæãã¾ãã2009å¹´ãã¸ã§ã¼ã¸ã»ãªã¼ã¦ã§ã«èã®1984ã®ã³ãã¼ãä½åé¨ãåé¤ãã¾ããã</p></li>
+<li><p class="inline-block">ããã¯Amazonãé
éæä½ã§ãããªãæ¬ãåé¤ã§ããããã¯ãã¢ãæãã¾ãã2009å¹´ãã¸ã§ã¼ã¸ã»ãªã¼ã¦ã§ã«èã®1984ã®ã³ãã¼ãä½åé¨ãåé¤ãã¾ããã</p></li>
-<li><p>ãªã¼ã¦ã§ã«ã®èªè
ã«ã¨ã£ã¦ããã§ãä¸ååãªå
´åã«ã¯ãä¸è½ããã¯ãã¢ããããAmazonã¯é
éæä½ã§ã½ããã¦ã§ã¢ãå¤æ´ãããã¨ãã§ããã»ãã®ãããã種é¡ã®ä¸å¿«ãå°å
¥ã§ãã¾ãã</p></li>
+<li><p class="inline-block">ãªã¼ã¦ã§ã«ã®èªè
ã«ã¨ã£ã¦ããã§ãä¸ååãªå
´åã«ã¯ãä¸è½ããã¯ãã¢ããããAmazonã¯é
éæä½ã§ã½ããã¦ã§ã¢ãå¤æ´ãããã¨ãã§ããã»ãã®ãããã種é¡ã®ä¸å¿«ãå°å
¥ã§ãã¾ãã</p></li>
</ul>
<p>Amazonã®é»åæ¸ç±ã®é
å¸ã¯æå§çã§ãããã¾ããã¦ã¼ã¶ãåå®ããã¦ã¼ã¶ãå
¥æããæ¸ç±ãè¨é²ãã¾ããã¦ã¼ã¶ãå社ä¼çãªå¥ç´ã«åæããä»äººã¨ã³ãã¼ãå
±æããªãã¨è¦è«ããã¾ãããããã®ãããªå¥ç´ã«åæããã®ã§ããã°ãããéªæªã§ãªãã®ã¯å¥ç´ã«åæãããããã«ããã³ãã¼ãå
±æãããã¨ã
ã¨ããããã®è¯å¿ã¯è¨ãã¾ããããããªãããå
¨é¨ãããã®ã¯ãæåãããããã¯åæããªãã¹ãã§ããã§ãããããããã¯ãããã£ãå¥ç´ã«åæãããã¨ãæå¦ãã¾ããå¥ç´ããã½ããã¦ã§ã¢ãé»åæ¸ç±ãé³æ¥½ãããã¯ã»ãã®ãã®ãä½ã§ãã£ã¦ãã</p>
@@ -191,6 +266,7 @@
href="http://www.fsf.org/associate">FSFã«åå
ãã¦</a>ããããã¡ã®ä»äºã«ä¸è¬çã«æ¯æ´ã§ãã¾ãã<a
href="/help/help.html">ããããã¡ã®ä»äºã«åå
ããæ¹æ³ã®ãªã¹ã</a>ãããã¾ãã
</p>
+</div>
<h3 id="References">åèæç®</h3>
@@ -212,12 +288,7 @@
href="https://web.archive.org/web/20151113122141/http://public-domain.org/">ãããªãã¯ãã¡ã¤ã³é£å</a>—èä½æ¨©ã¨ç¹è¨±ã®æ¨©åã®éå°ãªæ¡å¤§ã«æµæããæ¹éã転æããããã¨ããå£ä½ã</li>
</ul>
-<hr />
-<blockquote id="fsfs"><p class="big">ãã®å°è«ã¯<a
-href="http://shop.fsf.org/product/free-software-free-society/"><cite>èªç±ã½ããã¦ã§ã¢ãèªç±ãªç¤¾ä¼:
-ãªãã£ã¼ãã»Mã»ã¹ãã¼ã«ãã³å°è«é¸é</cite></a>ã«åé²ãããåºçããã¾ããã</p></blockquote>
-
-<h5>ãã®ä»ã®èªã¿ãã®</h5>
+<h4>ãã®ä»ã®èªã¿ãã®</h4>
<ul>
<li><a
href="/philosophy/philosophy.html">GNUããã¸ã§ã¯ãã®ç念</a></li>
@@ -225,6 +296,12 @@
href="http://www.computerworld.com/s/article/2596679/networking/copyprotection--just-say-no.html"
id="copy-protection">èä½æ¨©ä¿è·: åã«ãã¼ã¨è¨ãã</a>ãComputer
Worldèªã«æ²è¼ã</li>
</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">ãã®å°è«ã¯<a
+href="http://shop.fsf.org/product/free-software-free-society/"><cite>èªç±ã½ããã¦ã§ã¢ãèªç±ãªç¤¾ä¼:
+ãªãã£ã¼ãã»Mã»ã¹ãã¼ã«ãã³å°è«é¸é</cite></a>ã«åé²ãããåºçããã¾ããã</p></blockquote>
<div class="translators-notes">
@@ -305,7 +382,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2016/10/31 04:28:15 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: right-to-read.ru.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.ru.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- right-to-read.ru.html 18 Oct 2016 16:29:49 -0000 1.39
+++ right-to-read.ru.html 6 Nov 2016 21:28:14 -0000 1.40
@@ -6,30 +6,61 @@
<!-- This file is automatically generated by GNUnited Nations! -->
<title>ÐÑаво пÑоÑеÑÑÑ - ÐÑÐ¾ÐµÐºÑ GNU - Фонд
Ñвободного пÑогÑаммного обеÑпеÑениÑ</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns >
+ p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
-->
</style>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.ru.html" -->
-<h2>ÐÑаво пÑоÑеÑÑÑ</h2>
+<h2 class="center">ÐÑаво пÑоÑеÑÑÑ</h2>
-<p>
+<p class="byline center">
<a href="http://www.stallman.org/"><strong>РиÑаÑд
СÑолмен</strong></a></p>
-
-<p>
+<p class="center">
<em>ÐÑа ÑÑаÑÑÑ Ð¿Ð¾ÑвилаÑÑ Ð² ÑевÑалÑÑком
(1997 года) вÑпÑÑке
<cite>Communications of the ACM</cite> (Ñом 40, Ð½Ð¾Ð¼ÐµÑ 2).</em></p>
-<hr />
+<hr class="thin" />
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
Ðз <cite>ÐоÑоги к ТиÑ
о</cite>, ÑбоÑника
ÑÑаÑей о ÑобÑÑиÑÑ
, пÑедÑеÑÑвовавÑиÑ
ÐÑнной ÑеволÑÑии, опÑбликованного в
ÐÑна-СиÑи в 2096 годÑ.
</p></blockquote>
+<div class="columns">
<p>
ÐÐ»Ñ Ðана Ð¥eлбеÑÑа доÑога к ТиÑ
о наÑалаÑÑ Ð²
ÑÑилиÑе — когда
ÐелиÑÑа ÐÐµÐ½Ñ Ð¿Ð¾Ð¿ÑоÑила одолжиÑÑ ÐµÐ¹ его
компÑÑÑеÑ. Ðе компÑÑÑÐµÑ ÑломалÑÑ, и
@@ -67,7 +98,10 @@
ÑÑаÑÑи; поÑколÑÐºÑ Ðан меÑил в ÑÑенÑе, он
мог надеÑÑÑÑÑ, ÑÑо его ÑобÑÑвеннÑе
наÑÑнÑе ÑÑаÑÑи, еÑли на ниÑ
бÑдÑÑ ÑаÑÑо
ÑÑÑлаÑÑÑÑ, пÑинеÑÑÑ Ð´Ð¾ÑÑаÑоÑно
денег, ÑÑÐ¾Ð±Ñ Ð²ÐµÑнÑÑÑ Ð´Ð¾Ð»Ð³.)</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
ÐпоÑледÑÑвии Ðан Ñзнал, ÑÑо бÑло вÑемÑ,
когда лÑбой мог зайÑи в библиоÑÐµÐºÑ Ð¸
поÑиÑаÑÑ ÑÑаÑÑи в жÑÑналаÑ
и даже книги, и
за ÑÑо не пÑиÑ
одилоÑÑ
@@ -111,7 +145,10 @@
ÑÑÑановиÑÑ, даже еÑли они Ñ ÑÐµÐ±Ñ Ð±Ñли, еÑли
ÑÑ Ð½Ðµ знал паÑÐ¾Ð»Ñ Ð°Ð´Ð¼Ð¸Ð½Ð¸ÑÑÑаÑоÑа
Ð´Ð»Ñ Ñвоего компÑÑÑеÑа. Рего ÑÑ Ð½Ðµ Ñзнал бÑ
ни Ð¾Ñ Ð¤ÐÐ , ни Ð¾Ñ ÑлÑжбÑ
поддеÑжки Microsoft.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Ðан пÑиÑел к заклÑÑениÑ, ÑÑо он пÑоÑÑо не
мог одолжиÑÑ Ñвой компÑÑÑеÑ
ÐелиÑÑе. Ðо он не мог оÑказаÑÑ ÐµÐ¹ в помоÑи,
поÑÐ¾Ð¼Ñ ÑÑо он лÑбил ее. ÐаждÑй
@@ -146,7 +183,10 @@
полÑзоваÑÑÑÑ ÐºÐ¾Ð¼Ð¿ÑÑÑеÑами. Ðо ÑÑого
ÑÑебнÑе Ð·Ð°Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´Ñ
одили к диÑÑиплине
ÑÑÑденÑов по-дÑÑгомÑ: они наказÑвали за Ñо,
ÑÑо бÑло вÑедно, а не за Ñо, ÑÑо
пÑоÑÑо вÑзÑвало подозÑениÑ.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
ÐелиÑÑа не донеÑла на Ðана в SPA. Ðго ÑеÑение
помоÑÑ ÐµÐ¹ пÑивело к ÑомÑ, ÑÑо
они поженилиÑÑ, а Ñакже поÑÑавило пеÑед
ними вопÑÐ¾Ñ Ð¾ Ñом, ÑÑо им в деÑÑÑве
@@ -156,6 +196,7 @@
лÑдей, коÑоÑÑе Ñоже ÑлеÑели ÑÑда, ÑÑобÑ
длиннÑе ÑÑки SPA не могли иÑ
доÑÑаÑÑ. Ðогда в 2062 Ð³Ð¾Ð´Ñ Ð½Ð°ÑалоÑÑ
воÑÑÑание в ТиÑ
о, вÑеобÑее пÑаво
пÑоÑеÑÑÑ Ð±ÑÑÑÑо ÑÑало одной из его
оÑновнÑÑ
Ñелей.</p>
+</div>
<div class="announcement">
<blockquote>
@@ -167,17 +208,23 @@
<div id="AuthorsNote">
<h3>ÐÑимеÑÐ°Ð½Ð¸Ñ Ð°Ð²ÑоÑа</h3>
-<ul>
-<li>ÐÑÐ¾Ñ ÑаÑÑказ — пÑедположиÑелÑно
ÑÑаÑÑÑ Ð¿Ð¾ иÑÑоÑии, напиÑÐ°Ð½Ð½Ð°Ñ Ð²
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>ÐÑÐ¾Ñ ÑаÑÑказ — пÑедположиÑелÑно
ÑÑаÑÑÑ Ð¿Ð¾ иÑÑоÑии, напиÑÐ°Ð½Ð½Ð°Ñ Ð²
бÑдÑÑем кем-Ñо дÑÑгим и опиÑÑваÑÑаÑ
молодоÑÑÑ Ðана ХелбеÑÑа в обÑеÑÑве
ÑгнеÑениÑ, ÑÑоÑмиÑованном ÑемнÑми Ñилами,
коÑоÑÑе ÑпоÑÑеблÑÑÑ Ñлово
“пиÑає в пÑопаганде. СÑаÑÑÑ
полÑзÑеÑÑÑ Ð²ÑÑажениÑми ÑÑого
обÑеÑÑва. Я попÑÑалÑÑ ÑазвиÑÑ Ð¼ÑÑлÑ, ÑÑобÑ
ÑÑо вÑглÑдело еÑе более
жеÑÑко. См. “<a
href="/philosophy/words-to-avoid.html#Piracy">пиÑаÑÑÑво</a>”.
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>ÐомпÑÑÑеÑнÑе огÑаниÑÐµÐ½Ð¸Ñ Ð½Ð° пеÑедаÑÑ
или ÑÑение книг (и дÑÑгиÑ
видов
опÑбликованнÑÑ
ÑабоÑ) извеÑÑÐ½Ñ ÐºÐ°Ðº DRM, ÑÑо
ÑокÑаÑение “<span
lang="en" xml:lang="en">Digital Restrictions Management</span>
(ÑиÑÑовое
@@ -185,18 +232,23 @@
пÑогÑаммного обеÑпеÑÐµÐ½Ð¸Ñ Ð¾Ñганизовал
ÐºÐ°Ð¼Ð¿Ð°Ð½Ð¸Ñ <a
href="http://DefectiveByDesign.org">ÐеÑÐµÐºÑ Ð³Ð°ÑанÑиÑован</a>.
ÐÑ Ð¿ÑоÑим Ð²Ð°Ñ Ð¾
поддеÑжке.</p>
-</li>
-<li>
<p>Фонд ÑлекÑÑоннÑÑ
ÑÑбежей, оÑделÑнаÑ
оÑганизаÑиÑ, не ÑвÑÐ·Ð°Ð½Ð½Ð°Ñ Ñ Ð¤Ð¾Ð½Ð´Ð¾Ð¼
Ñвободного пÑогÑаммного обеÑпеÑениÑ,
Ñакже вÑÑÑÑÐ¿Ð°ÐµÑ Ð¿ÑоÑив ÑиÑÑового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>СледÑÑÑее пÑимеÑание Ñо вÑемени пеÑвой
пÑбликаÑии ÑаÑÑказа неÑколÑко Ñаз
обновлÑлоÑÑ.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns">
<p>
ÐиÑва за пÑаво пÑоÑеÑÑÑ Ñже идеÑ. ХоÑÑ,
возможно, поÑÑебÑеÑÑÑ 50 леÑ
Ð´Ð»Ñ Ñого, ÑÑÐ¾Ð±Ñ Ð½Ð°Ñи пÑежние ÑÐ²Ð¾Ð±Ð¾Ð´Ñ ÑÑли в
небÑÑие, болÑÑинÑÑво конкÑеÑнÑÑ
@@ -233,8 +285,13 @@
Ðаже ÐонÑоÑÑиÑм ÐÑемиÑной паÑÑÐ¸Ð½Ñ Ð¿Ð¾Ð¿Ð°Ð» в
ÑеÑи индÑÑÑÑии авÑоÑÑкого пÑава;
он движеÑÑÑ Ðº одобÑÐµÐ½Ð¸Ñ ÑиÑÑÐµÐ¼Ñ ÑиÑÑового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми как
оÑиÑиалÑной ÑаÑÑи ÑпеÑиÑикаÑий ÐÑемиÑной
паÑÑинÑ.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
РнеÑвободнÑÑ
пÑогÑаммаÑ
заÑаÑÑÑÑ Ð±ÑваÑÑ <a
href="/proprietary/">ÑазнообÑазнÑе неÑпÑаведливÑе
оÑобенноÑÑи</a>, ÑÑо
подводÑÑ Ðº заклÑÑÐµÐ½Ð¸Ñ Ð¾ Ñом, ÑÑо <a
@@ -242,7 +299,7 @@
пÑогÑамме никогда нелÑÐ·Ñ Ð´Ð¾Ð²ÐµÑÑÑÑ</a>. ÐÑ
наÑÑаиваем иÑклÑÑиÑелÑно на
ÑвободнÑÑ
пÑогÑаммаÑ
и оÑвеÑгаем
неÑвободнÑе.</p>
-<p>
+<p class="inline-block">
ÐÑноÑиÑелÑно Windows Vista Microsoft пÑизнала, ÑÑо в
ÑиÑÑÐµÐ¼Ñ Ð²ÑÑÑоена
лазейка: Microsoft Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð»ÑзоваÑÑÑÑ ÐµÑ, ÑÑобÑ
пÑинÑдиÑелÑно ÑÑÑанавливаÑÑ
пÑогÑаммнÑе “обновлениє, даже еÑли
полÑзоваÑÐµÐ»Ñ ÑÑиÑÐ°ÐµÑ Ð¸Ñ
@@ -251,7 +308,12 @@
ÑÑÑÑойÑÑва. Vista зажимала полÑзоваÑелей
главнÑм обÑазом Ð´Ð»Ñ Ñого, ÑÑобÑ
навÑзаÑÑ ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми, Ñ ÐºÐ¾ÑоÑÑм полÑзоваÑели не
ÑмогÑÑ
ÑпÑавиÑÑÑÑ. Windows 10, конеÑно, не лÑÑÑе.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
Ðдна из идей ÑаÑÑказа не пÑедлагалаÑÑ Ð²
ÑеалÑноÑÑи до 2002 года. ÐÑо
Ð¸Ð´ÐµÑ Ð¾ Ñом, ÑÑо ФÐРи Microsoft бÑдÑÑ Ñ
ÑаниÑÑ
паÑоли ÑиÑÑемного
@@ -283,7 +345,12 @@
еÑÑÑ ÑолÑко клÑÑ Microsoft, и Ñо, Ð¼Ð¾Ð¶ÐµÑ Ð»Ð¸
Ð²Ð»Ð°Ð´ÐµÐ»ÐµÑ Ð¼Ð°ÑÐ¸Ð½Ñ ÑÑÑановиÑÑ Ð»ÑбÑÑ
дÑÑгÑÑ Ð¾Ð¿ÐµÑаÑионнÑÑ ÑиÑÑÐµÐ¼Ñ (ÑакÑÑ ÐºÐ°Ðº
GNU/Linux), опÑеделÑÐµÑ Microsoft. ÐÑ
назÑваем ÑÑо <em>огÑаниÑенной
загÑÑзкой</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
Ð 1997 годÑ, когда ÑÑÐ¾Ñ ÑаÑÑказ бÑл
впеÑвÑе опÑбликован, SPA ÑгÑожала
мелким опеÑаÑоÑам ÑвÑзи, пÑедоÑÑавлÑвÑим
доÑÑÑп в ÐнÑеÑнеÑ, ÑÑебÑÑ, ÑÑобÑ
@@ -304,7 +371,12 @@
ÑоÑÑÑдников и знакомÑÑ
. Ð Ñ
оде кампании
ÑеÑÑоÑа, пÑоводивÑейÑÑ BSA в
ÐÑгенÑине в 2001 годÑ, вÑдвигалиÑÑ Ñлегка
пÑикÑÑÑÑе ÑгÑÐ¾Ð·Ñ Ð½Ð°ÑÐ¸Ð»Ð¸Ñ Ð²
ÑÑÑÑме над лÑдÑми, обменивавÑимиÑÑ
пÑогÑаммами.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width">
<p>
ÐÑавила безопаÑноÑÑи ÑÑебного заведениÑ,
опиÑаннÑе вÑÑе, не
вÑдÑманÑ. ÐапÑимеÑ, компÑÑÑÐµÑ Ð¾Ð´Ð½Ð¾Ð³Ð¾ из
ÑнивеÑÑиÑеÑов в Ñайоне Чикаго
@@ -330,12 +402,15 @@
ÐÑо инÑеÑеÑнÑй подÑ
од к ЧеÑвеÑÑой
попÑавке: оказÑваÑÑ Ð½Ð° вÑеÑ
подÑÑд
давление, ÑÑÐ¾Ð±Ñ Ð¾Ð½Ð¸ заÑанее ÑоглаÑалиÑÑ
оÑказаÑÑÑÑ Ð¾Ñ ÑвоиÑ
пÑав,
пÑедоÑÑавлÑемÑÑ
ÑÑой попÑавкой.</p>
+</div>
</li>
</ul>
+<div class="column-limit"></div>
</div>
<h3 id="BadNews">ÐлоÑ
ие новоÑÑи</h3>
+<div class="columns">
<p>
ÐиÑÐ²Ñ Ð·Ð° пÑаво пÑоÑеÑÑÑ Ð¼Ñ Ð¿Ð¾ÐºÐ°
пÑоигÑÑваем. ÐÑаг оÑганизован, а
Ð¼Ñ — неÑ.
@@ -359,11 +434,11 @@
<li><p>Рнем еÑÑÑ ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми, пÑедназнаÑенное Ð´Ð»Ñ Ñого,
ÑÑÐ¾Ð±Ñ Ð½Ðµ даÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑм обмениваÑÑÑÑ
копиÑми.</p></li>
-<li><p>Рнем еÑÑÑ Ð»Ð°Ð·ÐµÐ¹ÐºÐ°, Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÐºÐ¾ÑоÑой
Amazon Ð¼Ð¾Ð¶ÐµÑ ÑÑеÑеÑÑ Ð»ÑбÑÑ ÐºÐ½Ð¸Ð³Ñ Ð¿Ð¾
+<li><p class="inline-block">Рнем еÑÑÑ Ð»Ð°Ð·ÐµÐ¹ÐºÐ°, Ñ
помоÑÑÑ ÐºÐ¾ÑоÑой Amazon Ð¼Ð¾Ð¶ÐµÑ ÑÑеÑеÑÑ Ð»ÑбÑÑ
ÐºÐ½Ð¸Ð³Ñ Ð¿Ð¾
ÑеÑи. Ð 2009 Ð³Ð¾Ð´Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑÑеÑла
ÑÑÑÑÑи копий <cite>1984</cite>
ÐжоÑджа ÐÑÑÑлла.</p></li>
-<li><p>ÐÑли ÑÑо еÑе не доÑÑаÑоÑно
по-оÑÑÑлловÑки, Ñам еÑÑÑ ÑнивеÑÑалÑнаÑ
закладка,
+<li><p class="inline-block">ÐÑли ÑÑо еÑе не доÑÑаÑоÑно
по-оÑÑÑлловÑки, Ñам еÑÑÑ ÑнивеÑÑалÑнаÑ
закладка,
Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÐºÐ¾ÑоÑой Amazon Ð¼Ð¾Ð¶ÐµÑ Ð¸Ð·Ð¼ÐµÐ½ÑÑÑ
пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾ ÑеÑи, Ð²Ð²Ð¾Ð´Ñ ÐºÐ°ÐºÐ¾Ð³Ð¾
Ñгодно Ñода гадоÑÑи.</p></li>
</ul>
@@ -385,6 +460,7 @@
гаÑанÑиÑован</a>”, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð¼Ð¾ÑÑ. ÐÑÑÑ
Ñакже <a
href="/help/help.html">ÑпиÑок ÑпоÑобов пÑинÑÑÑ
ÑÑаÑÑие в наÑей ÑабоÑе</a>.
</p>
+</div>
<h3 id="References">СÑÑлки</h3>
@@ -415,13 +491,7 @@
пÑедоÑвÑаÑение и оÑмена ÑÑезмеÑного
ÑÑÐ¸Ð»ÐµÐ½Ð¸Ñ Ð°Ð²ÑоÑÑкого пÑава и паÑенÑов.</li>
</ul>
-<hr />
-<blockquote id="fsfs"><p class="big">ÐÑÐ¾Ñ Ð¾ÑеÑк
пÑбликÑеÑÑÑ Ð² ÑбоÑнике <a
-href="http://shop.fsf.org/product/free-software-free-society/"><cite>СвободнÑе
-пÑогÑаммÑ, Ñвободное обÑеÑÑво: избÑаннÑе
оÑеÑки РиÑаÑда
-Ð. СÑолмена</cite></a></p></blockquote>
-
-<h5>ÐÑÑгие ÑекÑÑÑ Ð¿Ð¾ Ñеме</h5>
+<h4>ÐÑÑгие ÑекÑÑÑ Ð¿Ð¾ Ñеме</h4>
<ul>
<li><a href="/philosophy/philosophy.html">ФилоÑоÑиÑ
пÑоекÑа GNU</a></li>
@@ -430,6 +500,13 @@
id="copy-protection">ÐаÑиÑа Ð¾Ñ ÐºÐ¾Ð¿Ð¸ÑованиÑ: пÑоÑÑо
ÑкажиÑе
“неє</a>, опÑбликовано в
“ÐомпÑÑÑÐµÑ ÑоÑлд”.</li>
</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">ÐÑÐ¾Ñ Ð¾ÑеÑк
пÑбликÑеÑÑÑ Ð² ÑбоÑнике <a
+href="http://shop.fsf.org/product/free-software-free-society/"><cite>СвободнÑе
+пÑогÑаммÑ, Ñвободное обÑеÑÑво: избÑаннÑе
оÑеÑки РиÑаÑда
+Ð. СÑолмена</cite></a></p></blockquote>
<div class="translators-notes">
@@ -508,7 +585,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2016/10/18 16:29:49 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: right-to-read.uk.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.uk.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- right-to-read.uk.html 31 Oct 2016 22:57:28 -0000 1.14
+++ right-to-read.uk.html 6 Nov 2016 21:28:14 -0000 1.15
@@ -3,7 +3,7 @@
https://www.gnu.org/philosophy/po/right-to-read.uk.po</a>'
--><!--#set var="ORIGINAL_FILE" value="/philosophy/right-to-read.html"
--><!--#set var="DIFF_FILE" value="/philosophy/po/right-to-read.uk-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2016-09-01" --><!--#set
var="ENGLISH_PAGE" value="/philosophy/right-to-read.en.html" -->
+ --><!--#set var="OUTDATED_SINCE" value="2016-09-01" -->
<!--#include virtual="/server/header.uk.html" -->
<!-- Parent-Version: 1.79 -->
@@ -496,7 +496,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðновлено:
-$Date: 2016/10/31 22:57:28 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: surveillance-vs-democracy.es.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.es.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- surveillance-vs-democracy.es.html 2 Nov 2016 12:57:37 -0000 1.33
+++ surveillance-vs-democracy.es.html 6 Nov 2016 21:28:14 -0000 1.34
@@ -6,20 +6,33 @@
<!-- This file is automatically generated by GNUnited Nations! -->
<title>¿Cuánta vigilancia puede soportar la democracia? - Proyecto GNU - Free
Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+-->
+</style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.es.html" -->
-<h2>¿Cuánta vigilancia puede soportar la democracia?</h2>
+<h2 class="center">¿Cuánta vigilancia puede soportar la democracia?</h2>
-<p>por <a href="http://www.stallman.org/">Richard Stallman</a></p>
+<p class="byline center">por <a href="http://www.stallman.org/">Richard
Stallman</a></p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>Una versión de este artÃculo se publicó por primera vez en
octubre de 2013,
+<blockquote class="center"><p>Una versión de este artÃculo se publicó por
primera vez en octubre de 2013,
en Wired.</p></blockquote>
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Viñeta de un perro preguntándose por
los tres anuncios que aparecieron en la
pantalla de su ordenador..." /></a>
@@ -36,7 +49,8 @@
vigilancia comienza a interferir con el funcionamiento de la democracia,
cuando existe la posibilidad de que los denunciantes (como Snowden) sean
atrapados.</p>
-
+</div>
+<div class="columns" style="clear:both">
<p>Frente a los secretos del gobierno, nosotros, el pueblo, dependemos de los
denunciantes para que <a
href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">nos informen de
@@ -68,9 +82,11 @@
virtuales. Esto no será suficiente para proteger al denunciante si «capturar
al denunciante» es una justificación para acceder a los datos necesarios
para identificarlo. Tenemos que ir más allá.</p>
+</div>
-<h3>El lÃmite máximo de la vigilancia en una democracia</h3>
+<h3 class="subheader" style="clear: both">El lÃmite máximo de la vigilancia
en una democracia</h3>
+<div class="columns">
<p>Si los denunciantes no se atreven a revelar crÃmenes y mentiras, perdemos
lo
último que nos queda de control efectivo sobre nuestro gobierno e
instituciones. Por esta razón, la vigilancia que permite al Estado averiguar
@@ -103,9 +119,11 @@
entre ellos. El punto en el que la vigilancia es excesiva se alcanza cuando
el Estado puede averiguar quién se comunicó con un periodista o un disidente
conocidos.</p>
+</div>
-<h3>Una vez que se haya obtenido la información, será usada
incorrectamente</h3>
+<h3 class="subheader">Una vez que se haya obtenido la información, será
usada incorrectamente</h3>
+<div class="columns">
<p>Cuando la gente reconoce que el nivel general de vigilancia es excesivo, la
respuesta inmediata consiste en proponer lÃmites al acceso a los datos
recopilados. Eso suena bien, pero no solucionará el problema en lo más
@@ -161,9 +179,11 @@
garantizar el normal funcionamiento de la actividad periodÃstica y de la
democracia, debemos limitar la acumulación de datos que son de fácil acceso
para el Estado.</p>
+</div>
-<h3>Para que la protección de la privacidad sea robusta, debe ser
técnica</h3>
+<h3 class="subheader">Para que la protección de la privacidad sea robusta,
debe ser técnica</h3>
+<div class="columns">
<p>La <cite>Electronic Frontier Foundation</cite> y otras organizaciones
proponen una serie de principios jurÃdicos diseñados para <a
href="https://en.necessaryandproportionate.org/text">impedir los abusos de
@@ -193,9 +213,11 @@
no sea liberal tendrÃa que implementar la vigilancia desde cero, y recoger
los datos solo a partir de esa fecha. En cuanto a suspender o ignorar
momentáneamente esta ley, la idea apenas tendrÃa sentido.</p>
+</div>
-<h3>En primer lugar, no sea incauto</h3>
+<h3 class="subheader">En primer lugar, no sea incauto</h3>
+<div class="columns">
<p>Para preservar la privacidad, no debe descuidarla: es usted mismo el primero
que tiene que salvaguardar su propia privacidad. Evite identificarse en los
sitios web, acceda a los sitios con Tor y utilice navegadores que bloqueen
@@ -240,9 +262,11 @@
desplazamientos, pero no todos. Está claro que la mejor solución es lograr
que todos estos sistemas dejen de vigilar a las personas que no sean
legÃtimamente sospechosas.</p>
+</div>
-<h3>Debemos diseñar todos los sistemas de modo que respeten la privacidad</h3>
+<h3 class="subheader">Debemos diseñar todos los sistemas de modo que respeten
la privacidad</h3>
+<div class="columns">
<p>Si no deseamos vivir en una sociedad de vigilancia total, debemos considerar
la vigilancia como un tipo de contaminación social y limitar el impacto que
cada nuevo sistema digital podrÃa tener sobre la vigilancia, de la misma
@@ -262,9 +286,11 @@
<p>Debemos incorporar la privacidad en el diseño de todos nuestros sistemas
digitales.</p>
+</div>
-<h3>Remedio para la recolección de datos: dejarlos dispersos</h3>
+<h3 class="subheader">Remedio para la recolección de datos: dejarlos
dispersos</h3>
+<div class="columns">
<p>Una manera de hacer que el monitoreo no invada la privacidad es <a
name="dispersal">mantener los datos dispersos y de difÃcil acceso</a>. Las
viejas cámaras de seguridad no representaban ninguna amenaza para la
@@ -300,9 +326,11 @@
calle. Toda cámara dirigida por alguien hacia el espacio privado de otra
persona constituye una violación de la privacidad, pero esa es otra
cuestión.</p>
+</div>
-<h3 id="digitalcash">Remedio para la vigilancia del comercio en Internet</h3>
+<h3 id="digitalcash" class="subheader">Remedio para la vigilancia del comercio
en Internet</h3>
+<div class="columns">
<p>La mayor parte de los datos recogidos proviene de la actividad digital de
las personas. Normalmente los datos son recolectados primero por
compañÃas. Pero cuando lo que está en juego es la privacidad y la
@@ -361,9 +389,11 @@
de los usuarios. Un sistema anónimo de pago terminarÃa con este problema:
una falla de seguridad en el sitio no puede hacer daño si el sitio no sabe
nada de nosotros.</p>
+</div>
-<h3>Remedio para la vigilancia en los viajes</h3>
+<h3 class="subheader">Remedio para la vigilancia en los viajes</h3>
+<div class="columns">
<p>Debemos hacer que los pagos mediante telepeaje sean anónimos (con dinero
digital, por ejemplo). Los sistemas de reconocimiento de matrÃculas
reconocen todas las placas y <a
@@ -425,9 +455,11 @@
vehÃculo demora demasiado, la estación donde inicialmente se retiró puede
informar a la oficina principal, y en ese caso podrÃa también enviar
inmediatamente los datos del prestatario.</p>
+</div>
-<h3>Remedio para los expedientes de comunicaciones</h3>
+<h3 class="subheader">Remedio para los expedientes de comunicaciones</h3>
+<div class="columns">
<p>Los proveedores del servicio de Internet <abbr title="Internet Service
Provider">ISP</abbr> y las compañÃas telefónicas conservan mucha
información
de los contactos de sus usuarios (navegación, llamadas telefónicas,
@@ -472,9 +504,11 @@
y mi servicio sabrÃa únicamente que he recibido un correo que proviene de su
servicio, pero serÃa difÃcil determinar que usted es el remitente y yo el
destinatario.</p>
+</div>
-<h3>Pero algo de vigilancia es necesaria</h3>
+<h3 class="subheader">Pero algo de vigilancia es necesaria</h3>
+<div class="columns">
<p>Para que el Estado pueda encontrar a los delincuentes tiene que tener la
posibilidad de investigar delitos especÃficos, o sospechas de presuntos
delitos especÃficos, por orden judicial. Con Internet, el poder de pinchar
@@ -511,9 +545,10 @@
<p>De todos modos, el periodismo debe ser protegido de la vigilancia incluso
cuando se lleva a cabo como parte de una actividad empresarial.</p>
+</div>
+<div class="column-limit"></div>
-<hr />
-
+<div class="reduced-width">
<p>La tecnologÃa digital ha ocasionado un inmenso incremento de los niveles de
vigilancia sobre nuestros movimientos, acciones y comunicaciones. Ha ido
mucho más allá de lo que experimentamos en la década de los noventa, y <a
@@ -536,6 +571,8 @@
lo fueron las poblaciones de la Unión Soviética y Alemania del Este, debemos
revertir ese incremento. Para ello es necesario detener la recopilación de
grandes cantidades de datos sobre los ciudadanos.</p>
+</div>
+</div>
<div class="translators-notes">
@@ -611,7 +648,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2016/11/02 12:57:37 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: surveillance-vs-democracy.fr.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.fr.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- surveillance-vs-democracy.fr.html 22 Oct 2016 19:28:26 -0000 1.35
+++ surveillance-vs-democracy.fr.html 6 Nov 2016 21:28:14 -0000 1.36
@@ -6,20 +6,33 @@
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Quel niveau de surveillance la démocratie peut-elle endurer ? -
Projet GNU -
Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+-->
+</style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.fr.html" -->
-<h2>Quel niveau de surveillance la démocratie peut-elle endurer ?</h2>
+<h2 class="center">Quel niveau de surveillance la démocratie peut-elle
endurer ?</h2>
-<p>par <a href="http://www.stallman.org/">Richard Stallman</a></p>
+<p class="byline center">par <a href="http://www.stallman.org/">Richard
Stallman</a></p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>Une version de cet article a été initialement publiée dans
Wired en octobre
+<blockquote class="center"><p>Une version de cet article a été initialement
publiée dans Wired en octobre
2013.</p></blockquote>
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Dessin d'un chien que trois pop-ups
publicitaires sur son écran d'ordinateur
rendent perplexe..." /></a>
@@ -36,7 +49,8 @@
niveau au delà duquel la surveillance commence à interférer avec le
fonctionnement de la démocratie : lorsque des lanceurs d'alerte comme
Snowden sont susceptibles d'être arrêtés.</p>
-
+</div>
+<div class="columns" style="clear:both">
<p>Face à la culture du secret des gouvernements, nous, le peuple,<a
id="TransNote1-rev" href="#TransNote1"><sup>1</sup></a> devons compter sur
les lanceurs d'alerte pour <a
@@ -71,9 +85,11 @@
d'alerte si « capturer le lanceur d'alerte » est un motif valable pour
accéder à des données permettant de l'identifier. Nous devons aller plus
loin encore.</p>
+</div>
-<h3>Le niveau de surveillance à ne pas dépasser dans une démocratie</h3>
+<h3 class="subheader" style="clear: both">Le niveau de surveillance à ne pas
dépasser dans une démocratie</h3>
+<div class="columns">
<p>Si les lanceurs d'alerte n'osent pas révéler les crimes, délits et
mensonges, nous perdons le dernier lambeau de contrôle réel qui nous reste
sur nos gouvernements et institutions. C'est pourquoi une surveillance qui
@@ -106,9 +122,11 @@
pouvait y avoir des terroristes parmi eux. La surveillance devient trop
importante quand l'Ãtat peut trouver qui a parlé à une personne connue comme
journaliste ou comme opposant.</p>
+</div>
-<h3>L'information, une fois collectée, sera utilisée à de mauvaises
fins</h3>
+<h3 class="subheader">L'information, une fois collectée, sera utilisée à de
mauvaises fins</h3>
+<div class="columns">
<p>Quand les gens reconnaissent que la surveillance généralisée atteint un
niveau trop élevé, la première réponse est de proposer d'encadrer l'accès
aux données accumulées. Cela semble sage, mais cela ne va pas corriger le
@@ -166,9 +184,11 @@
personne. Pour mettre le journalisme et la démocratie en sécurité, nous
devons limiter l'accumulation des données qui sont facilement accessibles Ã
l'Ãtat.</p>
+</div>
-<h3>Une protection solide de la vie privée doit être technique</h3>
+<h3 class="subheader">Une protection solide de la vie privée doit être
technique</h3>
+<div class="columns">
<p>L'Electronic Frontier Foundation ainsi que d'autres structures propose un
ensemble de principes juridiques destinés à <a
href="https://fr.necessaryandproportionate.org/content/principes-internationaux-sur-l%E2%80%99application-des-droits-de-l%E2%80%99homme-%C3%A0-la-surveillance-des">
@@ -198,9 +218,11 @@
mettre en place de nouvelles méthodes de surveillance, et recueillerait des
données à partir de ce moment-là seulement. Quant à suspendre cette loi ou
ne pas l'appliquer momentanément, cela n'aurait presque aucun sens.</p>
+</div>
-<h3>En premier lieu, ne soyez pas imprudent</h3>
+<h3 class="subheader">En premier lieu, ne soyez pas imprudent</h3>
+<div class="columns">
<p>Pour conserver une vie privée, il ne faut pas la jeter aux orties : le
premier concerné par la protection de votre vie privée, c'est vous. Ãvitez
de vous identifier sur les sites web, contactez-les avec Tor, et utilisez
@@ -245,9 +267,11 @@
communications et nos mouvements, mais pas tous. Il est évident que la
meilleure solution est d'obliger ces systèmes à cesser de surveiller les
gens qui sont pas légitimement suspects.</p>
+</div>
-<h3>Nous devons intégrer à chaque système le respect de la vie privée</h3>
+<h3 class="subheader">Nous devons intégrer à chaque système le respect de
la vie privée</h3>
+<div class="columns">
<p>Si nous ne voulons pas d'une société de surveillance totale, nous devons
envisager la surveillance comme une sorte de pollution de la société et
limiter l'impact de chaque nouveau système numérique sur la surveillance, de
@@ -267,9 +291,11 @@
<p>Il nous faut intégrer le respect de la vie privée à tous nos systèmes
numériques, dès leur conception.</p>
+</div>
-<h3>Remède à la collecte de données : les garder dispersées</h3>
+<h3 class="subheader">Remède à la collecte de données : les garder
dispersées</h3>
+<div class="columns">
<p>Pour rendre la surveillance possible sans porter atteinte à la vie privée,
l'un des moyens est de <a name="dispersal">conserver les données de manière
dispersée</a> et d'en rendre la consultation malaisée. Les caméras de
@@ -306,9 +332,11 @@
sécurité est dirigée vers l'intérieur d'un magasin ou vers la rue. Toute
caméra pointée par quelqu'un vers l'espace privé de quelqu'un d'autre viole
sa vie privée, mais c'est une autre question.</p>
+</div>
-<h3 id="digitalcash">Remède à la surveillance du commerce sur Internet</h3>
+<h3 id="digitalcash" class="subheader">Remède à la surveillance du commerce
sur Internet</h3>
+<div class="columns">
<p>La collecte de données provient essentiellement des activités numériques
personnelles des gens. D'ordinaire, ces sont d'abord les entreprises qui
recueillent ces données. Mais lorsqu'il est question de menaces pour la vie
@@ -371,9 +399,11 @@
cartes de crédit. Un système de paiement anonyme éliminerait ce danger :
une
faille de sécurité du site ne peut pas vous nuire si le site ne sait rien de
vous.</p>
+</div>
-<h3>Remède à la surveillance des déplacements</h3>
+<h3 class="subheader">Remède à la surveillance des déplacements</h3>
+<div class="columns">
<p>Nous devons convertir la collecte numérique de péage en paiement anonyme
(par l'utilisation de monnaie électronique, par exemple). Les système de
reconnaissance de plaques minéralogiques reconnaissent toutes les plaques,
@@ -433,9 +463,11 @@
le vélo restait « sorti » trop longtemps, la station d'origine pourrait en
informer le siège social et, dans ce cas, lui envoyer immédiatement
l'identité du client.</p>
+</div>
-<h3>Remède aux dossiers sur les communications</h3>
+<h3 class="subheader">Remède aux dossiers sur les communications</h3>
+<div class="columns">
<p>Les fournisseurs de services Internet et les compagnies de téléphone
enregistrent une masse de données sur les contacts de leurs utilisateurs
(navigation, appels téléphoniques, etc.) Dans le cas du téléphone mobile,
<a
@@ -481,9 +513,11 @@
saurait seulement que j'ai reçu un message d'un utilisateur de votre service
de courriel, mais il serait difficile de déterminer que c'était moi le
destinataire.</p>
+</div>
-<h3>Mais un minimum de surveillance est nécessaire.</h3>
+<h3 class="subheader">Mais un minimum de surveillance est nécessaire.</h3>
+<div class="columns">
<p>Pour que l'Ãtat puisse identifier les auteurs de crimes ou délits, il doit
avoir la capacité d'enquêter sur un délit déterminé, commis ou en
préparation, sur ordonnance du tribunal. à l'ère d'Internet, il est naturel
@@ -522,9 +556,10 @@
<p>Cependant, le journalisme doit être protégé contre la surveillance, même
s'il est réalisé dans un cadre commercial.</p>
+</div>
+<div class="column-limit"></div>
-<hr />
-
+<div class="reduced-width">
<p>La technologie numérique a entraîné un accroissement énorme du niveau de
surveillance de nos déplacements, de nos actions et de nos
communications. Ce niveau est bien supérieur à ce que nous avons connu dans
@@ -548,6 +583,8 @@
plus que ne le furent jadis l'Union soviétique et l'Allemagne de l'Est, ils
nous faut inverser cette progression. Cela requiert de mettre fin Ã
l'accumulation en masse de données sur la population.</p>
+</div>
+</div>
<div class="translators-notes">
@@ -644,7 +681,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2016/10/22 19:28:26 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: surveillance-vs-democracy.it.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.it.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- surveillance-vs-democracy.it.html 27 Oct 2016 20:58:40 -0000 1.23
+++ surveillance-vs-democracy.it.html 6 Nov 2016 21:28:14 -0000 1.24
@@ -6,20 +6,33 @@
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Quanta sorveglianza può sostenere una democrazia? - Progetto GNU - Free
Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+-->
+</style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.it.html" -->
-<h2>Quanta sorveglianza può sostenere una democrazia?</h2>
+<h2 class="center">Quanta sorveglianza può sostenere una democrazia?</h2>
-<p>di <a href="http://www.stallman.org/">Richard Stallman</a></p>
+<p class="byline center">di <a href="http://www.stallman.org/">Richard
Stallman</a></p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>La prima versione di questo articolo è stata pubblicata su
Wired nel mese di
+<blockquote class="center"><p>La prima versione di questo articolo è stata
pubblicata su Wired nel mese di
ottobre 2013.</p></blockquote>
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Vignetta: un cane che si sorprende a
vedere comparire tre annunci
pubblicitari sul suo monitor..." /></a>
@@ -35,7 +48,8 @@
oppressione? Ciò accade quando la sorveglianza interferisce con il
funzionamento della democrazia: quando gli informatori (come Snowden)
possono essere scoperti.</p>
-
+</div>
+<div class="columns" style="clear:both">
<p>Di fronte alla segretezza dei governi, dipendiamo dagli informatori per
sapere <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">cosa
fa lo stato</a>. Tuttavia la sorveglianza di oggi minaccia gli informatori,
@@ -61,9 +75,11 @@
consiste nel limitare lâuso da parte del governo dei nostri dossier
virtuali. Ciò non basterà a proteggere gli informatori se âbeccarliâ è
motivo sufficiente a identificarli. Dobbiamo spingerci oltre.</p>
+</div>
-<h3>Il limite massimo di sorveglianza in una democrazia</h3>
+<h3 class="subheader" style="clear: both">Il limite massimo di sorveglianza in
una democrazia</h3>
+<div class="columns">
<p>Se gli informatori non osano svelare menzogne e reati, allora perdiamo
lâultimo briciolo di controllo efficace sui nostri governi e le nostre
istituzioni. Ã per questo che la sorveglianza che permette allo stato di
@@ -93,9 +109,11 @@
terroristi. Il punto in cui la sorveglianza diventa eccessiva è quello in
cui lo stato può scoprire chi ha parlato con un certo giornalista o
dissidente noto.</p>
+</div>
-<h3>Una volta raccolte, le informazioni saranno usate in modi impropri</h3>
+<h3 class="subheader">Una volta raccolte, le informazioni saranno usate in
modi impropri</h3>
+<div class="columns">
<p>Quando ci si accorge che il livello di sorveglianza diffusa è troppo alto,
la prima reazione è quella di proporre dei limiti allâaccesso ai dati
accumulati. Sembra una bella cosa, ma non risolve il problema, neanche
@@ -145,9 +163,11 @@
di una imponente raccolta di informazioni su chiunque. Per mettere al sicuro
il giornalismo e la democrazia, dobbiamo limitare lâaccumulazione di dati
facilmente accessibili allo stato.</p>
+</div>
-<h3>Una forte tutela della privacy devâessere tecnica</h3>
+<h3 class="subheader">Una forte tutela della privacy devâessere tecnica</h3>
+<div class="columns">
<p>La Electronic Frontier Foundation e altre organizzazioni propongono una
serie di principi legali mirati a <a
href="https://en.necessaryandproportionate.org/text">prevenire lâabuso</a>
@@ -175,9 +195,11 @@
istituire la sorveglianza da capo, e raccoglierebbe solo dei dati a partire
da quel momento. Quanto a sospendere o ignorare temporaneamente questa
legge, lâidea sarebbe priva di senso.</p>
+</div>
-<h3>Primo, non essere sciocchi</h3>
+<h3 class="subheader">Primo, non essere sciocchi</h3>
+<div class="columns">
<p>Se si desidera avere privacy non bisogna mai rinunciarvi: la protezione
della privacy dipende innanzitutto da se stessi. Non bisogna fornire i
propri dati a siti web, si deve utilizzare Tor e usare un browser che
@@ -219,9 +241,11 @@
sorvegliano le nostre comunicazioni e spostamenti, ma non tutti. Chiaramente
la migliore soluzione sarebbe che tutti questi sistemi smettessero di
sorvegliare persone non sospette.</p>
+</div>
-<h3>Dobbiamo progettare tutti i sistemi tenendo a mente la privacy</h3>
+<h3 class="subheader">Dobbiamo progettare tutti i sistemi tenendo a mente la
privacy</h3>
+<div class="columns">
<p>Se non vogliamo una società a sorveglianza totale, dobbiamo considerare la
sorveglianza come una sorta dâinquinamento sociale, e limitare lâimpatto di
ogni nuovo sistema digitale proprio come limitiamo lâimpatto ambientale
@@ -240,9 +264,11 @@
<p>Dobbiamo incorporare la privacy in questo modo in tutti i nostri sistemi
digitali.</p>
+</div>
-<h3>Un rimedio alla raccolta dei dati: lasciarli dispersi</h3>
+<h3 class="subheader">Un rimedio alla raccolta dei dati: lasciarli
dispersi</h3>
+<div class="columns">
<p>Un modo per rendere il monitoraggio sicuro dal punto di vista della privacy
è quello di <a name="dispersal">tenere i dati dispersi e rendere scomodo il
loro accesso</a>. Le vecchie telecamere di sicurezza non costituivano una
@@ -274,9 +300,11 @@
di sorveglianza sia puntata verso l'interno di un negozio, o verso la
strada. Qualsiasi telecamera puntata da qualcuno verso lo spazio privato di
qualcun altro viola la privacy, ma questa è un'altra questione.</p>
+</div>
-<h3 id="digitalcash">Un rimedio alla sorveglianza dellâe-commerce</h3>
+<h3 id="digitalcash" class="subheader">Un rimedio alla sorveglianza
dellâe-commerce</h3>
+<div class="columns">
<p>Quasi tutte le raccolte di dati provengono dalle attività degli utenti
stessi. In genere i dati sono raccolti inizialmente dalle società . Ma dal
punto di vista del rischio per la privacy e la democrazia, non fa differenza
@@ -331,9 +359,11 @@
e abusarne. Ciò include i numeri di carte di credito dei clienti. Un sistema
di pagamenti anonimi porrebbe fine a questo rischio: una falla di sicurezza
in un sito non può danneggiarvi se il sito non sa niente di voi.</p>
+</div>
-<h3>Un rimedio alla sorveglianza dei trasporti</h3>
+<h3 class="subheader">Un rimedio alla sorveglianza dei trasporti</h3>
+<div class="columns">
<p>Dobbiamo trasformare la riscossione di pedaggi digitali in pagamento anonimo
(per esempio usando una moneta digitale). I sistemi di riconoscimento targhe
identificano tutte le targhe, e <a
@@ -390,9 +420,11 @@
rimane âfuoriâ troppo a lungo, la stazione in cui è avvenuto il prestito
può
informare la sede centrale; in quel caso potrebbe inviare immediatamente
lâidentità dellâutente.</p>
+</div>
-<h3>Un rimedio ai dossier sulle comunicazioni</h3>
+<h3 class="subheader">Un rimedio ai dossier sulle comunicazioni</h3>
+<div class="columns">
<p>I fornitori di servizi Internet e le compagnie telefoniche conservano grandi
quantità di dati sui contatti dei loro utenti (cronologia di navigazione,
telefonate, etc). Grazie ai cellulari <a
@@ -432,9 +464,11 @@
un utente del servizio utilizzato dall'utente B, e analogamente per l'utente
B, ma sarebbe difficile per chi intercetta capire che le persone A e B si
sono scambiate messaggi.</p>
+</div>
-<h3>Ma una certa dose di sorveglianza è necessaria</h3>
+<h3 class="subheader">Ma una certa dose di sorveglianza è necessaria</h3>
+<div class="columns">
<p>Per poter scovare i criminali, lo stato deve poter indagare su reati
specifici, o sospetti specifici, dietro mandato di un tribunale. Con
Internet il potere dâintercettare conversazioni telefoniche si estende
@@ -469,9 +503,10 @@
<p>Il giornalismo, però, devâessere protetto dalla sorveglianza anche
quando è
condotto nellâambito di unâimpresa.</p>
+</div>
+<div class="column-limit"></div>
-<hr />
-
+<div class="reduced-width">
<p>La tecnologia digitale ha prodotto un enorme aumento del livello di
sorveglianza dei nostri movimenti, delle nostre azioni e comunicazioni. Ã
molto più alto di quello che sperimentavamo negli anni Novanta, e <a
@@ -492,6 +527,8 @@
quanto lo fossero lâUnione sovietica e la Germania dellâEst, dobbiamo
invertire questa tendenza. Ciò richiede lâinterruzione dellâaccumulo di
big
data sui cittadini.</p>
+</div>
+</div>
<div class="translators-notes">
@@ -568,7 +605,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/10/27 20:58:40 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: surveillance-vs-democracy.ja.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.ja.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- surveillance-vs-democracy.ja.html 31 Oct 2016 04:28:15 -0000 1.14
+++ surveillance-vs-democracy.ja.html 6 Nov 2016 21:28:14 -0000 1.15
@@ -5,19 +5,32 @@
<!-- This file is automatically generated by GNUnited Nations! -->
<title>æ°ä¸»ä¸»ç¾©ã¯ã©ããããç£è¦ã«èãå¾ãã? -
GNUããã¸ã§ã¯ã -
ããªã¼ã½ããã¦ã§ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+-->
+</style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.ja.html" -->
-<h2>æ°ä¸»ä¸»ç¾©ã¯ã©ããããç£è¦ã«èãå¾ãã?</h2>
+<h2 class="center">æ°ä¸»ä¸»ç¾©ã¯ã©ããããç£è¦ã«èãå¾ãã?</h2>
-<p><a
href="http://www.stallman.org/">ãªãã£ã¼ãã»ã¹ãã¼ã«ãã³</a>è</p>
+<p class="byline center"><a
href="http://www.stallman.org/">ãªãã£ã¼ãã»ã¹ãã¼ã«ãã³</a>è</p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>ãã®å°è«ã®çã¯æåã«Wiredã§013å¹´10æã«çºè¡¨ããã¾ããã</p></blockquote>
+<blockquote
class="center"><p>ãã®å°è«ã®çã¯æåã«Wiredã§013å¹´10æã«çºè¡¨ããã¾ããã</p></blockquote>
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg"
alt="ã³ã³ãã¥ã¼ã¿ã®ç»é¢ã«ç¾ããä¸ã¤ã®åºåãè¨ãç¬ã®æ¼«ç»..."
/></a>
<p>ãã©ããã£ã¦ãããããç¬ã ã¨ããã£ããã ãã?ã</p>
@@ -26,7 +39,8 @@
<p>ã¨ãã¯ã¼ãã»ã¹ãã¼ãã³ã®æ´é²ã®ãããã§ãããããã¡ã¯ã社ä¼ã«ãããç¾å¨ã®ä¸è¬ç£è¦ã®ã¬ãã«ã¯äººæ¨©ã¨ä¸¡ç«ããªããã¨ãç¥ãã¾ãããåè¡å½ãããã¯ã»ãã§ã®ãåä½å¶ã®äººã
ãæ
å
±æºãããã¦ã¸ã£ã¼ããªã¹ãã¸ç¹°ãè¿ããããã©ã¹ã¡ã³ãã¨åäºè¨´è¿½ã¯ããããè£ä»ãã¦ãã¾ããããããã¡ã¯ä¸è¬ç£è¦ã®ã¬ãã«ãåæ¸ããå¿
è¦ãããã¾ããããã£ããã©ãã¾ã§å¿
è¦ã§ãããã?
ãããè¶ãã¦ã¯ãªããªãã¨ä¿è¨¼ãã¹ã<em>æ大éãèªããããç£è¦ã®ã¬ãã«</em>ã¯ä¸ä½ã©ãã«ããã§ãããã?
(ä»ã®ã¾ã¾ã§ã¯)ããã¯æ°ä¸»ä¸»ç¾©ã®æ©è½ã¨å¹²æ¸ãå§ããç£è¦ã®ã¬ãã«ãè¶ãããã®ã§ã(ã¹ãã¼ãã³ã®ãããª)åçºè
ãæã¾ã£ã¦ãã¾ããããªãã®ã§ãããã</p>
-
+</div>
+<div class="columns" style="clear:both">
<p>æ¿åºã®ç§å¯å³å®ã«å¯¾ãã¦ãããããã¡å¸æ°ã¯<a
href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">å½ãä½ããã¦ããã®ããä¼ãã¦ããã</a>åçºè
ã«ä¾æ ãã¦ãã¾ããããããä»æ¥ã®ç£è¦ã¯æ½å¨çãªåçºè
ãè
ããã¦ãããããã¯ç£è¦ãç¨åº¦ãè¶ãã¦ãããã¨ãæå³ãã¾ããå½ã«å¯¾ããæ°ä¸»çãªå¶å¾¡ãå復ããã«ã¯ãåçºè
ãèªåãå®å
¨ã
ã¨ãããç¹ã¾ã§ç£è¦ãåæ¸ããªããã°ãªãã¾ããã</p>
@@ -38,9 +52,11 @@
<p>åè¡å½ã§ã¯<a
href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">äºå¤§æ¿å
ææºã®ãèªå½ã®ç£è¦ã®åãåæ¸ãããæ³æ¡</a>ãä½æãããã¨ããã§ãããããã¯ãããããã¡ã®ãããã®è¨é²ã«å¯¾ããæ¿åºã®å©ç¨ã®å¶éã«ä¾åãã¦ãã¾ããããããåçºè
ãæã¾ããããã¨ãæ ¹æ ã¨ãã¦ãåçºè
ãåå®ããã®ã«å
åãªã¢ã¯ã»ã¹ã許ãããã¨ããã°ããã®æ³æ¡ã¯åçºè
ãå®ãã®ã«å
åã§ã¯ãªãã§ãããããã£ã¨å
ã«è¡ãå¿
è¦ãããã¾ãã</p>
+</div>
-<h3>æ°ä¸»ä¸»ç¾©ã«ãããç£è¦ã®ä¸é</h3>
+<h3 class="subheader" style="clear:
both">æ°ä¸»ä¸»ç¾©ã«ãããç£è¦ã®ä¸é</h3>
+<div class="columns">
<p>ãããåçºè
ãç¯ç½ªã¨èå½ãæãã«ããªããã°ãããããã¡ã®æ¿åºã¨æ©é¢ãå¹æçã«ã³ã³ããã¼ã«ããæå¾ã®æçã失ãã§ãããã誰ãè¨è
ã«è©±ããã®ããå½ãè¦ã¤ãåºããã¨ãå¯è½ã¨ãããããªç£è¦ã¯ããããã§ãæ°ä¸»ä¸»ç¾©ãèãå¾ã度ãè¶ãã¦ããã®ã§ãã</p>
<p>å¿åã®åè¡å½æ¿åºã®å
¬åå¡ã¯ä¸æ°å³ã«2011å¹´ãã¸ã£ã¼ããªã¹ãã«ããè¨ãã¾ããã<a
@@ -51,9 +67,11 @@
<p>å対ã¨åä½å¶ã®æ´»åã¯å½ããç§å¿ãããå¿
è¦ãããã¾ããå½ã¯ãããã£ãæ´»åã«å¯¾ããåå£ãªä¼ã¿ããããã®ã
ããã§ããACLUã¯åè¡å½æ¿åºã®<a
href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">å¹³åçãªåä½å¶ã®ã°ã«ã¼ãã«æ½å
¥ããã·ã¹ããããã¯ãªæ
£ç¿</a>ã示ãã¾ãããããã¯ãã°ã«ã¼ãã®ä¸ã«ãããªã¹ãããããããããªãã¨ããå£å®ã§è¡ãããã®ã§ããç£è¦ãããããã§ããã¨ããç¹ã¯ãå½ãç¥ããã¦ããã¸ã£ã¼ããªã¹ããç¥ããã¦ããåä½å¶æ´¾ã¨è©±ãã人ãæ¢ãåºããã¨ããç¹ã§ãã</p>
+</div>
-<h3>æ
å ±ã¯ä¸åº¦éç©ãããã°æªç¨ããã</h3>
+<h3 class="subheader">æ
å ±ã¯ä¸åº¦éç©ãããã°æªç¨ããã</h3>
+<div class="columns">
<p>人ã
ãä¸è¬ç£è¦ã®ã¬ãã«ãã¨ã¦ãé«ãã¨èªèããã¨ããæåã®åå¿ã¯éç©ããããã¼ã¿ã¸ã®ã¢ã¯ã»ã¹ã®å¶éãææ¡ãããã¨ã§ããããã¯èããã¯ããã§ãããã»ãã®å°ãã§ããåé¡ã解決ãã¾ãããæ¿åºãã«ã¼ã«ã«ããããã¨æã£ã¦ããããã§ãããã(NSAã¯FIFAæ³å»·ã誤解ãããFIFAã¯ã<a
href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">NSAã«å®è³ªã®èª¬æ責任ãããã¨ã¯ã¿ãªããªã</a>ã¨è¨ãã¾ããã)ç¯ç½ªã®å®¹çãã¢ã¯ã»ã¹ã¸ã®æ
¹æ ã¨ãªãã§ããããããä¸æ¦ãåçºè
ããã¹ãã¤æ´»åãã¨è¨´ããããã°ããã¹ãã¤ããæ¢ãã¨ããè¨ã訳ã§ãéç©ããããã¼ã¿ã¸ã®ã¢ã¯ã»ã¹ãããã¨ã«ãªãã§ãããã</p>
@@ -74,9 +92,11 @@
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">æ°ä¸»ä¸»ç¾©ãç´æ¥è»¢è¦ããã</a>ãã¨ãã§ãã¾ãã</p>
<p>å½ã«ãã£ã¦ã¢ã¯ã»ã¹ããããå
¨ä½ç£è¦ã¯ã誰ã«å¯¾ãã¦ã§ããå½å®¶ã大éã®æ
å
±èª¿æ»ãå§ãããã¨ãå¯è½ã¨ãã¾ããã¸ã£ã¼ããªãºã
ã¨æ°ä¸»ä¸»ç¾©ãå®å
¨ã«ããããã«ã¯ãå½ã«ãã£ã¦ç°¡åã«ã¢ã¯ã»ã¹å¯è½ãªãã¼ã¿ã®éç©ãå¶éãããªããã°ãªãã¾ããã</p>
+</div>
-<h3>ãã©ã¤ãã·ã®å
ç¢ãªä¿è·ã¯æè¡çã§ãªããã°ãªããªã</h3>
+<h3 class="subheader">ãã©ã¤ãã·ã®å
ç¢ãªä¿è·ã¯æè¡çã§ãªããã°ãªããªã</h3>
+<div class="columns">
<p>é»åããã³ãã£ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³ã¨ã»ãã®å£ä½ã¯<a
href="https://en.necessaryandproportionate.org/text">大éç£è¦ã®æªç¨ãç¦æ¢ãã</a>ããã«è¨è¨ãããæ³çãªååãææ¡ãã¦ãã¾ãããã®ååã¯ãåçºè
ã®æ確ãªæ³çä¿è·ãå¿
é
ã®ãã®ã¨ãã¦å«ã¿ã¾ããã§ããããçµæã¨ãã¦ãæ°ä¸»ä¸»ç¾©ã®èªç±ãä¿è·ããã«å
åã¨ãªãã§ãããããããå®å
¨ã«æ¡æãããä¾å¤ãªãã«æ°¸ä¹
ã«å®æ½ãããã®ã§ããã°ã</p>
@@ -87,9 +107,11 @@
<p>å¥ã«ãã¼ã¿ã¸ã®ã¢ã¯ã»ã¹ã®å¶éãè¨å®ãããå
´åãã¾ã£ãããããã£ãå¶éãåå¨ããªããã®ããã«ãªãã§ããã:
å¹´ã
ãã®ä¾¡å¤ãããè¨é²ãçªç¶ã«å½ã¨ãã®æ©é¢ã®èª¤ç¨ã«ããå©ç¨å¯è½ã¨ãªããä¼æ¥ã«ãã£ã¦éç©ãããã®ã§ããã°ãç§çãªèª¤ç¨ããããã¾ãããããããããªãããããããã¡ãå
¨å¡ã®è¨é²ã®éç©ãç¦æ¢ããã°ããã®æ§ãªè¨é²ã¯åå¨ãå¾ããé¡ã£ã¦ã¾ã¨ããæ¹æ³ã¯ãªãã®ã§ããæ°ããéèªç±ãªæ¿æ¨©ãç£è¦ãåã³å®è£
ããªããã°ãªããªããªãããç¥ãã¾ããããããã§ãããã®æç¹ããå§ãã¦ãã¼ã¿ãéç©ããã
ãã§ãããã®æ³å¾ãåæ¢ãããä¸æçã«ç¡è¦ããã«é¢ããéãããã®èãã¯æå³ãæã¤ã¨ã¯è¨ãé£ããã®ã§ãããã</p>
+</div>
-<h3>ã¾ãããã«ãªãã¨ã¯ããããªãã</h3>
+<h3 class="subheader">ã¾ãããã«ãªãã¨ã¯ããããªãã</h3>
+<div class="columns">
<p>ãã©ã¤ãã·ãæããã«ã¯ããããæ¾ãæãã¦ã¯ããã¾ãã:
第ä¸ã«ãã©ã¤ãã·ãå®ãã¹ããªã®ã¯ããªãã§ããã¦ã§ããµã¤ãã§ããªãèªèº«ãåå®ããããã¨ãé¿ããTorã使ã£ã¦éä¿¡ãã訪åè
ã追跡ãããããã®ä»çµã¿ããããã¯ãããã©ã¦ã¶ã使ãã¾ããããGNUãã©ã¤ãã·ã»ã¬ã¼ãã使ã£ã¦ãã¡ã¼ã«ã®ä¸èº«ãæå·åãã¾ããããç¾éã§è²·ãç©ããã¾ãããã</p>
@@ -103,17 +125,21 @@
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">å人ç¥äººã®å人æ
å
±ã渡ããªãããã«ãã¾ããã</a>ãããã¦é»åã¡ã¼ã«ãé»è©±çªå·ã®ãªã¹ãã決ãã¦ã©ããªã¦ã§ããµã¤ãã«ã渡ããªãããã«ãFacebookã®ãããªä¼ç¤¾ã«ãå人ã®æ°èã«çºè¡¨ãããããªããããªãã¨ã«ã¤ãã¦ãä¼ããªãããã«ãã¾ããããããè¯ãã¯ãFacebookãå
¨ã使ããªããã¨ã§ããæ¬åãã¦ã¼ã¶ã«å¿
é
ã¨ããéä¿¡ã·ã¹ãã
ãæå¦ãã¾ãããããã¨ããããªããèªåã®æ¬åã使ãã¨ãã¦ãããã®ã·ã¹ãã
ã¯ã»ãã®äººã
ã«ãããã®ãã©ã¤ãã·ã諦ããå§åã¨ãªãã¾ãããã</p>
<p>èªå·±é²è¡ãéè¦ã§ããããã£ã¨ãé
ä¸ãªèªå·±é²è¡ã§ãã£ãã¨ãã¦ãããªãã®ãã®ã§ã¯ãªãã·ã¹ãã
ãã§/ããããã©ã¤ãã·ãå®ãã«ã¯ä¸ååã§ããã»ãã®äººã¨éä¿¡ããããé½å¸ã移åãããããã¨ããããããã¡ã®ãã©ã¤ãã·ã¯ç¤¾ä¼ã®æ
£ç¿ã«ä¾åãã¾ããéä¿¡ã移åãç£è¦ããããã·ã¹ãã
ãé¿ãããã¨ã¯ã§ãã¾ããããã¹ã¦ãé¿ãããã¨ã¯ã§ãã¾ãããæããã«ããã¹ã¦ã®ãããã£ãã·ã¹ãã
ã(妥å½ãªå®¹çãããå ´å以å¤ã¯)人ã
ãç£è¦ããªãããã«åæ¢ããã®ããã£ã¨ããã解決çã§ãã</p>
+</div>
-<h3>ãã©ã¤ãã·ã®ããã«ãã¹ã¦ã®ã·ã¹ãã
ãè¨è¨ããªããã°ãªããªã</h3>
+<h3 class="subheader">ãã©ã¤ãã·ã®ããã«ãã¹ã¦ã®ã·ã¹ãã
ãè¨è¨ããªããã°ãªããªã</h3>
+<div class="columns">
<p>å
¨ä½ç£è¦ç¤¾ä¼ãæã¾ãªãã®ã§ããã°ãç£è¦ãå
¬å®³ã®ä¸ç¨®ã¨èããªãã¦ã¯ãªãã¾ãããããã¦ãããããã®æ°ãããã£ã¸ã¿ã«ã·ã¹ãã
ã®ç£è¦ã®å½±é¿ãéå®ããªãã¦ã¯ãªãã¾ãããã¡ããã©ã建ç¯ç©ã®ç°å¢ã¸ã®å½±é¿ãéå®ããããã«ã</p>
<p>ãã¨ãã°ãé»æ°ã®ãã¹ãã¼ããã¡ã¼ã¿ã¯ãé常ã®ã¦ã¼ã¶ã¨æ¯è¼ãã¦ä½¿ãæ¹ãã©ãããªã©ãåã
ã®é¡§å®¢ã®é»æ°ã®ä½¿ç¨ã«ã¤ãã¦ã®ãã¼ã¿ãå»ã
ã¨é»åä¼ç¤¾ã«éä¿¡ããã¨ãã¦ãå§èªããã¾ããããã¯ä¸è¬ç£è¦ã«ãã¨ã¥ãã¦å®è£
ããã¾ãããç£è¦ã¯å¿
è¦ã§ã¯ããã¾ãããè¿é£ã®å¹³å使ç¨ã¯å
¨ä½ä½¿ç¨ãå©ç¨è
æ°ã§å²ç®ããã°é»åä¼ç¤¾ã¯ç°¡åã«è¨ç®ã§ããã¡ã¼ã¿ã«éä¿¡ã§ãã¾ããåã
ã®é¡§å®¢ã¯ä»»æã®æå®ãããæéã§èªåã®ä½¿ç¨ãå¹³å使ç¨ã®ãã¿ã¼ã³ã¨æ¯è¼ã§ãã¾ããåãå©ä¾¿æ§ãç£è¦ãªãã§ã§ããã®ã§ã!</p>
<p>ãã¹ã¦ã®ããããã¡ã®ãã£ã¸ã¿ã«ã»ã·ã¹ãã
ã§ããã®ãããªãã©ã¤ãã·ãè¨è¨ããå¿
è¦ãããã¾ãã</p>
+</div>
-<h3>ãã¼ã¿ã®éç©ã«å¯¾ãã対ç:
ã¾ãæ£ãããã¾ã¾ã«ãã</h3>
+<h3 class="subheader">ãã¼ã¿ã®éç©ã«å¯¾ãã対ç:
ã¾ãæ£ãããã¾ã¾ã«ãã</h3>
+<div class="columns">
<p><a
name="dispersal">ãã¼ã¿ãã¾ãæ£ããç¶ããã¢ã¯ã»ã¹ãé£ãããã</a>ã®ãããã©ã¤ãã·ã«å¯¾ããã¢ãã¿ãªã³ã°ããå®å
¨ã«ããæ¹çã®ä¸ã¤ã§ããå¤ãã¹ã¿ã¤ã«ã®ã»ãã¥ãªãã£ã»ã«ã¡ã©ã¯ãã©ã¤ãã·ã«å¯¾ããè
å¨ã§ã¯ããã¾ããã§ãã(<a
href="#privatespace">*</a>)ãè¨é²ã¯æ§å
ã«ä¿åãããä¿ç®¡æéã¯æ大ã§ãæ°é±éã§ããããããã£ãè¨é²ã¸ã®ã¢ã¯ã»ã¹ã®ä¸ä¾¿ããã大éã«è¡ããããã¨ã¯ãªããç¯ç½ªã¨ãã¦éå
±ãããå ´æã
ãã§ã¢ã¯ã»ã¹ããã¾ãããæ¯æ¥æ°ç¾ä¸æ¬ã®ãã¼ããç©ççã«éç©ããè¦è´ãããã³ãã¼ãããã¨ã¯ä¸å¯è½ã§ããã</p>
@@ -126,9 +152,11 @@
<p><a
name="privatespace"><b>*</b></a>ããã§ãã»ãã¥ãªãã£ã«ã¡ã©ãåºã®ä¸ã§ããããã¯è¡è§ã§åãããã¦ãããã¨ããä»®å®ãã¦ãã¾ãã誰ãã®ãã©ã¤ãã¼ããªç©ºéã«ã»ãã®èª°ãã«ãã£ã¦åãããã¦ããã©ããªã«ã¡ã©ããã©ã¤ãã·ã侵害ãã¾ãããããã¯å¥ã®åé¡ã§ãã</p>
+</div>
-<h3
id="digitalcash">ã¤ã³ã¿ã¼ãããã»ã³ãã¼ã¹ã®ç£è¦ã®å¯¾ç</h3>
+<h3 id="digitalcash"
class="subheader">ã¤ã³ã¿ã¼ãããã»ã³ãã¼ã¹ã®ç£è¦ã®å¯¾ç</h3>
+<div class="columns">
<p>ã»ã¨ãã©ã®ãã¼ã¿ã®éç©ã¯äººã
èªèº«ã®ãã£ã¸ã¿ã«ãªæ´»åããè¡ããã¾ããé常ããã¼ã¿ã¯ã¾ãä¼ç¤¾ã«ãã£ã¦éãããã¾ãããããããã©ã¤ãã·ã¨æ°ä¸»ä¸»ç¾©ã®è
å¨ã«ã¤ãã¦èããéãç£è¦ãç´æ¥ã«å½ã«ãã£ã¦è¡ããããããã¸ãã¹ã«é
ãããããã«ã¯ãéããããã¾ããããªããªããä¼ç¤¾ã«ãã£ã¦éç©ããããã¼ã¿ã¯ã·ã¹ããããã¯ã«å½ã«å©ç¨å¯è½ã
ããã§ãã</p>
<p>PRISMãéãã¦ãNSAã¯<a
@@ -148,9 +176,11 @@
<p>ãµã¤ãã®å人æ
å ±ã®éç©ããã®ãããªãè
å¨ã¯ãã»ãã¥ãªãã£ç ´å£è
ãä¾µå
¥ãããããåå¾ãã¦æªç¨ãããã¨ã§ãã顧客ã®ã¯ã¬ã¸ããã«ã¼ãã®è©³ç´°ãããã«å«ã¾ãã¾ããå¿åã®æ¯æãã·ã¹ãã
ããã®å±éºãããã¾ãã«ããããããã¾ãã:
ãµã¤ãã®ã»ãã¥ãªãã£ã»ãã¼ã«ã¯ããµã¤ããããªãã«ã¤ãã¦ãªã«ãç¥ããªããã°ãããªãã害ãããã¨ã¯ã§ãã¾ããã</p>
+</div>
-<h3>æ
è¡ã®ç£è¦ã®å¯¾ç</h3>
+<h3 class="subheader">æ
è¡ã®ç£è¦ã®å¯¾ç</h3>
+<div class="columns">
<p>ããããã¡ã¯ãã£ã¸ã¿ã«ã®æéå¾´åãå¿åæ¯æã(ãã¨ãã°ããã£ã¸ã¿ã«ç¾éã使ã£ã¦)ã«å¤æããªããã°ããã¾ãããè»ã®ãã³ãã¼èªèã·ã¹ãã
ã¯ãã¹ã¦ã®ãã³ãã¼ãèªèãã<a
href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">ãã®ãã¼ã¿ã¯æéãªãã«ä¿ç®¡ããã¾ã</a>ãè£å¤æã®å½ä»¤ã«ããææ»ã®è»ã®ãªã¹ãã«è¼ã£ã¦ãããã³ãã¼ã
ãã®éç¥ã¨è¨é²ã«ã¨ã©ããããæ³å¾ã§è¦è«ãããã¹ãã§ãããããããã»ãã¥ã¢ã§ãªã代æ¿ã¯ãã¹ã¦ã®è»ã«ã¤ãã¦ãæ°æ¥éã
ããã¼ã«ã«ã«ä¿ç®¡ããå
¨é¨ã®ãã¼ã¿ãã¤ã³ã¿ã¼ãããä¸ã§å©ç¨å¯è½ã¨ããã®ã§ã¯ãªããã¨ãããã®ã§ããããã¦ããã¼ã¿ã¸ã®ã¢ã¯ã»ã¹ã¯è£å¤æã®ä»¤ç¶ã«ãããã³ãã¼ã®ãªã¹ãã«éã£ã¦æ¢ç´¢ãããã¹ãã§ãã</p>
@@ -165,9 +195,11 @@
<p>ããã²ã¼ã·ã§ã³ã»ãµã¼ãã¹ã¯ç£è¦ãè¡ãã¾ããã¦ã¼ã¶ã®ã³ã³ãã¥ã¼ã¿ã¯å°å³ãµã¼ãã¹ã«ã¦ã¼ã¶ã®ä½ç½®ã¨ã©ãã¸è¡ãããããä¼ãããµã¼ãã¯çµè·¯ã決ãã¦ã¦ã¼ã¶ã®ã³ã³ãã¥ã¼ã¿ã«éãè¿ãã表示ããã¾ããä»æ¥ã§ã¯ããµã¼ãã¯ããããã¦ã¼ã¶ã®ä½ç½®ãè¨é²ããã§ãããããªã«ããããæ¢ãããã®ããªãã®ã§ããããç£è¦ã¯æ¬è³ªçã«ã¯å¿
è¦ã§ã¯ãªããåè¨è¨ã§é¿ãããã¨ãã§ãã¾ããã¦ã¼ã¶ã®ã³ã³ãã¥ã¼ã¿ã®èªç±ã½ããã¦ã§ã¢ã¯é©åãªé¨åã®å°å³ãã¼ã¿ã(以åã«ãããã¦ãªããã°)ãã¦ã³ãã¼ãããçµè·¯ãè¨ç®ãã表示ã§ãã¾ããã¦ã¼ã¶ãã©ãã«ãã¦ã©ãã«è¡ããããã誰ã«ãä¼ãããã¨ãªããã§ãã</p>
<p>èªè»¢è»ã®ã¬ã³ã¿ã«ã®ã·ã¹ãã
çã¯ãèªè»¢è»ã貸ä¸ãããã¹ãã¼ã·ã§ã³å
ã§ã
ããåãã人ã®ã¢ã¤ãã³ãã£ãã£ãç¥ããã¦ãããã¨ããããã«è¨è¨ã§ãã¾ãã貸åºã®éããã¹ã¦ã®ã¹ãã¼ã·ã§ã³ã«ã©ã®ã¹ãã¼ã·ã§ã³ããã貸åºä¸ãã¨ãªã£ãããä¼ããã°ãã¦ã¼ã¶ãã©ã®ã¹ãã¼ã·ã§ã³(ä¸è¬çã«ã¯ç°ãªãã¹ãã¼ã·ã§ã³)ã«è¿å´ãã¦ãããã®ã¹ãã¼ã·ã§ã³ã¯ãã©ãã§ãã¤èªè»¢è»ã貸ä¸ãããããããã¾ããããã¦ãå
ã®ã¹ãã¼ã·ã§ã³ã«èªè»¢è»ãã貸åºä¸ãã§ã¯ãªãã¨ä¼ãã¾ããã¦ã¼ã¶ã¸ã®è«æ±ãè¨ç®ããã¹ãã¼ã·ã§ã³ã®è¼ªã«ãã£ã¦ã(ã©ã³ãã
ãªåã®éå¾
ã£ãå¾ã«)æ¬åºã«éãã¾ããããã§ãæ¬åºã¯ã©ã®ã¹ãã¼ã·ã§ã³ããè«æ±æ¸ãæ¥ããåãããªãã§ãããããã£ããããããªãããã°ã(èªè»¢è»ã)è¿å´ãããã¹ãã¼ã·ã§ã³ã¯ããã©ã³ã¶ã¯ã·ã§ã³ã
«ã¤ãã¦ãã¹ã¦å¿ããã§ããããèªè»¢è»ãé·ãéã貸åºä¸ãã®ã¾ã¾ã®å
´åã貸ä¸ããã¹ãã¼ã·ã§ã³ã¯æ¬åºã«ä¼ãããã¾ãããã®å
´åã«ã¯ãã¹ãã¼ã·ã§ã³ããåãã人ã®ã¢ã¤ãã³ãã£ãã£ãç´ã¡ã«éãããã§ãããã</p>
+</div>
-<h3>éä¿¡ã®è¨é²ã®å¯¾ç</h3>
+<h3 class="subheader">éä¿¡ã®è¨é²ã®å¯¾ç</h3>
+<div class="columns">
<p>ã¤ã³ã¿ã¼ããããµã¼ãã¹ãããã¤ãã¨é»è©±ä¼ç¤¾ã¯ã¦ã¼ã¶ã¨ã®å¥ç´ã§å¤§éã®ãã¼ã¿(ãã©ã¦ãºãé»è©±ä¼è©±ããã®ã»ã)ãä¿ç®¡ãã¦ãã¾ããæºå¸¯é»è©±ã§ã¯ã<a
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">ã¦ã¼ã¶ã®ç©ççä½ç½®</a>ã¾ã§è¨é²ãã¦ãã¾ããä¼æ¥ã¯ããããã£ãè¨é²ãé·ãéä¿æãã¾ã:
AT&Tã®å ´åã30年以ä¸ã§ããããã«ãä¼æ¥ã¯<a
@@ -182,9 +214,11 @@
<p>誰ã¨é»åã¡ã¼ã«ãããã¨ããããã®ãã©ã¤ãã·ã¯ãåç´ãªé¨åçãªè§£æ±ºçã¯ãããªãã¨ã»ãã®äººããããªãèªèº«ã®æ¿åºã¨æ±ºãã¦ååããªããããªå½ã®é»åã¡ã¼ã«ãµã¼ãã¹ã§ãæå·ã使ã£ã¦ãããããéä¿¡ãããã¨ãããã®ã§ããããããLader
Levison(åè¡å½æ¿åºã®ç£è¦ãå®å
¨ã«è»¢è½ããããã¨ããã¡ã¼ã«ãµã¼ãã¹Lavabitã®ãªã¼ãã¼)ã¯ãã£ã¨æ´ç·´ãããæå·ã·ã¹ãã
ã®èããæã£ã¦ãã¾ããããã§ã¯ãããªãã®é»åã¡ã¼ã«ãµã¼ãã¹ã¯ããããã®é»åã¡ã¼ã«ãµã¼ãã¹ã®ããã¦ã¼ã¶ã¸ããªããã¡ã¼ã«ãéã£ãäºã
ãããããããããã®é»åã¡ã¼ã«ãµã¼ãã¹ã¯ãããªãã®é»åã¡ã¼ã«ãµã¼ãã¹ã®ããã¦ã¼ã¶ããããããã¡ã¼ã«ãåãåã£ããã¨ã
ããããããããããããªãããããã«ã¡ã¼ã«ãéã£ããã¨ã確å®ãããã®ã¯å°é£ã§ãããã¨ããã·ã¹ãã
ã§ãã</p>
+</div>
-<h3>ããããããç£è¦ã¯å¿
è¦ã </h3>
+<h3 class="subheader">ããããããç£è¦ã¯å¿
è¦ã </h3>
+<div class="columns">
<p>ç¯ç½ªè
ãè¦ã¤ãåºãããã«å½ã¯ãè£å¤æã®å½ä»¤ã®å
ãç¹å®ã®ç¯ç½ªãããã¯ç¹å®ã®è¨ç»ããã¦ããç¯ç½ªã®å®¹çãææ»ã§ãããã¨ãå¿
è¦ã§ããã¤ã³ã¿ã¼ãããã§ã¯é»è©±ã®ä¼è©±ã®ååã®æ¨©éã¯ãã¤ã³ã¿ã¼ãããã®æ¥ç¶ã®ååã®æ¨©éã«èªç¶ã«æ¡å¼µãããã§ãããã幸éãªãã¨ã«ãããã¯äºå¾ã«åçºè
ãè¦ã¤ãããã¨ãå¯è½ã¨ããªãã§ããããããã(ããããæ¨å¥¨ããããã«)ããããã¡ãäºåã«å¤§éã®æ¸é¡ãéç©ãããã£ã¸ã¿ã«ã»ã·ã¹ãã
ãç¦æ¢ããã°ã</p>
<p>è¦å¯ã®ãããªå½ãä¸ããåãæã¤åã
人ã¯ã代åã¨ãã¦ãã©ã¤ãã·ã®æ¨©å©ãå·®ãã
ããç£ç£ãããã°ããã¾ããã(å®éãè¦å¯ã§ã¯èªèº«ã®é
èªã§ã¯ãå½è¨¼ãã<a
@@ -199,9 +233,10 @@
href="http://DefectiveByDesign.org">DRM</a>)ããããã¯æ¿æ²»ç(ãã¨ãã°ãããã¼ã¤ã³ã°)ãªã社ä¼ã®å±éºãããããã§ãããããã»ã¹ã®è©³ç´°ã«ã¤ãã¦ãå
Œ
±ã®ç¦ç¥ã«å¿
è¦ã¨ãããã¬ãã«ã§å
¬éãã¹ããã¨ããã¸ãã¹ã«èª²ããã¨ã¯å¦¥å½ã§ãããããã£ãè¡çºã®å±éº(BP社ã®åæ²¹æµåºäºæ
ãç¦å³¶ã®ååç溶èã2008å¹´ã®ä¸çéèå±æ©ãèãã¦ã¿ã¦ãã
ãã)ã¯ããããªãºã ã«ããå±éºãå°ããè¦ãã¾ãã</p>
<p>ããããªãããã¸ã£ã¼ããªãºã
ã¯ç£è¦ããå®ãããã¹ãã§ãããã¨ãããããããã¸ãã¹ã®ä¸é¨ã¨ãã¦å®æ½ããã¦ããæã§ãã</p>
+</div>
+<div class="column-limit"></div>
-<hr />
-
+<div class="reduced-width">
<p>ãã£ã¸ã¿ã«æè¡ã¯ããããã¡ã®éåãè¡åãããã¦éä¿¡ã®ç£è¦ã®ã¬ãã«ãè¨å¤§ã«å¢é·ããã¾ãããããã¯ã1990年代ã«ããããã¡ãçµé¨ãããããã¨ã¦ãå¤ããããã¦1980年代ã®<a
href="https://hbr.org/2013/06/06/your-iphone-works-for-the-secret-police">éã®ã«ã¼ãã³ã®åããã®äººã
ãããã¨ã¦ãå¤ã</a>ã¨ãªã£ã¦ãããéç©ããããã¼ã¿ã®å½ã«ãã使ç¨ã«é¢ãã¦ææ¡ããã¦ããæ³çå¶éã§ã¯ããããå¤ããããªãã§ãããã</p>
@@ -209,6 +244,8 @@
href="https://www.theguardian.com/technology/2015/aug/10/internet-of-things-predictable-people">人ã
ãã©ã®ããã«èããã</a>ã«æ·±å»ãªå½±é¿ãä¸ãããã¨ããããã¾ãããã®ãããªå¯è½æ§ã¯è¨éä¸å¯è½ã§ãããæ°ä¸»ä¸»ç¾©ã¸ã®è
å¨ã¯æ¶æ¸¬ã§ã¯ããã¾ãããããã¯ç¾ã«æããè¦ãã¦ããã®ã§ãã</p>
<p>ããããã¡ã®èªç±ãªå½ã
ãé大ãªç£è¦ã®ä¸è¶³ã«ãã£ã¦ä»¥åã«è¢«å®³ã被ãããã¤ã¦ã½é£ã¨æ±ãã¤ããããã§ãã£ããããç£è¦ãããã¹ãã§ããã®ã§ãªããã°ãããããã¡ã¯ãã®å¢å
ãã²ã£ããè¿ããªããã°ãªãã¾ãããããã«ã¯ã人ã
ã«ã¤ãã¦ã®ããã°ãã¼ã¿ã®éç©ãæ¢ãããã¨ãå¿
è¦ã§ãã</p>
+</div>
+</div>
<div class="translators-notes">
@@ -277,7 +314,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2016/10/31 04:28:15 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: surveillance-vs-democracy.ru.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.ru.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- surveillance-vs-democracy.ru.html 23 Oct 2016 10:58:35 -0000 1.24
+++ surveillance-vs-democracy.ru.html 6 Nov 2016 21:28:14 -0000 1.25
@@ -6,20 +6,33 @@
<!-- This file is automatically generated by GNUnited Nations! -->
<title>СколÑко Ñлежки Ð¼Ð¾Ð¶ÐµÑ Ð²ÑдеÑжаÑÑ
демокÑаÑиÑ? - ÐÑÐ¾ÐµÐºÑ GNU - Фонд Ñвободного
пÑогÑаммного обеÑпеÑениÑ</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+-->
+</style>
<!-- GNUN: localize URL /graphics/dog.small.ru.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.ru.html" -->
-<h2>СколÑко Ñлежки Ð¼Ð¾Ð¶ÐµÑ Ð²ÑдеÑжаÑÑ
демокÑаÑиÑ?</h2>
+<h2 class="center">СколÑко Ñлежки Ð¼Ð¾Ð¶ÐµÑ Ð²ÑдеÑжаÑÑ
демокÑаÑиÑ?</h2>
-<p><a href="http://www.stallman.org/">РиÑаÑд СÑолмен</a></p>
+<p class="byline center"><a href="http://www.stallman.org/">РиÑаÑд
СÑолмен</a></p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>ÐеÑÐ²Ð°Ñ Ð²ÐµÑÑÐ¸Ñ ÑÑой ÑÑаÑÑи бÑла
опÑбликована в окÑÑбÑе 2013 года в
+<blockquote class="center"><p>ÐеÑÐ²Ð°Ñ Ð²ÐµÑÑÐ¸Ñ ÑÑой ÑÑаÑÑи
бÑла опÑбликована в окÑÑбÑе 2013 года в
“УайеÑед”.</p></blockquote>
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.ru.jpg" alt="ÐаÑикаÑÑÑа: Ñобака
Ñ Ñдивлением ÑмоÑÑÐ¸Ñ Ð½Ð° ÑекламÑ,
вÑÑкоÑивÑÑÑ Ð½Ð° ÑкÑане ее
компÑÑÑеÑа" /></a>
@@ -35,7 +48,8 @@
гаÑанÑиÑованно не Ð´Ð¾Ð»Ð¶Ð½Ñ Ð²ÑÑ
одиÑÑ? ÐÑо
ÑÑовенÑ, пÑи пÑевÑÑении коÑоÑого
Ñлежка наÑÐ¸Ð½Ð°ÐµÑ Ð²Ð¼ÐµÑиваÑÑÑÑ Ð²
ÑÑнкÑиониÑование демокÑаÑии, когда
оÑведомиÑелей (ÑакиÑ
как СноÑден), как
пÑавило, оÑлавливаÑÑ.</p>
-
+</div>
+<div class="columns" style="clear:both">
<p>Ð ÑÑловиÑÑ
гоÑÑдаÑÑÑвенной ÑÐ°Ð¹Ð½Ñ Ð¼Ñ,
наÑод, завиÑим Ð¾Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑи
оÑведомиÑелей <a
href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">
ÑаÑÑказÑваÑÑ
@@ -67,9 +81,11 @@
Ñого, ÑÑÐ¾Ð±Ñ Ð·Ð°ÑиÑиÑÑ Ð¾ÑведомиÑелей, еÑли
“поимка оÑведомиÑелє
ÑÑановиÑÑÑ Ð¾Ñнованием Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа к
даннÑм, позволÑÑÑим иденÑиÑиÑиÑоваÑÑ
его. Ðам нÑжно идÑи далÑÑе.</p>
+</div>
-<h3>ÐеÑÑ
ний пÑедел Ñлежки пÑи демокÑаÑии</h3>
+<h3 class="subheader" style="clear: both">ÐеÑÑ
ний пÑедел
Ñлежки пÑи демокÑаÑии</h3>
+<div class="columns">
<p>ÐÑли оÑведомиÑели не ÑмеÑÑ Ð¿ÑолиÑÑ ÑвеÑ
на пÑеÑÑÑÐ¿Ð»ÐµÐ½Ð¸Ñ Ð¸ ложÑ, Ð¼Ñ ÑеÑÑем
поÑледний кÑÑок ÑакÑиÑеÑкого конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
Ñвоим пÑавиÑелÑÑÑвом и
гоÑÑдаÑÑÑвеннÑми ÑÑÑеждениÑми. ÐÐ¾Ñ Ð¿Ð¾ÑемÑ
Ñлежка, коÑоÑÐ°Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑеÑ
@@ -99,9 +115,11 @@
ÑеÑÑоÑиÑÑÑ. ТоÑка, в коÑоÑой Ñлежка
ÑÑановиÑÑÑ ÑлиÑком велика —
ÑÑо ÑоÑка, в коÑоÑой гоÑÑдаÑÑÑво можеÑ
ÑзнаÑÑ, кÑо говоÑил Ñ Ð¸Ð·Ð²ÐµÑÑнÑм
жÑÑналиÑÑом или извеÑÑнÑм диÑÑиденÑом.</p>
+</div>
-<h3>ÐÐ´Ð½Ð°Ð¶Ð´Ñ ÑобÑаннÑми ÑведениÑми бÑдÑÑ
злоÑпоÑÑеблÑÑÑ</h3>
+<h3 class="subheader">ÐÐ´Ð½Ð°Ð¶Ð´Ñ ÑобÑаннÑми ÑведениÑми
бÑдÑÑ Ð·Ð»Ð¾ÑпоÑÑеблÑÑÑ</h3>
+<div class="columns">
<p>Ðогда лÑди пÑизнаÑÑ, ÑÑо ÑÑÐ¾Ð²ÐµÐ½Ñ Ð¾Ð±Ñей
Ñлежки ÑлиÑком вÑÑок, Ñамо Ñобой
напÑаÑиваеÑÑÑ Ð¿ÑедложиÑÑ Ð¾Ð³ÑаниÑÐµÐ½Ð¸Ñ Ð½Ð°
доÑÑÑп к ÑобÑаннÑм даннÑм. ÐÑо
звÑÑÐ¸Ñ Ð½ÐµÐ¿Ð»Ð¾Ñ
о, но пÑÐ¾Ð±Ð»ÐµÐ¼Ñ ÑÑо не ÑеÑиÑ,
ни на йоÑÑ, даже в пÑедположении,
@@ -153,9 +171,11 @@
маÑÑиÑованнÑÑ ÑкÑпедиÑÐ¸Ñ Ð´Ð»Ñ ÑÑавли
лÑбого Ñеловека. ЧÑÐ¾Ð±Ñ Ð¾Ð±ÐµÐ·Ð¾Ð¿Ð°ÑиÑÑ
жÑÑналиÑÑÐ¸ÐºÑ Ð¸ демокÑаÑиÑ, Ð¼Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ
огÑаниÑиÑÑ ÑÐ±Ð¾Ñ Ð´Ð°Ð½Ð½ÑÑ
, коÑоÑÑе бÑдÑÑ
легко доÑÑÑÐ¿Ð½Ñ Ð³Ð¾ÑÑдаÑÑÑвÑ.</p>
+</div>
-<h3>СÑÐ¾Ð¹ÐºÐ°Ñ Ð·Ð°ÑиÑа лиÑной жизни должна бÑÑÑ
ÑеÑ
ниÑеÑкой</h3>
+<h3 class="subheader">СÑÐ¾Ð¹ÐºÐ°Ñ Ð·Ð°ÑиÑа лиÑной жизни
должна бÑÑÑ ÑеÑ
ниÑеÑкой</h3>
+<div class="columns">
<p>Фонд ÑлекÑÑоннÑÑ
ÑÑбежей и дÑÑгие
оÑганизаÑии пÑедлагаÑÑ ÑÑд ÑÑидиÑеÑкиÑ
пÑинÑипов, ÑоÑÑавленнÑÑ
Ð´Ð»Ñ <a
href="https://en.necessaryandproportionate.org/text">
пÑедоÑвÑаÑениÑ
@@ -182,9 +202,11 @@
ÑеализовÑваÑÑ ÑÐ»ÐµÐ¶ÐºÑ Ð·Ð°Ð½Ð¾Ð²Ð¾, и даннÑе
ÑобиÑалиÑÑ Ð±Ñ ÑолÑко наÑÐ¸Ð½Ð°Ñ Ñ ÑÑого
моменÑа. ЧÑо каÑаеÑÑÑ Ð¿ÑиоÑÑановки
дейÑÑÐ²Ð¸Ñ Ð¸Ð»Ð¸ игноÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ ÑÑого закона,
Ñо ÑÑа Ð¸Ð´ÐµÑ ÐµÐ´Ð²Ð° ли Ð¸Ð¼ÐµÐµÑ ÑмÑÑл.</p>
+</div>
-<h3>Ðо-пеÑвÑÑ
, не бÑÑÑ Ð´ÑÑаками</h3>
+<h3 class="subheader">Ðо-пеÑвÑÑ
, не бÑÑÑ Ð´ÑÑаками</h3>
+<div class="columns">
<p>ЧÑÐ¾Ð±Ñ Ñ Ð½Ð°Ñ Ð±Ñла конÑиденÑиалÑноÑÑÑ, мÑ
не Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¾ÑбÑаÑÑваÑÑ ÐµÐµ: пеÑвÑй,
кÑо должен заÑиÑаÑÑ Ð²Ð°ÑÑ
конÑиденÑиалÑноÑÑÑ — ÑÑо вÑ.
ÐзбегайÑе
иденÑиÑиÑиÑоваÑÑ ÑÐµÐ±Ñ Ð½Ð° ÑайÑаÑ
ÐнÑеÑнеÑа, ÑвÑзÑвайÑеÑÑ Ñ Ð½Ð¸Ð¼Ð¸ по Tor и
@@ -224,9 +246,11 @@
избегаÑÑ Ð½ÐµÐºÐ¾ÑоÑÑÑ
ÑиÑÑем, коÑоÑÑе
оÑÑлеживаÑÑ Ð½Ð°Ñи ÑообÑÐµÐ½Ð¸Ñ Ð¸ пеÑемеÑениÑ,
но не вÑе иÑ
. ЯÑно, ÑÑо лÑÑÑе бÑло бÑ
заÑÑавиÑÑ Ð²Ñе ÑÑи ÑиÑÑÐµÐ¼Ñ Ð¿ÑекÑаÑиÑÑ
ÑÐ»ÐµÐ¶ÐºÑ Ð·Ð° лÑдÑми, за иÑклÑÑением законно
подозÑеваемÑÑ
.</p>
+</div>
-<h3>ÐаждÑÑ ÑиÑÑÐµÐ¼Ñ Ð½Ñжно пÑоекÑиÑоваÑÑ Ñ
ÑÑеÑом конÑиденÑиалÑноÑÑи</h3>
+<h3 class="subheader">ÐаждÑÑ ÑиÑÑÐµÐ¼Ñ Ð½Ñжно
пÑоекÑиÑоваÑÑ Ñ ÑÑеÑом
конÑиденÑиалÑноÑÑи</h3>
+<div class="columns">
<p>ÐÑли Ð¼Ñ Ð½Ðµ Ñ
оÑим жиÑÑ Ð² обÑеÑÑве
ÑоÑалÑной Ñлежки, Ð¼Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ ÑаÑÑмаÑÑиваÑÑ
ÑÐ»ÐµÐ¶ÐºÑ ÐºÐ°Ðº Ñвоего Ñода ÑоÑиалÑное
загÑÑзнение и огÑаниÑиваÑÑ Ð²ÐºÐ»Ð°Ð´ в ÑлежкÑ
каждой новой ÑиÑÑовой ÑиÑÑÐµÐ¼Ñ ÑоÑно Ñак
же, как Ð¼Ñ Ð¾Ð³ÑаниÑиваем воздейÑÑвие
@@ -244,9 +268,11 @@
же Ñамое, ÑолÑко без Ñлежки!</p>
<p>Ðам надо вÑÑÑаиваÑÑ ÑакÑÑ
конÑиденÑиалÑноÑÑÑ Ð²Ð¾ вÑе наÑи ÑиÑÑовÑе
ÑиÑÑемÑ.</p>
+</div>
-<h3>ÐеÑа пÑоÑив ÑбоÑа даннÑÑ
: оÑÑавлÑÑÑ Ð¸Ñ
ÑаÑÑÑедоÑоÑеннÑми</h3>
+<h3 class="subheader">ÐеÑа пÑоÑив ÑбоÑа даннÑÑ
:
оÑÑавлÑÑÑ Ð¸Ñ
ÑаÑÑÑедоÑоÑеннÑми</h3>
+<div class="columns">
<p><a name="dispersal"></a>Ðдин из ÑпоÑобов ÑделаÑÑ
наблÑдение безопаÑнÑм длÑ
конÑиденÑиалÑноÑÑи — оÑÑавлÑÑÑ
даннÑе ÑаÑÑÑедоÑоÑеннÑми, без
Ñдобного доÑÑÑпа. СÑаÑомоднÑе камеÑÑ
видеонаблÑÐ´ÐµÐ½Ð¸Ñ Ð½Ðµ пÑедÑÑавлÑли ÑгÑозÑ
@@ -278,9 +304,11 @@
безопаÑноÑÑи напÑавлена в зал магазина
или на ÑлиÑÑ. ÐÑÐ±Ð°Ñ ÐºÐ°Ð¼ÐµÑа,
напÑÐ°Ð²Ð»ÐµÐ½Ð½Ð°Ñ Ð² ÑÑе-Ñо лиÑное пÑоÑÑÑанÑÑво
кем-Ñо дÑÑгим, вÑоÑгаеÑÑÑ Ð² лиÑнÑÑ
жизнÑ, но ÑÑо дÑÑгой вопÑоÑ.</p>
+</div>
-<h3 id="digitalcash">ÐеÑÑ Ð¿ÑоÑив коммеÑÑеÑкой
Ñлежки в ÐнÑеÑнеÑе</h3>
+<h3 id="digitalcash" class="subheader">ÐеÑÑ Ð¿ÑоÑив
коммеÑÑеÑкой Ñлежки в ÐнÑеÑнеÑе</h3>
+<div class="columns">
<p>ÐолÑÑинÑÑво ÑобиÑаемÑÑ
даннÑÑ
возникаеÑ
в ÑезÑлÑÑаÑе ÑобÑÑвенной ÑиÑÑовой
деÑÑелÑноÑÑи лÑдей. ÐбÑÑно даннÑе ÑнаÑала
ÑобиÑаÑÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñми. Ðо когда
ÑеÑÑ Ð¸Ð´ÐµÑ Ð¾Ð± ÑгÑозе конÑиденÑиалÑноÑÑи и
демокÑаÑии, ÑовеÑÑенно безÑазлиÑно,
@@ -336,9 +364,11 @@
Ñом ÑиÑле даннÑми о кÑедиÑнÑÑ
каÑÑаÑ
клиенÑов. СиÑÑема анонимнÑÑ
плаÑежей
поконÑила Ð±Ñ Ñ ÑÑой ÑгÑозой: бÑеÑÑ Ð² заÑиÑе
ÑайÑа не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð²ÑедиÑÑ Ð²Ð°Ð¼,
когда ÑÐ°Ð¹Ñ Ð½Ð¸Ñего о Ð²Ð°Ñ Ð½Ðµ знаеÑ.</p>
+</div>
-<h3>ÐеÑÑ Ð¿ÑоÑив Ñлежки за пеÑедвижениÑми</h3>
+<h3 class="subheader">ÐеÑÑ Ð¿ÑоÑив Ñлежки за
пеÑедвижениÑми</h3>
+<div class="columns">
<p>ÐÑ Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¿ÑеобÑазоваÑÑ ÑиÑÑовÑе
ÑиÑÑÐµÐ¼Ñ ÑбоÑа плаÑежей в анонимнÑе
(напÑимеÑ, Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑиÑÑовой налиÑноÑÑи).
СиÑÑÐµÐ¼Ñ ÑаÑÐ¿Ð¾Ð·Ð½Ð°Ð²Ð°Ð½Ð¸Ñ Ð½Ð¾Ð¼ÐµÑов
маÑин ÑаÑпознаÑÑ Ð²Ñе номеÑа, и <a
@@ -391,9 +421,11 @@
опеÑаÑии. ÐÑли единиÑа оÑÑаеÑÑÑ
“занÑÑой” ÑлиÑком долго,
ÑÑанÑиÑ, на коÑоÑой ее взÑли, можеÑ
пÑоинÑоÑмиÑоваÑÑ ÑенÑÑ; в ÑÑом ÑлÑÑае
она могла Ð±Ñ Ð½ÐµÐ¼ÐµÐ´Ð»ÐµÐ½Ð½Ð¾ ÑообÑиÑÑ Ð¾
лиÑноÑÑи Ñого, кÑо взÑл ÑÑÑ ÐµÐ´Ð¸Ð½Ð¸ÑÑ.</p>
+</div>
-<h3>ÐеÑÑ Ð¿ÑоÑив коммÑникаÑионнÑÑ
доÑÑе</h3>
+<h3 class="subheader">ÐеÑÑ Ð¿ÑоÑив коммÑникаÑионнÑÑ
доÑÑе</h3>
+<div class="columns">
<p>ÐоÑÑавÑики ÑÑлÑг ÐнÑеÑнеÑа и ÑелеÑоннÑе
компании Ñ
ÑанÑÑ Ð¾Ð±ÑиÑнÑе ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾
конÑакÑаÑ
ÑвоиÑ
полÑзоваÑелей (пÑоÑмоÑÑ
ÑÑÑÐ°Ð½Ð¸Ñ ÐнÑеÑнеÑа, ÑелеÑоннÑе вÑзовÑ
и Ñ.д.). ÐÐ»Ñ ÑоÑовÑÑ
ÑелеÑонов они <a
@@ -433,9 +465,11 @@
ÑлекÑÑонной поÑÑÑ Ð±Ñло Ð±Ñ Ð¸Ð·Ð²ÐµÑÑно ÑолÑко
Ñо, ÑÑо Ð²Ñ Ð¿Ð¾Ñлали ÑообÑение
какомÑ-Ñо полÑзоваÑÐµÐ»Ñ Ð¼Ð¾ÐµÐ¹ ÑлÑжбÑ
ÑлекÑÑонной поÑÑÑ, но бÑло Ð±Ñ ÑÑÑдно
опÑеделиÑÑ, ÑÑо Ð²Ñ Ð¿Ð¾Ñлали ÑообÑение мне.</p>
+</div>
-<h3>Ðо иногда Ñлежка необÑ
одима</h3>
+<h3 class="subheader">Ðо иногда Ñлежка необÑ
одима</h3>
+<div class="columns">
<p>ÐÐ»Ñ ÑозÑÑка пÑеÑÑÑпников гоÑÑдаÑÑÑвÑ
необÑ
одима возможноÑÑÑ ÑаÑÑледоваÑÑ
конкÑеÑнÑе пÑеÑÑÑÐ¿Ð»ÐµÐ½Ð¸Ñ Ð¸Ð»Ð¸ конкÑеÑнÑе
покÑÑÐµÐ½Ð¸Ñ Ð¿Ð¾ оÑдеÑÑ Ð¸Ð· ÑÑда. С
пÑиÑ
одом ÐнÑеÑнеÑа полномоÑие
пÑоÑлÑÑиваÑÑ ÑелеÑоннÑе пеÑеговоÑÑ
еÑÑеÑÑвенно
@@ -473,9 +507,10 @@
<p>Ðднако жÑÑналиÑÑÐ¸ÐºÑ Ð½Ñжно заÑиÑаÑÑ Ð¾Ñ
наблÑдениÑ, даже еÑли она ведеÑÑÑ Ð²
Ñ
оде пÑедпÑинимаÑелÑÑкой деÑÑелÑноÑÑи.</p>
+</div>
+<div class="column-limit"></div>
-<hr />
-
+<div class="reduced-width">
<p>ЦиÑÑÐ¾Ð²Ð°Ñ ÑеÑ
ника пÑинеÑла Ñ Ñобой
ÑмопомÑаÑиÑелÑнÑй ÑоÑÑ ÑÑÐ¾Ð²Ð½Ñ Ñлежки за
наÑими пеÑедвижениÑми, дейÑÑвиÑми и
пеÑеговоÑами. Ðн гоÑаздо вÑÑе ÑÑÐ¾Ð²Ð½Ñ Ñой
Ñлежки, коÑоÑÑÑ Ð¼Ñ Ð¸ÑпÑÑÑвали на Ñебе в
девÑноÑÑÑе Ð³Ð¾Ð´Ñ XX века, <a
@@ -496,6 +531,8 @@
неÑ
ваÑки Ñлежки и Ð´Ð¾Ð»Ð¶Ð½Ñ Ð±ÑÑÑ Ð¿Ð¾Ð´ более
ÑÑÑогим надзоÑом, Ñем СовеÑÑкий СоÑз
и ÐоÑÑоÑÐ½Ð°Ñ ÐеÑманиÑ, нам нÑжно веÑнÑÑÑ
ÑÑÐ¾Ñ ÑÑÐ¾Ð²ÐµÐ½Ñ Ð½Ð° пÑежние позиÑии. ÐлÑ
ÑÑого ÑÑебÑеÑÑÑ Ð¾ÑÑановиÑÑ Ð¼Ð°ÑÑовÑй ÑбоÑ
даннÑÑ
о лÑдÑÑ
.</p>
+</div>
+</div>
<div class="translators-notes">
@@ -571,7 +608,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2016/10/23 10:58:35 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: surveillance-vs-democracy.sq.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.sq.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- surveillance-vs-democracy.sq.html 1 Nov 2016 17:27:59 -0000 1.19
+++ surveillance-vs-democracy.sq.html 6 Nov 2016 21:28:14 -0000 1.20
@@ -6,19 +6,32 @@
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Sa Mbikëqyrje Mund të Përballojë Demokracia? - Projekti GNU - Free
Software
Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+-->
+</style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.sq.html" -->
-<h2>Sa Mbikëqyrje Mund të Përballojë Demokracia?</h2>
+<h2 class="center">Sa Mbikëqyrje Mund të Përballojë Demokracia?</h2>
-<p>nga <a href="http://www.stallman.org/">Richard Stallman</a></p>
+<p class="byline center">nga <a href="http://www.stallman.org/">Richard
Stallman</a></p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>Një version i këtij artikulli u botua së pari në Wired, në
Tetor 2013.</p></blockquote>
+<blockquote class="center"><p>Një version i këtij artikulli u botua së pari
në Wired, në Tetor 2013.</p></blockquote>
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Karikaturë e një qeni që hap sytë
i çuditur para tre reklamave që u shfaqën
në ekranin e tij të kompjuterit..." /></a>
@@ -34,7 +47,8 @@
duhet të sigurohemi të mos tejkalohet? Ãshtë niveli përtej të cilit
mbikëqyrja fillon e plekset me funksionimin e demokracisë, pra kur
nxjerrësit e sekreteve (të tillë si Snowden-i) ka shumë gjasa të
zbulohen.</p>
-
+</div>
+<div class="columns" style="clear:both">
<p>Të përballur me fshehtësinë e qeverive, ne populli varemi nga
nxjerrësit e
sekreteve <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">të
na rrëfejnë se çfarë po bën shteti</a>. Por mbikëqyrja e sotme i tremb
@@ -64,9 +78,11 @@
mjaftojë për të mbrojtur nxjerrësit e sekreteve, nëse “kapja e
nxjerrësit të sekreteve” është përligjje për të patur akses të
mjaftueshëm për identifikimin e tyre. Na duhet të shkojmë më tej.</p>
+</div>
-<h3>Kufiri i Sipërm i Mbikëqyrjes në një Demokraci</h3>
+<h3 class="subheader" style="clear: both">Kufiri i Sipërm i Mbikëqyrjes në
një Demokraci</h3>
+<div class="columns">
<p>Nëse nxjerrësit e sekreteve nuk guxojnë të bëjnë të njohura krime dhe
gënjeshtra, humbasim grimën e fundit të kontrollit të efektshëm mbi
qeverinë
dhe institucionet tona. Ky është shpjegimi pse mbikëqyrja që i bën të
@@ -95,9 +111,11 @@
qeverive të ShBA-ve, me pretekstin se mes tyre mund të ketë terroristë.
Pika ku mbikëqyrja bëhet e tepruar është pika kur shteti mund të gjejë se
kush ka folur me një gazetar të njohur ose me një disident të njohur.</p>
+</div>
-<h3>Informacioni, Pasi Mblidhet, Do Të Keqpërdoret</h3>
+<h3 class="subheader">Informacioni, Pasi Mblidhet, Do Të Keqpërdoret</h3>
+<div class="columns">
<p>Kur njerëzit e pranojnë se niveli i mbikëqyrjes së përgjithshme
është shumë
i lartë, përgjigja e parë është të propozojnë kufij për hyrjen në të
dhënat
e grumbulluara. Kjo duket gjë e mirë, por nuk do ta zgjidhë problemin, as
@@ -150,9 +168,11 @@
ekspedita masive peshkimi kundër cilitdo person. Që gazetaria dhe
demokracia të jenë të parrezikuara, na duhet të kufizojmë grumbullimin e
të
dhënave në të cilat shteti futet lehtësisht.</p>
+</div>
-<h3>Mbrojtja e Fuqishme Për Privatësinë Duhet Të Jetë Teknike</h3>
+<h3 class="subheader">Mbrojtja e Fuqishme Për Privatësinë Duhet Të Jetë
Teknike</h3>
+<div class="columns">
<p>Electronic Frontier Foundation dhe të tjera organizma propozojnë një grup
parimesh ligjore të konceptuara për <a
href="https://en.necessaryandproportionate.org/text">parandalimin e
@@ -181,9 +201,11 @@
e para mbikëqyrjen, dhe do të mblidhte të dhëna duke u nisur nga ajo datë.
Sa për pezullimin ose shpërfilljen përkohësisht të këtij ligji, ideja
zor se
do të kish kuptim.</p>
+</div>
-<h3>Së Pari, Mos u Bëni të Marrë</h3>
+<h3 class="subheader">Së Pari, Mos u Bëni të Marrë</h3>
+<div class="columns">
<p>Që të keni privatësi, nuk duhet ta hidhni tej: i pari që duhet të
mbrojë
privatësinë tuaj jeni ju vetë. Shmangni identifikimin e vetes në sajte,
përdorini ata përmes Tor-it, dhe përdorni shfletues që i bllokojnë skemat
që
@@ -224,9 +246,11 @@
gjithëve. Pa mëdyshje, zgjidhja më e mirë është të bëhen tërë këta
sisteme
të reshtin mbikëqyrjen e njerëzve për krejt rastet e tjera, hiq ato për
dyshime të përligjura.</p>
+</div>
-<h3>Ãdo Sistem Duhet Ta Hartojmë Me Privatësinë Në Mendje</h3>
+<h3 class="subheader">Ãdo Sistem Duhet Ta Hartojmë Me Privatësinë Në
Mendje</h3>
+<div class="columns">
<p>Nëse nuk duam një shoqëri mbikëqyrjeje tërësore, duhet ta
konsiderojmë
mbikëqyrjen një lloj ndotjeje sociale, dhe ta kufizojmë ndikimin e
mbikëqyrjes prej çdo sistemi të ri dixhital po njësoj siç kufizojmë
ndikimin
@@ -245,9 +269,11 @@
mbikëqyrje!</p>
<p>Na duhet të hartojmë të tillë privatësi në krejt sistemet tona
dixhitale.</p>
+</div>
-<h3>Kurë për Grumbullimin e të Dhënave: Të Lihen të Hapërdara</h3>
+<h3 class="subheader">Kurë për Grumbullimin e të Dhënave: Të Lihen të
Hapërdara</h3>
+<div class="columns">
<p>Një rrugë për ta bërë mbikëqyrjen të parrezikshme për privatësinë
është të
<a name="dispersal">mbahen të dhënat të shpërndara dhe në mënyrë të
tillë që
hyrja në to të jetë e paleverdishme</a>. Kamerat e dikurshme të sigurisë
@@ -282,9 +308,11 @@
sigurisë sheh brenda një dyqani, ose mbi një rrugë. Cilado kamera e
drejtuar
mbi hapësirën private të dikujt, nga dikush tjetër, cenon privatësinë,
por
ky është problem tjetër.</p>
+</div>
-<h3 id="digitalcash">Kurë për Mbikëqyrje Internet Nga Tregtia</h3>
+<h3 id="digitalcash" class="subheader">Kurë për Mbikëqyrje Internet Nga
Tregtia</h3>
+<div class="columns">
<p>Shumica e të dhënave vjen nga veprimtaritë dixhitale të vetë njerëzve.
Zakonisht të dhënat grumbullohen së pari nga kompanitë. Por kur vjen fjala
për kërcënimin e privatësisë dhe demokracisë, nuk ka dallim mes
mbikëqyrjes
@@ -341,9 +369,11 @@
keqpërdorin. Kjo përfshin hollësi kartash krediti të konsumatorëve. Një
sistem pagesash anonime do tâi jepte fund këtij rreziku: një e çarë
sigurie
te sajti nuk do tâju bënte dëm, nëse sajti nuk di asnjë gjë rreth
jush.</p>
+</div>
-<h3>Kurë për Mbikëqyrjen e Udhëtimeve</h3>
+<h3 class="subheader">Kurë për Mbikëqyrjen e Udhëtimeve</h3>
+<div class="columns">
<p>Duhet ta shndërrojmë mbledhjen e pagesave dixhitale të lidhura me
udhëtimet
në mbledhje pagesash anonime (duke përdorur para dixhitale, për shembull).
Sistemet e leximit të targave regjistrojnë të tëra targat, dhe <a
@@ -399,9 +429,11 @@
gjithçka rreth transaksionit. Nëse një objekt mbetet “i
dhënë”
për një kohë të gjatë, stacioni nga u mor me qira mund të njoftojë
qendrën;
në këtë rast, mund ta dërgojë identitetin e qiramarrësit menjëherë.</p>
+</div>
-<h3>Kurë për Dosjet e Komunikimeve</h3>
+<h3 class="subheader">Kurë për Dosjet e Komunikimeve</h3>
+<div class="columns">
<p>Mundësuesit e shërbimeve Internet dhe kompanitë telefonike ruajnë të
dhëna
të zgjeruara mbi kontaktet e përdoruesve të tyre (shfletim, thirrje
telefonike, etj). Me telefonat celularë, ata <a
@@ -443,9 +475,11 @@
email do të dinte vetëm se unë kam marrë email prej një përdoruesi të
shërbimit tuaj email, por do të ishte e vështirë të përcaktohej se
email-in
ma keni dërguar mua.</p>
+</div>
-<h3>Ca Mbikëqyrje Ama Ãshtë e Nevojshme</h3>
+<h3 class="subheader">Ca Mbikëqyrje Ama Ãshtë e Nevojshme</h3>
+<div class="columns">
<p>Që shteti të gjejë keqbërësit, lypset të jetë në gjendje të
hetojë krime
specifike, ose dyshime për krime specifike të planifikuara, me një urdhër
gjykate. Me Internetin, aftësia për të përgjuar bashkëbisedimet
telefonike
@@ -480,9 +514,10 @@
<p>Sido që të jetë, gazetaria duhet të mbrohet nga mbikëqyrja edhe kur
kryhet
si pjesë e një biznesi.</p>
+</div>
+<div class="column-limit"></div>
-<hr />
-
+<div class="reduced-width">
<p>Teknologjia dixhitale ka sjellë një rritje të tmerrshme të nivelit të
mbikëqyrjes së lëvizjeve, veprimeve dhe komunikimeve tona. Bëhet fjalë
për
shumë më tepër se sa patëm provuar në vitet â90, dhe <a
@@ -503,6 +538,8 @@
lira kanë vuajtur dikur nga deficite të rënda të mbikëqyrjes, dhe se duhej
të përgjoheshin më shumë se sa qenë përgjuar Bashkimi Sovjetik dhe
Gjermania
Lindore. Kjo lyp ndaljen e grumbullimit masiv të të dhënave rreth
njerëzve.</p>
+</div>
+</div>
<div class="translators-notes">
@@ -578,7 +615,7 @@
<p class="unprintable"><!-- timestamp start -->
U përditësua më:
-$Date: 2016/11/01 17:27:59 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: surveillance-vs-democracy.uk.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.uk.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- surveillance-vs-democracy.uk.html 24 Oct 2016 08:58:31 -0000 1.17
+++ surveillance-vs-democracy.uk.html 6 Nov 2016 21:28:14 -0000 1.18
@@ -3,7 +3,7 @@
https://www.gnu.org/philosophy/po/surveillance-vs-democracy.uk.po</a>'
--><!--#set var="ORIGINAL_FILE"
value="/philosophy/surveillance-vs-democracy.html"
--><!--#set var="DIFF_FILE"
value="/philosophy/po/surveillance-vs-democracy.uk-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2016-08-25" --><!--#set
var="ENGLISH_PAGE" value="/philosophy/surveillance-vs-democracy.en.html" -->
+ --><!--#set var="OUTDATED_SINCE" value="2016-08-25" -->
<!--#include virtual="/server/header.uk.html" -->
<!-- Parent-Version: 1.77 -->
@@ -557,7 +557,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðновлено:
-$Date: 2016/10/24 08:58:31 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
Index: po/right-to-read.ar.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ar.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- po/right-to-read.ar.po 18 Oct 2016 16:29:49 -0000 1.54
+++ po/right-to-read.ar.po 6 Nov 2016 21:28:14 -0000 1.55
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2011-01-21 13:51+0200\n"
"Last-Translator: Hicham <address@hidden>\n"
"Language-Team: Arabic <>\n"
@@ -52,7 +52,7 @@
"<strong>Communications of the ACM</strong> (اÙÙ
جÙد 40Ø Ø±ÙÙ
2).</em>
"
# type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -61,7 +61,7 @@
"Ù
جÙ
Ùعة Ù
ÙاÙات تتÙاÙ٠بداÙات اÙØ«Ùرة
اÙتØررÙØ©Ø ÙÙشرت ÙÙ Ù
دÙÙØ© اÙÙÙ
ر عاÙ
2096."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -73,7 +73,7 @@
"Ù
Ùتص٠اÙعاÙ
. ÙÙ
تجرؤ عÙ٠اÙØ·Ùب Ù
٠أØد سÙÙ
داÙ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -89,7 +89,7 @@
"ÙØ®Ø§Ø·Ø¦Ø ØªØµØ±Ù Ùا ÙÙعÙ٠إÙا اÙÙراصÙØ©."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -109,7 +109,7 @@
"ÙÙابد اÙصعاب ÙÙ
Ùع ÙÙÙع اÙجرÙÙ
Ø©."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -129,7 +129,7 @@
"تساعد٠أÙراÙ٠اÙبØØ«ÙØ© -إذا Ùثر اÙاستشÙاد
بÙا- Ù٠تسدÙد اÙÙرض). "
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -146,7 +146,7 @@
"اÙÙصÙ٠اÙÙ
جاÙ٠إÙ٠اÙÙ
ؤÙÙات اÙعÙÙ
ÙØ© Ø£Ù
تزÙÙ Ù
٠اÙذاÙرة."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -164,7 +164,7 @@
"عاÙ
2047Ø Ùا٠ÙراÙÙ Ù٠اÙسجÙØ Ùا Ùأج٠ÙرصÙØ©
اÙÙØ±Ø§Ø¡Ø©Ø Ø¨Ù ÙاستخداÙ
اÙÙ
ÙÙØ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -180,7 +180,7 @@
"ÙاÙÙÙÙØ©Ø Ùأرس٠Ù
Ø·ÙرÙا اÙÙ
ÙÙØات Ø¥Ù٠اÙسجÙ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -193,7 +193,7 @@
"استخداÙ
Ù ÙÙÙ
ا عدا تدرÙبات اÙØصة."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "It was also possible to bypass the copyright monitors by installing a "
@@ -221,7 +221,7 @@
"بÙا."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -233,7 +233,7 @@
"Ø·Ùبت Ù
Ù٠اÙÙ
Ø³Ø§Ø¹Ø¯Ø©Ø ÙÙد ÙعÙÙ Ùذا Ø£ÙÙا تØبÙ
Ø£ÙضÙا."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -247,7 +247,7 @@
"بÙÙغت ÙÙزا عÙÙ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -265,7 +265,7 @@
"عÙÙÙ. ÙÙد اÙترضÙا Ø£Ù٠تÙÙÙ
بشÙØ¡ Ù
Ù
ÙÙØ¹Ø ÙÙا
ÙÙÙ
ÙÙ
Ù
عرÙØ© Ù
ا ÙÙ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -275,7 +275,7 @@
"Ø£ÙظÙ
Ø© اÙجاÙ
عة اÙØاسÙبÙØ©Ø ÙÙØ®ÙÙÙÙ ØتÙ
Ùا ÙÙ
ÙÙ Ù
ÙادÙÙ
."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -289,7 +289,7 @@
"Ù
Ù ÙÙش٠بÙÙ
."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -307,20 +307,20 @@
"أبعدتÙÙ
Ùد SPA اÙÙ
Ù
تدة. عÙدÙ
ا بدأت Ø«Ùرة تÙØ®Ù
عاÙ
2062Ø Ø£ØµØ¨Ø Ø٠اÙÙراءة "
"اÙعاÙ
Ø© Ø£Øد رÙائزÙا."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list "
"about the dangers of e-books</a>."
msgstr ""
# type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
#, fuzzy
#| msgid "Author's Note"
msgid "Author's Notes"
msgstr "تعÙÙ٠اÙÙ
ؤÙÙ"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -330,7 +330,7 @@
"philosophy/words-to-avoid.html#Piracy\">“Piracy”</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -339,14 +339,14 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "[This note has been updated several times since the first publication of "
@@ -357,7 +357,7 @@
msgstr "[تÙ
تØدÙت Ùذ٠اÙÙ
ÙاØظة عدة Ù
رت Ù
ÙØ° Ø£ÙÙ
Ùشر ÙÙÙصة..]"
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The right to read is a battle being fought today. Although it may take "
@@ -390,7 +390,7 @@
"تعÙÙÙ
ات تتعÙ٠بØÙÙ٠اÙÙشر عاÙ
2001. ÙÙعتبر اÙ
تÙا٠Ùسخة Ù
٠برÙاÙ
ج DeCSS اÙØر "
"ÙÙ٠تعÙ
ÙØ© اÙدÙÙÙدÙات جرÙÙ
Ø© ÙÙ ÙرÙسا تØت
ÙاÙÙÙ DADVSI اÙذ٠اعتÙ
د عاÙ
2006."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -401,7 +401,7 @@
"these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -412,14 +412,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -429,7 +429,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -455,7 +455,7 @@
"DefectiveByDesign.org\">دÙ
ÙرÙا تصÙ
ÙÙ
Ùا</a>."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "One of the ideas in the story was not proposed in reality until 2002. "
@@ -470,7 +470,7 @@
"<abbr>FBI</abbr> ÙÙ
اÙÙرÙسÙÙت بÙÙÙ
ات سر اÙجذر عÙÙ
ØÙاسÙب٠اÙشخصÙØ© ÙعدÙ
"
"إعطائÙا ÙÙ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
@@ -478,7 +478,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -502,7 +502,7 @@
"اÙØ°Ù ÙÙÙ
ÙÙÙ Ù
اÙÙرÙسÙÙت (ÙØ£Ù Ù
ÙÙع Ùب ÙتعاÙÙ
Ù
ع Ù
اÙÙرÙسÙÙت) Ù
٠اÙتØÙÙ
اÙÙاÙ
٠بÙ
ا "
"ÙÙ
ÙÙ ÙÙÙ
ستخدÙ
Ù ÙعÙ٠باÙØاسÙب اÙØ°Ù ÙÙ
ÙÙÙ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -512,7 +512,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "When this story was first written, the SPA was threatening small Internet "
@@ -537,7 +537,7 @@
"Ø¥Ùا Ø£Ù SPA سØبت اÙÙضÙØ© ÙاØÙÙØ§Ø ÙÙÙ DMCA أعطاÙÙ
اÙÙÙØ© اÙت٠ÙاÙÙا ÙسعÙ٠إÙÙÙا."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The SPA, which actually stands for Software Publishers Association, has "
@@ -564,7 +564,7 @@
"اÙتخÙÙÙÙØ© Ù٠اÙأرجتÙÙ٠إÙ٠تÙدÙدات ضÙ
ÙÙØ©
باÙتÙا٠عرض Ù
Ù Ùتشار٠اÙبرÙ
جÙات. "
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -574,7 +574,7 @@
"Ùذ٠اÙرساÙØ© عÙد اÙدخÙÙ:"
# type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -597,7 +597,7 @@
"أ٠اÙسÙطات اÙÙاÙÙÙÙØ©."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -605,11 +605,11 @@
"Ø¥Ù Ùذا ÙÙاÙتزاÙ
رائع باÙتعدÙ٠اÙرابع<sup><a
href=\"#fourth\">3</a></sup>: "
"اضغط عÙ٠اÙجÙ
Ùع ÙÙÙاÙÙÙا Ù
سبÙا عÙÙ
اÙتÙاز٠ع٠ÙÙ ØÙÙÙÙÙ
تØتÙ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The battle for the right to read is already in progress, The enemy is "
@@ -624,7 +624,7 @@
"ÙاÙرÙابة اÙØ¥ÙÙترÙÙÙØ©. ÙÙد بدأت اÙÙ
عرÙØ©
اÙØ¢ÙØ ÙÙا ÙصÙتÙÙ ÙÙ
ÙاÙتÙ٠ع٠اÙتÙÙÙات "
"اÙت٠Ùجر٠تطÙÙرÙا ÙØرÙ
اÙÙ Ù
Ù ØÙÙ ÙÙ
اÙÙراءة."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -635,31 +635,31 @@
"for rejecting the product completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -671,7 +671,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we want to stop the bad news and create some good news, we need to "
"organize and fight. Subscribe to the FSF's <a href=\"http://"
@@ -682,12 +682,12 @@
msgstr ""
# type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Ù
راجع"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -701,7 +701,7 @@
"[sic] Rights (1995)</span>"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -712,7 +712,7 @@
"Wired, Jan. 1996"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -720,7 +720,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -731,7 +731,7 @@
"Private Data</a>, Washington Post, 4 Nov 1996"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.public-domain.org/\">Union for the Public Domain</"
@@ -746,30 +746,19 @@
"a>—Ù
ÙظÙ
Ø© تÙد٠إÙÙ Ù
ÙاÙÙ
Ø© Ùاستعادة تÙسÙع
ÙÙØ© ØÙÙ٠اÙÙشر Ùبراءة اÙاختراع "
"اÙزائد ع٠ØدÙ."
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Ùذ٠اÙÙصÙØØ© ÙÙشرت ÙÙ <a
href=\"http://shop.fsf.org/product/free-software-free-"
-"society/\"><cite>Ù
جتÙ
ع اÙبرÙ
جÙات اÙØرة: ÙØµØ§Ø¦Ø Ù
ÙتÙاة Ù
٠رÙتشارد Ø¥Ù
. ستÙÙÙ
Ù</"
-"cite></a>."
-
# type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "ÙصÙص أخرÙ"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">ÙÙسÙØ© Ù
شرÙع
غÙÙ</a>"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.computerworld.com/s/article/49358/"
@@ -784,6 +773,17 @@
"Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">Copy Protection: Just "
"Say No</a>Ø Ù
ÙشرÙØ© ÙÙ Computer World."
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Ùذ٠اÙÙصÙØØ© ÙÙشرت ÙÙ <a
href=\"http://shop.fsf.org/product/free-software-free-"
+"society/\"><cite>Ù
جتÙ
ع اÙبرÙ
جÙات اÙØرة: ÙØµØ§Ø¦Ø Ù
ÙتÙاة Ù
٠رÙتشارد Ø¥Ù
. ستÙÙÙ
Ù</"
+"cite></a>."
+
# type: Content of: <div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
Index: po/right-to-read.bg.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.bg.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- po/right-to-read.bg.po 18 Oct 2016 16:29:49 -0000 1.53
+++ po/right-to-read.bg.po 6 Nov 2016 21:28:14 -0000 1.54
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2009-10-28 15:33+0200\n"
"Last-Translator: Yavor Doganov <address@hidden>\n"
"Language-Team: Bulgarian <address@hidden>\n"
@@ -49,7 +49,7 @@
"ÑпиÑаниеÑо <strong>Communications of the ACM</strong> (Ñом 40,
бÑой 2).</em>"
# type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -59,7 +59,7 @@
"пÑез 2096 г."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -72,7 +72,7 @@
"Ðан, койÑо ÑÑ Ð´Ð° Ñе оÑмели да помоли за
Ñова."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -90,7 +90,7 @@
"пиÑаÑиÑе пÑавÑÑ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -112,7 +112,7 @@
"ÑилиÑе Ñи да пÑедоÑвÑаÑи пÑеÑÑÑплениеÑо."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -137,7 +137,7 @@
"заема Ñи.)"
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -156,7 +156,7 @@
"пÑевÑÑнали в далеÑен Ñпомен."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -176,7 +176,7 @@
"заÑади пиÑаÑÑко ÑеÑене, а заÑади
пÑиÑежаниеÑо на дебÑгеÑ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -194,7 +194,7 @@
"дебÑгеÑиÑе били незаконни, а
ÑазÑабоÑÑиÑиÑе им били пÑаÑени в заÑвоÑа."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -210,7 +210,7 @@
"ÑнивеÑÑиÑеÑа."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "It was also possible to bypass the copyright monitors by installing a "
@@ -240,7 +240,7 @@
"ÑÑÑ
а да Ñи Ñ Ð´Ð°Ð´Ð°Ñ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -253,7 +253,7 @@
"знаÑеÑе, Ñе и ÑÑ Ð³Ð¾ обиÑа."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -268,7 +268,7 @@
"ÐдинÑÑвениÑÑ Ð½Ð°Ñин да ÑзнаÑÑ Ð±ÐµÑе, ако
ÐиÑа докладва за него."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -289,7 +289,7 @@
"какво ÑоÑно е."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -300,7 +300,7 @@
"неизменно Ñе пÑовалÑÑ
а по вÑиÑки
пÑедмеÑи."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -315,7 +315,7 @@
"вÑедни, а не пÑоÑÑо Ñези, коиÑо
пÑÐµÐ´Ð¸Ð·Ð²Ð¸ÐºÐ²Ð°Ñ ÑÑмнение."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -336,20 +336,20 @@
"на ÐÐС. ÐогаÑо пÑез 2062 г. Ñе вдигна бÑнÑа
на ТиÑ
о, вÑеобÑоÑо пÑаво да "
"ÑеÑÐµÑ ÑкоÑо Ñе пÑевÑÑна в една оÑ
оÑновниÑе Ð¼Ñ Ñели."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list "
"about the dangers of e-books</a>."
msgstr ""
# type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
#, fuzzy
#| msgid "Author's Note"
msgid "Author's Notes"
msgstr "Ðележка на авÑоÑа"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -359,7 +359,7 @@
"philosophy/words-to-avoid.html#Piracy\">“Piracy”</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -368,13 +368,13 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid "This note was updated in 2007."
msgid ""
@@ -383,7 +383,7 @@
msgstr "Тази бележка бе обновена пÑез 2007 г."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The right to read is a battle being fought today. Although it may take "
@@ -419,7 +419,7 @@
"пÑез 2006 г., ÑамоÑо пÑиÑежание на копие на
DeCSS (ÑвободнаÑа пÑогÑама за "
"деÑиÑÑиÑане на видео на DVD), е
пÑеÑÑÑпление."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -430,7 +430,7 @@
"these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -441,14 +441,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -458,7 +458,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -486,7 +486,7 @@
"DefectiveByDesign.org\">DefectiveByDesign.org</a>."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "One of the ideas in the story was not proposed in reality until 2002. "
@@ -500,7 +500,7 @@
"ÐдеÑÑа, Ñе <abbr>ФÐÐ </abbr> и âÐайкÑоÑоÑÑâ Ñе
дÑÑÐ¶Ð°Ñ Ð½Ð°Ð¹-важниÑе паÑоли на "
"пеÑÑоналниÑе компÑÑÑи и нÑма да ви ги
даваÑ, не бе пÑедложена до 2002 г."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
@@ -508,7 +508,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -534,7 +534,7 @@
"ÑайÑове, коиÑо Ñи коопеÑиÑÐ°Ñ Ñ ÑÑÑ
,
неогÑаниÑен конÑÑол вÑÑÑ
Ñ Ñова какво "
"поÑÑебиÑÐµÐ»Ñ Ð¼Ð¾Ð¶Ðµ да пÑави ÑÑÑ ÑобÑÑвениÑ
Ñи компÑÑÑÑ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -544,7 +544,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "When this story was first written, the SPA was threatening small Internet "
@@ -571,7 +571,7 @@
"койÑо им даваÑе влаÑÑÑа, коÑÑо иÑкаÑ
а."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The SPA, which actually stands for Software Publishers Association, has "
@@ -601,7 +601,7 @@
"\"#TransNote7\">7</a></sup>."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -612,7 +612,7 @@
"ÑледноÑо ÑÑобÑение пÑи ÑвÑÑзване:"
# type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -639,7 +639,7 @@
"оÑгани.â"
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -648,11 +648,11 @@
"СÐЩ<sup><a href=\"#TransNote8\">8</a></sup>: пÑиÑиÑкай
повеÑеÑо Ñ
оÑа "
"пÑедваÑиÑелно да Ñе оÑÐºÐ°Ð¶Ð°Ñ Ð¾Ñ Ð¿ÑаваÑа Ñи
по неÑ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The <a href=\"#AuthorsNote\">author's note</a> talks about the battle for "
@@ -668,7 +668,7 @@
"запоÑва Ñега, а еÑо и вÑÑзки кÑм две
ÑÑаÑии, за ÑеÑ
нологии, коиÑо Ñе "
"ÑазÑабоÑÐ²Ð°Ñ Ð² моменÑа, за да ви оÑнемаÑ
пÑавоÑо да ÑеÑеÑе."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -679,31 +679,31 @@
"for rejecting the product completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -715,7 +715,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we want to stop the bad news and create some good news, we need to "
"organize and fight. Subscribe to the FSF's <a href=\"http://"
@@ -726,12 +726,12 @@
msgstr ""
# type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "ÐÑепÑаÑки"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "The administration's “White Paper”: Information "
@@ -749,7 +749,7 @@
"Ðоклад на ÑабоÑнаÑа гÑÑпа за пÑаваÑа на
инÑелекÑÑална ÑобÑÑвеноÑÑ (1995)."
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -760,7 +760,7 @@
"СамÑелÑÑн, Ñп. Wired, ÑнÑаÑи 1996 г."
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -768,7 +768,7 @@
"<a
href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">ÐÑодадено</a>,
"
"ÐÐ¶ÐµÐ¹Ð¼Ñ Ðойл, в. âÐÑ ÐоÑк ТаймÑâ, 31 маÑÑ 1996
г."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -776,7 +776,7 @@
msgstr ""
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.public-domain.org/\">Union for the Public Domain</"
@@ -792,30 +792,19 @@
"Ñе пÑоÑивопоÑÑÐ°Ð²Ñ Ð¸ Ñе опиÑва да намали
пÑекомеÑноÑо ÑвелиÑаване на влаÑÑÑа "
"на авÑоÑÑкоÑо пÑаво и паÑенÑиÑе."
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Това еÑе е пÑбликÑвано в книгаÑа <a
href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Свободен ÑоÑÑÑеÑ,
Ñвободно обÑеÑÑво: избÑани "
-"еÑеÑа Ð¾Ñ Ð Ð¸ÑаÑд Ð. СÑолман</cite></a>."
-
# type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "ÐÑÑги ÑекÑÑове за ÑеÑене"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">ФилоÑоÑиÑÑа на
пÑоекÑа GNU</a>"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.computerworld.com/s/article/49358/"
@@ -830,6 +819,17 @@
"Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">ÐаÑиÑа ÑÑеÑÑ
копиÑане: "
"пÑоÑÑо кажи âнеâ</a>, пÑбликÑвано в Computer
World."
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Това еÑе е пÑбликÑвано в книгаÑа <a
href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Свободен ÑоÑÑÑеÑ,
Ñвободно обÑеÑÑво: избÑани "
+"еÑеÑа Ð¾Ñ Ð Ð¸ÑаÑд Ð. СÑолман</cite></a>."
+
# type: Content of: <div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
Index: po/right-to-read.ca.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ca.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- po/right-to-read.ca.po 18 Oct 2016 16:29:49 -0000 1.72
+++ po/right-to-read.ca.po 6 Nov 2016 21:28:14 -0000 1.73
@@ -8,7 +8,7 @@
msgstr ""
"Project-Id-Version: right-to-read.ca\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-09-18 13:01+0200\n"
"Last-Translator: Miquel Puigpelat <address@hidden>\n"
"Language-Team: Catalan\n"
@@ -46,7 +46,7 @@
"<cite>Communications of the ACM</cite> (Volum 40, Número 2).</em>"
# type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -55,7 +55,7 @@
"antecedents de la Revolució Lunà ria, publicat a Luna City el 2096."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -68,7 +68,7 @@
"semestral. No gosava demanar-lo a ningú, tret d'en Dan."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -85,7 +85,7 @@
"estava malament i era lleig, una cosa que només feien els pirates."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -108,7 +108,7 @@
"delicte."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -133,7 +133,7 @@
"sovint, li reportarien ingressos suficients per tornar el préstec)."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -152,7 +152,7 @@
"eren un vague record."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -173,7 +173,7 @@
"programari."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -191,7 +191,7 @@
"il·legals i els desenvolupadors de depuradors van acabar a la presó."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -205,7 +205,7 @@
"especial perquè només es pogués fer servir per als exercicis de classe."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It was also possible to bypass the copyright monitors by installing a "
"modified system kernel. Dan would eventually find out about the free "
@@ -224,7 +224,7 @@
"informació."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -238,7 +238,7 @@
"dir que ella també n'estava enamorada."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -254,7 +254,7 @@
"denunciava."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -277,7 +277,7 @@
"es tractava."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -288,7 +288,7 @@
"de manera que inevitablement suspenien totes les assignatures."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -304,7 +304,7 @@
"aixecaven sospites."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -325,7 +325,7 @@
"Tycho, el dret universal a llegir es va convertir rà pidament en un dels seus
"
"objectius centrals."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing "
@@ -338,11 +338,11 @@
"nostra llista de correu sobre els perills dels llibres electrònics</a>."
# type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr "Notes de l'autor"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -359,7 +359,7 @@
"<a href=\"/philosophy/words-to-avoid.html#Piracy\">“Pirateria”</"
"a>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -373,14 +373,14 @@
"Software Foundation ha iniciat la campanya <a href=\"http://"
"DefectiveByDesign.org\">Defective by Design</a>. Demanem el vostre suport. "
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The following note has been updated several times since the first "
"publication of the story."
@@ -389,7 +389,7 @@
"del conte."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The battle for the right to read is already being fought. Although it may "
"take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -411,7 +411,7 @@
"delicte. El 2001 la Unió Europea va imposar restriccions similars en una "
"directiva sobre el copyright, tot i que de manera menys forta."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -430,7 +430,7 @@
"salten la DRM és una de les moltes polÃtiques injustes que aquests tractats
"
"imposen en una à mplia varietat de camps."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
@@ -460,7 +460,7 @@
"als seus representants al congrés rebutjar l'intent d'aprovar el TPP "
"aprofitant el perÃode d'interinitat posterior a les eleccions de 2016."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
@@ -470,7 +470,7 @@
"indústria del copyright; està a punt d'aprovar un sistema DRM com a part "
"oficial de les especificacions web."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "Nonfree software tends to have <a href=\"/proprietary/\">abusive features "
@@ -491,7 +491,7 @@
"un programa no lliure</a>. Hem d'insistir en el programari lliure, i "
"rebutjar els programes no lliures."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "With Windows Vista, Microsoft admitted it had built in a back door: "
@@ -517,7 +517,7 @@
"els usuaris no poden eludir."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"One of the ideas in the story was not proposed in reality until 2002. This "
"is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -528,7 +528,7 @@
"sistema dels ordenadors personals, sense permetre que els usuaris les "
"tinguin."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
@@ -540,7 +540,7 @@
"segura”. "
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"What Microsoft keeps is not exactly a password in the traditional sense; no "
"person ever types it on a terminal. Rather, it is a signature and "
@@ -561,7 +561,7 @@
"malware-microsoft.html\">informa a l'Agència National de Seguretat dels "
"errors de seguretat de Windows</a> per a què els exploti."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -577,7 +577,7 @@
"això <em>arrancada restringida</em>."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"In 1997, when this story was first published, the SPA was threatening small "
"Internet service providers, demanding they permit the SPA to monitor all "
@@ -596,7 +596,7 @@
"la llei DMCA, que els donà el poder que cercaven."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The SPA, which actually stands for Software Publishers Association, has been "
"replaced in its police-like role by the Business Software Alliance. The BSA "
@@ -616,7 +616,7 @@
"dient-los que serien violats a la presó."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -627,7 +627,7 @@
"de Chicago mostren aquest missatge quan l'usuari obre una sessió:"
# type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -653,7 +653,7 @@
"autoritats università ries o a les forces de seguretat\"."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -662,11 +662,11 @@
"Constitució dels EUA: obligar els usuaris a renunciar, per endavant, als "
"drets que s'hi reconeixen."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "Males notÃcies"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The battle for the right to read is already in progress, The enemy is "
@@ -678,7 +678,7 @@
"La batalla per dret a llegir ja ha començat. L'enemic s'ha organitzat, i "
"nosaltres no, de manera que avança en contra nostra."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "Today's commercial ebooks <a href=\"/philosophy/the-danger-of-ebooks.html"
@@ -706,7 +706,7 @@
"orwellianes</a> demostrades. Qualsevol d'elles és suficient per rebutjar "
"completament el producte:"
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
@@ -716,11 +716,11 @@
"quina pà gina es troba, i sobre quan subratlla text i qualsevol nota que "
"introdueixi."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr "Incorpora DRM, amb la intenció d'impedir als usuaris compartir
còpies."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
@@ -729,7 +729,7 @@
"qualsevol llibre. L'any 2009 va esborrar milers de còpies de 1984, de George
"
"Orwell."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
@@ -739,7 +739,7 @@
"amb la qual Amazon pot canviar remotament el programari, i introduir "
"qualsevol altra funcionalitat repugnant."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "Amazon's e-book distribution is oppressive, too. It identifies the user "
@@ -765,7 +765,7 @@
"aixÃ, el mal menor seria ignorar-lo i compartir còpies igualment. No "
"obstant, per ser completament honestos, no haurÃem d'acceptar-lo
prèviament."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "If we want to stop the bad news and create some good news, we need to "
@@ -789,12 +789,12 @@
"finançar les nostres activitats."
# type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Referències"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -807,7 +807,7 @@
"Intellectual Property Rights (1995)."
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -818,7 +818,7 @@
"Wired, gener de 1996"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -826,7 +826,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 de març de 1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -837,7 +837,7 @@
"Private Data</a>, Washington Post, 4 de novembre de 1996."
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"https://web.archive.org/web/20151113122141/http://public-domain."
"org/\">Union for the Public Domain</a>—an organization which aims to "
@@ -848,30 +848,19 @@
"objectiu frenar i invertir l'ampliació desmesurada del poder del copyright i
"
"de les patents."
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Aquest assaig s'ha publicat al llibre <a href=\"http://shop.fsf.org/product/"
-"free-software-free-society/\"><cite>Free Software, Free Society: The "
-"Selected Essays of Richard M. Stallman</cite></a>."
-
# type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "Altres texts per llegir"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">Filosofia del Projecte GNU</a>"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.computerworld.com/article/2596679/networking/copy-"
"protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -881,6 +870,17 @@
"protection--just-say-no.html\" id=\"copy-protection\">Protecció anticòpia: "
"simplement digues no</a>, publicat a Computer World."
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Aquest assaig s'ha publicat al llibre <a href=\"http://shop.fsf.org/product/"
+"free-software-free-society/\"><cite>Free Software, Free Society: The "
+"Selected Essays of Richard M. Stallman</cite></a>."
+
# type: Content of: <div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
Index: po/right-to-read.cs-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.cs-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- po/right-to-read.cs-diff.html 18 Oct 2016 16:29:49 -0000 1.28
+++ po/right-to-read.cs-diff.html 6 Nov 2016 21:28:14 -0000 1.29
@@ -15,32 +15,69 @@
<title>The Right to Read
- GNU Project - Free Software <span class="removed"><del><strong>Foundation
(FSF)</title></strong></del></span> <span
class="inserted"><ins><em>Foundation</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
--></style></em></ins></span>
<!--#include <span
class="removed"><del><strong>virtual="/server/banner.html"</strong></del></span>
<span
class="inserted"><ins><em>virtual="/philosophy/po/right-to-read.translist"</em></ins></span>
-->
<!--#include <span
class="removed"><del><strong>virtual="/philosophy/po/right-to-read.translist"</strong></del></span>
<span
class="inserted"><ins><em>virtual="/server/banner.html"</em></ins></span> -->
-<h2>The Right to Read</h2>
+<span class="removed"><del><strong><h2>The</strong></del></span>
+<span class="inserted"><ins><em><h2 class="center">The</em></ins></span>
Right to Read</h2>
-<p>
+<span class="removed"><del><strong><p></strong></del></span>
+
+<span class="inserted"><ins><em><p class="byline
center"></em></ins></span>
by <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
-<span class="removed"><del><strong><div style="text-align: center;
font-size: 110%;text-shadow: 0 0 0.2em #fff; width: 300px; float: right;
margin: 12px; background-color: #a0f112; color: #353831; padding:
1em;"><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of
eBooks</a>.</div></strong></del></span>
+<span class="removed"><del><strong><div style="text-align: center;
font-size: 110%;text-shadow: 0 0 0.2em #fff; width: 300px; float: right;
margin: 12px; background-color: #a0f112; color: #353831; padding:
1em;"><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of eBooks</a>.</div>
-<p>
+<p></strong></del></span>
+<span class="inserted"><ins><em><p class="center"></em></ins></span>
<em>This article appeared in the February 1997 issue
of <span
class="removed"><del><strong><strong>Communications</strong></del></span>
<span class="inserted"><ins><em><cite>Communications</em></ins></span> of
the <span class="removed"><del><strong>ACM</strong></strong></del></span>
<span class="inserted"><ins><em>ACM</cite></em></ins></span> (Volume 40,
Number
2).</em></p>
-<span class="inserted"><ins><em><hr /></em></ins></span>
-<blockquote><p>
+<span
class="removed"><del><strong><blockquote><p></strong></del></span>
+<span class="inserted"><ins><em><hr class="thin" />
+
+<div class="article">
+<blockquote class="info center"><p></em></ins></span>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -76,7 +113,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -120,7 +160,10 @@
knowing your computer's root password. And neither
the <span class="removed"><del><strong><abbr title="Federal Bureau of
Investigation">FBI</abbr></strong></del></span> <span
class="inserted"><ins><em>FBI</em></ins></span> nor
Microsoft Support would tell you that.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -157,7 +200,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -172,8 +218,9 @@
<span class="removed"><del><strong><h3 id="AuthorsNote">Author's
Note</h3>
<p>[This</strong></del></span>
+<span class="inserted"><ins><em></div>
-<span class="inserted"><ins><em><div class="announcement">
+<div class="announcement">
<blockquote>
<p><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of e-books</a>.</p>
</blockquote>
@@ -182,35 +229,46 @@
<div id="AuthorsNote">
<h3>Author's Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the unjust forces that use “pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it forwards into something more visibly
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
<p>The Electronic Frontier Foundation, a separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>The following</em></ins></span> note has been updated several times
since the first
-publication of the <span
class="removed"><del><strong>story.]</p></strong></del></span> <span
class="inserted"><ins><em>story.</p></em></ins></span>
+publication of the <span
class="removed"><del><strong>story.]</p></strong></del></span> <span
class="inserted"><ins><em>story.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns"></em></ins></span>
<p>
The <span class="inserted"><ins><em>battle for the</em></ins></span> right to
read is <span class="removed"><del><strong>a battle</strong></del></span> <span
class="inserted"><ins><em>already</em></ins></span> being <span
class="removed"><del><strong>fought today.</strong></del></span> <span
class="inserted"><ins><em>fought.</em></ins></span> Although it
may take 50 years for our <span class="removed"><del><strong>present way of
life</strong></del></span> <span class="inserted"><ins><em>past
freedoms</em></ins></span> to fade into obscurity, most
@@ -223,40 +281,39 @@
<span class="inserted"><ins><em>computer-enforced restrictions
known</em></ins></span> as <span
class="removed"><del><strong>well).</strong></del></span> <span
class="inserted"><ins><em>DRM, by making the
distribution of programs that can break DRM a crime.</em></ins></span> The
European
Union imposed similar restrictions in a 2001 copyright <span
class="removed"><del><strong>directive. In France, under the DADVSI law
-adopted</strong></del></span> <span
class="inserted"><ins><em>directive,</em></ins></span> in <span
class="removed"><del><strong>2006, mere possession of a copy of DeCSS, the free
program
-to decrypt video on a DVD, is a crime.</p>
+adopted</strong></del></span> <span
class="inserted"><ins><em>directive,</em></ins></span> in <span
class="removed"><del><strong>2006, mere possession of</strong></del></span> a
<span class="removed"><del><strong>copy of DeCSS, the free program
+to decrypt video on a DVD, is a crime.</p></strong></del></span>
+<span class="inserted"><ins><em>form not quite as
strong.</p></em></ins></span>
<p>
-In 2001, Disney-funded Senator Hollings proposed a bill called the
-SSSCA that would require every new computer to have mandatory
-copy-restriction facilities that the user cannot bypass. Following
-the Clipper chip and similar US government key-escrow proposals, this
-shows</strong></del></span> a <span class="removed"><del><strong>long-term
trend: computer systems are increasingly set up to
-give absentees with clout control over the people actually using the
+<span class="removed"><del><strong>In 2001, Disney-funded Senator Hollings
proposed a bill called the
+SSSCA that would require every new computer</strong></del></span>
+<span class="inserted"><ins><em>The US campaigns</em></ins></span> to <span
class="removed"><del><strong>have mandatory
+copy-restriction facilities that</strong></del></span> <span
class="inserted"><ins><em>impose such rules on</em></ins></span> the <span
class="removed"><del><strong>user cannot bypass.
Following</strong></del></span> <span class="inserted"><ins><em>rest
of</em></ins></span> the <span class="removed"><del><strong>Clipper chip and
similar US government key-escrow proposals, this
+shows</strong></del></span> <span class="inserted"><ins><em>world through
+so-called “free trade” treaties.
+<a href="https://stallman.org/business-supremacy-treaties.html">
+Business-supremacy treaties</a> is</em></ins></span> a <span
class="removed"><del><strong>long-term trend: computer
systems</strong></del></span> <span class="inserted"><ins><em>more fitting term
for them, since
+they</em></ins></span> are <span class="removed"><del><strong>increasingly set
up</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to give <span
class="removed"><del><strong>absentees with clout control</strong></del></span>
<span class="inserted"><ins><em>business dominion</em></ins></span> over <span
class="removed"><del><strong>the people actually using the
computer system. The SSSCA was later renamed to the unpronounceable
-CBDTPA, which was glossed</strong></del></span>
-<span class="inserted"><ins><em>form not quite</em></ins></span> as <span
class="removed"><del><strong>the “Consume But Don't Try
+CBDTPA, which was glossed as the “Consume But Don't Try
Programming Act”.
-</p></strong></del></span> <span
class="inserted"><ins><em>strong.</p></em></ins></span>
+</p>
-<p>
-The <span class="removed"><del><strong>Republicans took control of the US
senate shortly thereafter.
+<p></strong></del></span> <span class="inserted"><ins><em>nominally
democratic
+states.</em></ins></span> The <span class="removed"><del><strong>Republicans
took control</strong></del></span> <span class="inserted"><ins><em>DMCA's
policy</em></ins></span> of <span class="removed"><del><strong>the US senate
shortly thereafter.
They are less tied to Hollywood than the Democrats, so they did not
-press these proposals. Now that the Democrats are back in control,
+press these proposals. Now</strong></del></span> <span
class="inserted"><ins><em>criminalizing programs</em></ins></span> that <span
class="removed"><del><strong>the Democrats are back in control,
the danger is once again higher.</p>
<p>
-In 2001 the</strong></del></span> US <span class="removed"><del><strong>began
attempting to use the proposed Free Trade Area of
-the Americas (FTAA) treaty</strong></del></span> <span
class="inserted"><ins><em>campaigns</em></ins></span> to impose <span
class="removed"><del><strong>the same</strong></del></span> <span
class="inserted"><ins><em>such</em></ins></span> rules on <span
class="removed"><del><strong>all the countries in</strong></del></span> the
<span class="removed"><del><strong>Western Hemisphere. The FTAA is
one</strong></del></span> <span
class="inserted"><ins><em>rest</em></ins></span> of the <span
class="inserted"><ins><em>world through</em></ins></span>
-so-called <span class="removed"><del><strong>free
-trade treaties, which</strong></del></span> <span
class="inserted"><ins><em>“free trade” treaties.
-<a href="https://stallman.org/business-supremacy-treaties.html">
-Business-supremacy treaties</a> is a more fitting term for them, since
-they</em></ins></span> are <span
class="removed"><del><strong>actually</strong></del></span> designed to give
business
-<span class="removed"><del><strong>increased power</strong></del></span> <span
class="inserted"><ins><em>dominion</em></ins></span> over <span
class="inserted"><ins><em>nominally</em></ins></span> democratic <span
class="removed"><del><strong>governments; imposing laws like the
-DMCA</strong></del></span>
-<span class="inserted"><ins><em>states. The DMCA's policy of criminalizing
programs that
-break DRM</em></ins></span> is <span
class="removed"><del><strong>typical</strong></del></span> <span
class="inserted"><ins><em>one</em></ins></span> of <span
class="removed"><del><strong>this spirit. The FTAA was effectively killed by
+In 2001 the US began attempting to use the proposed Free Trade Area of
+the Americas (FTAA) treaty to impose the same rules on all the countries in
+the Western Hemisphere. The FTAA</strong></del></span>
+<span class="inserted"><ins><em>break DRM</em></ins></span> is one of <span
class="removed"><del><strong>the so-called free
+trade treaties, which are actually designed to give business
+increased power over democratic governments; imposing laws like the
+DMCA is typical of this spirit. The FTAA was effectively killed by
Lula, President</strong></del></span> <span class="inserted"><ins><em>many
unjust policies that these treaties impose
across a wide range</em></ins></span> of <span
class="removed"><del><strong>Brazil, who rejected the DMCA requirement and
others.</p></strong></del></span> <span
class="inserted"><ins><em>fields.</p></em></ins></span>
@@ -279,23 +336,33 @@
Even the World Wide Web Consortium has fallen under the shadow of the
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which lead to the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
+<p class="inline-block">
With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span
class="removed"><del><strong>2003.</p></strong></del></span> <span
class="inserted"><ins><em>a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
downgrades. It can also order all machines running Vista to refuse to
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
-10 is no better</p></em></ins></span>
+10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns"></em></ins></span>
<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the <span
class="removed"><del><strong><abbr>FBI</abbr></strong></del></span>
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep
the
@@ -318,14 +385,15 @@
sense; no person ever types it on a terminal. Rather, it is a
signature and encryption key that corresponds to a second key stored
in your computer. This enables Microsoft, and potentially any web
-sites that cooperate with Microsoft, the ultimate control over what
-the user can do on <span
class="removed"><del><strong>his</strong></del></span> <span
class="inserted"><ins><em>per</em></ins></span> own <span
class="removed"><del><strong>computer.</p>
+sites that <span class="removed"><del><strong>cooperate with Microsoft, the
ultimate control over what
+the user can do on his own computer.</p>
<p>
-Vista also gives Microsoft additional powers; for
instance,</strong></del></span> <span
class="inserted"><ins><em>computer.</em></ins></span> Microsoft
-<span class="removed"><del><strong>can forcibly install upgrades, and it can
order all machines running
+Vista also gives Microsoft additional powers; for instance, Microsoft
+can forcibly install upgrades, and it can order all machines running
Vista to refuse to run a certain device driver. The main purpose of
-Vista's many restrictions</strong></del></span> is <span
class="inserted"><ins><em>likely</em></ins></span> to <span
class="removed"><del><strong>impose DRM (Digital Restrictions
+Vista's many restrictions</strong></del></span> <span
class="inserted"><ins><em>cooperate with Microsoft, the ultimate control over
what
+the user can do on per own computer. Microsoft</em></ins></span> is <span
class="inserted"><ins><em>likely</em></ins></span> to <span
class="removed"><del><strong>impose DRM (Digital Restrictions
Management)</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> that <span
class="removed"><del><strong>users can't overcome. The
threat</strong></del></span>
<span class="inserted"><ins><em>control on behalf</em></ins></span> of <span
class="removed"><del><strong>DRM is why we
have established</strong></del></span> the <span class="inserted"><ins><em>FBI
when asked: it
@@ -341,7 +409,12 @@
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
In 1997, when</em></ins></span> this story was first <span
class="removed"><del><strong>written,</strong></del></span> <span
class="inserted"><ins><em>published,</em></ins></span> the SPA was
threatening small Internet service providers, demanding they permit
@@ -359,8 +432,13 @@
reminiscent of the erstwhile Soviet Union, it invites people to inform
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p></em></ins></span>
+software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width"></em></ins></span>
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -382,12 +460,15 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
-<span class="inserted"><ins><em></li>
+<span class="inserted"><ins><em></div>
+</li>
</ul>
+<div class="column-limit"></div>
</div></em></ins></span>
<h3 id="BadNews">Bad News</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
The battle for the right to read is <span class="removed"><del><strong>already
in progress,</strong></del></span> <span class="inserted"><ins><em>going
against us so far.</em></ins></span>
The enemy is organized, <span
class="removed"><del><strong>while</strong></del></span> <span
class="inserted"><ins><em>and</em></ins></span> we are <span
class="removed"><del><strong>not, so it is going against us.
@@ -402,47 +483,47 @@
<span class="inserted"><ins><em>e-books</em></ins></span> <a
href="/philosophy/the-danger-of-ebooks.html"> abolish
readers' traditional <span
class="removed"><del><strong>freedoms.</a></li>
<li><a href="http://www.nature.com/nature_education/biology.html">
- A "biology textbook" web site</a></strong></del></span> <span
class="inserted"><ins><em>freedoms</a>. Amazon's e-book reader product,
+ A "biology textbook" web site</a> that you can access
only</strong></del></span> <span class="inserted"><ins><em>freedoms</a>.
Amazon's e-book reader product,
which I call the “Amazon Swindle” because it's designed to
swindle readers out of the traditional freedoms of readers of books,
-is run by software with several
-demonstrated <a href="/proprietary/malware-kindle-swindle.html">Orwellian
+is run</em></ins></span> by <span class="removed"><del><strong>signing
+ a</strong></del></span> <span class="inserted"><ins><em>software with
several
+demonstrated</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nature.com/principles/viewTermsOfUse">
+ contract not to lend</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-kindle-swindle.html">Orwellian
functionalities</a>. Any one of them calls for rejecting the product
completely:</p>
<ul>
-<li><p>It spies on everything the user does: it reports which book
the
-user is reading, and which page, and it reports when the user highlights
-text, and any notes the user enters.</p></li>
+<li><p>It spies on everything the user does:</em></ins></span> it
<span class="removed"><del><strong>to anyone
else</a>,</strong></del></span> <span class="inserted"><ins><em>reports
which book the
+user is reading, and</em></ins></span> which <span
class="inserted"><ins><em>page, and it reports when the user highlights
+text, and any notes</em></ins></span> the <span
class="removed"><del><strong>publisher</strong></del></span> <span
class="inserted"><ins><em>user enters.</p></li>
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon can remotely erase any
book.
-In 2009, it erased thousands of copies of 1984, by George
Orwell.</p></li>
-
-<li><p>In case all that isn't Orwellian enough, there is a
universal
-back door with which Amazon can remotely change the software, and
-introduce any other form of nastiness.</p></li>
+<li><p class="inline-block">It has a back door with which
Amazon</em></ins></span> can
+ <span class="removed"><del><strong>revoke at will.</li>
+<li><a
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151">Electronic
+ Publishing:</a> An article about distribution</strong></del></span>
<span class="inserted"><ins><em>remotely erase any book.
+In 2009, it erased thousands</em></ins></span> of <span
class="removed"><del><strong>books in
+ electronic form,</strong></del></span> <span
class="inserted"><ins><em>copies of 1984, by George Orwell.</p></li>
+
+<li><p class="inline-block">In case all that isn't Orwellian
enough, there is a universal
+back door with which Amazon can remotely change the
software,</em></ins></span> and <span class="removed"><del><strong>copyright
issues affecting</strong></del></span>
+<span class="inserted"><ins><em>introduce any other form of
nastiness.</p></li>
</ul>
-<p>Amazon's e-book distribution is oppressive, too. It identifies the
-user and records what books the user obtains. It also requires users
-to agree to an antisocial contract</em></ins></span> that <span
class="removed"><del><strong>you can access only by
signing</strong></del></span> <span class="inserted"><ins><em>they won't share
copies with
-others. My conscience tells me that, if I had agreed to
such</em></ins></span> a <span class="removed"><del><strong><a
href="http://www.nature.com/principles/viewTermsOfUse">
- contract not</strong></del></span>
-<span class="inserted"><ins><em>contract, the lesser evil would
be</em></ins></span> to <span
class="removed"><del><strong>lend</strong></del></span> <span
class="inserted"><ins><em>defy</em></ins></span> it <span
class="inserted"><ins><em>and share copies anyway;
-however,</em></ins></span> to <span class="removed"><del><strong>anyone
else</a>, which the publisher can
- revoke at will.</li>
-<li><a
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151">Electronic
- Publishing:</a> An article about distribution of
books</strong></del></span> <span class="inserted"><ins><em>be entirely good, I
should not agree to it</em></ins></span> in
- <span class="removed"><del><strong>electronic form, and copyright issues
affecting</strong></del></span> the <span
class="removed"><del><strong>right</strong></del></span> <span
class="inserted"><ins><em>first
-place. Therefore, I refuse</em></ins></span> to <span
class="removed"><del><strong>read
- a copy.</li>
+<p>Amazon's e-book distribution is oppressive, too. It
identifies</em></ins></span> the <span
class="removed"><del><strong>right</strong></del></span>
+<span class="inserted"><ins><em>user and records what books the user obtains.
It also requires users
+to agree to an antisocial contract that they won't share copies with
+others. My conscience tells me that, if I had agreed</em></ins></span> to
<span class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>such</em></ins></span> a <span
class="removed"><del><strong>copy.</li>
<li><a
href="http://www.microsoft.com/en-us/news/press/1999/Aug99/SeyboldPR.aspx">Books
- inside Computers:</a> Software</strong></del></span> <span
class="inserted"><ins><em>agree</em></ins></span> to <span
class="removed"><del><strong>control who can read
- books and documents on a PC.</li>
-</ul></strong></del></span> <span class="inserted"><ins><em>such
contracts, whether for
+ inside Computers:</a> Software</strong></del></span>
+<span class="inserted"><ins><em>contract, the lesser evil would
be</em></ins></span> to <span class="removed"><del><strong>control who can read
+ books</strong></del></span> <span class="inserted"><ins><em>defy
it</em></ins></span> and <span class="removed"><del><strong>documents on a
PC.</li>
+</ul></strong></del></span> <span class="inserted"><ins><em>share copies
anyway;
+however, to be entirely good, I should not agree to it in the first
+place. Therefore, I refuse to agree to such contracts, whether for
software, for e-books, for music, or for anything
else.</p></em></ins></span>
<p>If we want to stop the bad news and create some good news, we need
@@ -454,6 +535,7 @@
our work more generally. There is also a <a href="/help/help.html">list
of ways
to participate in</em></ins></span> our <span
class="removed"><del><strong>work.</strong></del></span> <span
class="inserted"><ins><em>work</a>.</em></ins></span>
</p>
+<span class="inserted"><ins><em></div></em></ins></span>
<h3 id="References">References</h3>
@@ -479,16 +561,15 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
-<span class="removed"><del><strong><h4>This</strong></del></span>
-<span class="inserted"><ins><em><blockquote id="fsfs"><p
class="big">This</em></ins></span> essay is published
+<span class="removed"><del><strong><hr />
+<h4>This essay is published
in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
Software, Free Society: The Selected Essays of Richard
-M. <span
class="removed"><del><strong>Stallman</cite></a>.</h4>
+M. Stallman</cite></a>.</h4>
-<p><strong>Other</strong></del></span> <span
class="inserted"><ins><em>Stallman</cite></a>.</p></blockquote>
+<p><strong>Other</strong></del></span>
-<h5>Other</em></ins></span> Texts to <span
class="removed"><del><strong>Read</strong></p></strong></del></span>
<span class="inserted"><ins><em>Read</h5></em></ins></span>
+<span class="inserted"><ins><em><h4>Other</em></ins></span> Texts to
<span
class="removed"><del><strong>Read</strong></p></strong></del></span>
<span class="inserted"><ins><em>Read</h4></em></ins></span>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -499,10 +580,15 @@
<span
class="removed"><del><strong>Published</strong></del></span>
<span class="inserted"><ins><em>published</em></ins></span> in
Computer World.</li>
</ul>
+</div>
-<span class="removed"><del><strong></div></strong></del></span>
+<span class="inserted"><ins><em><hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
-<span class="inserted"><ins><em></div><!-- for id="content", starts
in the include above --></em></ins></span>
+</div><!-- for id="content", starts in the include above
--></em></ins></span>
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -578,7 +664,7 @@
<p class="unprintable">Updated:</em></ins></span>
<!-- timestamp start -->
-$Date: 2016/10/18 16:29:49 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.cs.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.cs.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/right-to-read.cs.po 18 Oct 2016 16:29:49 -0000 1.29
+++ po/right-to-read.cs.po 6 Nov 2016 21:28:14 -0000 1.30
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2013-01-01 01:45+0100\n"
"Last-Translator: FrantiÅ¡ek KuÄera <address@hidden>\n"
"Language-Team: Czech <address@hidden>\n"
@@ -47,7 +47,7 @@
"<em>Tento Älánek se objevil v únoru 1997 ve vydánÃ
<strong>Communications of "
"the ACM</strong> (svazek 40, ÄÃslo 2).</em>"
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -55,7 +55,7 @@
"Z knihy <cite>Cesta k Tychu</cite>, souboru Älánků o pÅedchůdcÃch
Lunárnà "
"revoluce, publikováno v Luna City v roce 2096"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -67,7 +67,7 @@
"nemohla půjÄit jiný, nestihla by pololetnà projekt. KromÄ Dana tu nebyl "
"nikdo, koho by se odvážila zeptat. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -82,7 +82,7 @@
"samotný nápad ho nejprve Å¡okoval. Jako každý byl již od základnÃ
Å¡koly uÄen, "
"že sdÃlenà knih bylo oÅ¡klivé a Å¡patné â nÄco, co by dÄlali jen
piráti."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -102,7 +102,7 @@
"poÄÃtaÄe, by podstoupil nejtvrdÅ¡Ã trest â protože se nenamáhal
zabránit "
"zloÄinu. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -124,7 +124,7 @@
"že jeho vlastnà dokumenty, pokud by byly žádány, by mu vynesly dost na "
"zaplacenà té půjÄky.) "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -140,7 +140,7 @@
"požadovat poplatky za pÅÃstup. V roce 2047 již byly knihovny
nabÃzejÃcà "
"svobodný veÅejný pÅÃstup k akademické literatuÅe pouhou matnou
vzpomÃnkou."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -158,7 +158,7 @@
"zadlužené studenty ke zradÄ). V roce 2047 byl Frank ve vÄzenÃ, ne za "
"pirátské ÄtenÃ, ale za vlastnictvà debugeru. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -174,7 +174,7 @@
"jejich základnÃm použitÃm. To znamenalo, že byly ilegálnÃ; vývojáÅi
debugerů "
"skonÄili ve vÄzenÃ. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -187,7 +187,7 @@
"Dan použÃval v hodinách softwaru, byl držen za speciálnÃm firewallem,
takže "
"mohl být použÃván pouze pro cviÄenà pÅi výuce."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "It was also possible to bypass the copyright monitors by installing a "
@@ -215,7 +215,7 @@
"vaÅ¡emu poÄÃtaÄi. A ani <abbr title=\"Federal Bureau of
Investigation\">FBI</"
"abbr>, ani Microsoft, by vám ho neÅekli."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -227,7 +227,7 @@
"naplÅovala radostÃ. A to, že si vybrala jeho, aby ho požádala o pomoc,
by "
"mohlo naznaÄovat, že ho také miluje."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -240,7 +240,7 @@
"pro licence by si myslelo, že je Äetl on. Stále to byl zloÄin, ale SOA by
na "
"to automaticky nepÅiÅ¡la. Zjistila by to jen kdyby jim to Lissa oznámila."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -259,7 +259,7 @@
"vaÅ¡i kontrolu. Brali to tak, že jste dÄlali nÄco zakázaného, a
nepotÅebovali "
"vÄdÄt, co to bylo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -268,7 +268,7 @@
"Studenti za to nebyli obvykle vylouÄeni â alespoÅ ne pÅÃmo. MÃsto toho
"
"dostali zákaz pÅÃstupu ke Å¡kolnÃm poÄÃtaÄům, a tak bylo jisté, že
propadnou."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -282,7 +282,7 @@
"disciplÃnÄ; trestaly aktivity, které byly Å¡kodlivé, ne ty, které je
pouze "
"uvádÄli v podezÅenÃ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -301,7 +301,7 @@
"také utekli z dosahu dlouhé ruky SOA. Když v roce 2062 vypuklo povstánÃ
na "
"Tychu, jednÃm z hlavnÃch cÃlů bylo zÃskat veÅejné právo na ÄtenÃ."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing "
@@ -313,13 +313,13 @@
"<a href=\"http://defectivebydesign.org/ebooks.html\">PÅipojte se k naÅ¡Ã e-"
"mailové konferenci o nebezpeÄÃch eKnih</a>."
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
#, fuzzy
#| msgid "Author's Note"
msgid "Author's Notes"
msgstr "Autorova poznámka"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -329,7 +329,7 @@
"philosophy/words-to-avoid.html#Piracy\">“Piracy”</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -338,13 +338,13 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "This note has been updated several times since the first publication of "
@@ -355,7 +355,7 @@
msgstr ""
"Tato poznámka byla od původnÃho vydánà povÃdky nÄkolikrát
aktualizována."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The right to read is a battle being fought today. Although it may take "
@@ -389,7 +389,7 @@
"pÅijatý v roce 2006 pÅinesl, že pouhé drženà kopie DeCSS (svobodného "
"programu na deÅ¡ifrovánà videa na DVD) je považováno za zloÄin."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -400,7 +400,7 @@
"these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -411,14 +411,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -427,7 +427,7 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -452,7 +452,7 @@
"pÅekonat. Hrozba DRM je důvodem, proÄ jsme spustili kampaÅ <a
href=\"http://"
"DefectiveByDesign.org\"> Defective by Design</a>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "One of the ideas in the story was not proposed in reality until 2002. "
@@ -467,14 +467,14 @@
"pÅedstava, že by <abbr>FBI</abbr> a Microsoft mÄly rootovská hesla k
vašemu "
"poÄÃtaÄi a odmÃtali vám ho vydat."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
"into use, it is called “secure boot”."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -499,7 +499,7 @@
"potenciálnÄ jakémukoli webu, který spolupracuje s Microsoftem â
neomezenou "
"kontrolu nad tÃm, co uživatel může se svým vlastnÃm poÄÃtaÄem
dÄlat."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -508,7 +508,7 @@
"control. We call this <em>restricted boot</em>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "When this story was first written, the SPA was threatening small Internet "
@@ -534,7 +534,7 @@
"nakonecstáhla žalobu, ale zÃskala DMCA, která jim dala pravomoci, které "
"chtÄli."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The SPA, which actually stands for Software Publishers Association, has "
@@ -561,7 +561,7 @@
"kampaÅ v ArgentinÄ v roce 2001 lehce náznakem vyhrožovala, že lidé
sdÃlejÃcà "
"software budou znásilnÄni."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -570,7 +570,7 @@
"Universitnà bezpeÄnostnà politiky nejsou smyÅ¡lené. NapÅ. na jedné
universitÄ "
"v Chicagu zobrazovaly poÄÃtaÄe po pÅihlášenà následujÃcà hlášku:"
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -594,7 +594,7 @@
"pracovnÃci mohou poskytnout tyto důkazy orgánům University a/nebo
orgánům "
"Äinným v trestnÃm ÅÃzenÃ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -602,11 +602,11 @@
"To je zajÃmavý pÅÃstup ke Ätvrtému dodatku: nutit kohokoli k tomu, aby
se "
"pÅedem zÅekl svých práv daných tÃmto dodatkem."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "Špatné zprávy"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The battle for the right to read is already in progress, The enemy is "
@@ -621,7 +621,7 @@
"což nás oslabuje. Zde jsou Älánky o Å¡patnostech, které se staly od
prvnÃho "
"vydánà tohoto Älánku."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -632,31 +632,31 @@
"for rejecting the product completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -668,7 +668,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "If we want to stop the bad news and create some good news, we need to "
@@ -690,11 +690,11 @@
"zvednÄte ruku. A <a href=\"http://www.fsf.org/associate\">pÅipojte se k
FSF</"
"a> a pomozte financovat naši práci."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Odkazy"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -706,7 +706,7 @@
"Information Infrastructure: The Report of the Working Group on Intellectual "
"Property [sic] Rights (1995)."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -716,7 +716,7 @@
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
"Wired, Jan. 1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -724,7 +724,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -734,7 +734,7 @@
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
"Private Data</a>, Washington Post, 4 Nov 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.public-domain.org/\">Union for the Public Domain</"
@@ -749,26 +749,16 @@
"organizace, která si klade za cÃl odvracet nadmÄrné rozÅ¡iÅovánÃ
copyrightové "
"a patentové moci."
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Tato esej vyšla v knize <a href=\"http://shop.fsf.org/product/free-software-"
-"free-society/\"><cite>Free Software, Free Society: The Selected Essays of "
-"Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "DalÅ¡Ã texty ke ÄtenÃ"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">Filosofie projektu GNU</a>"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.computerworld.com/s/article/49358/"
@@ -783,6 +773,16 @@
"Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">Copy Protection: Just "
"Say No</a>, vyšlo v Computer Worldu."
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Tato esej vyšla v knize <a href=\"http://shop.fsf.org/product/free-software-"
+"free-society/\"><cite>Free Software, Free Society: The Selected Essays of "
+"Richard M. Stallman</cite></a>."
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/right-to-read.de-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.de-en.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- po/right-to-read.de-en.html 28 Oct 2016 11:58:13 -0000 1.50
+++ po/right-to-read.de-en.html 6 Nov 2016 21:28:14 -0000 1.51
@@ -3,30 +3,60 @@
<title>The Right to Read
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
--></style>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<h2 class="center">The Right to Read</h2>
-<p>
+<p class="byline center">
by <a href="http://www.stallman.org/"><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
<em>This article appeared in the February 1997 issue
of <cite>Communications of the ACM</cite> (Volume 40, Number
2).</em></p>
-<hr />
+<hr class="thin" />
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<div class="columns">
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -62,7 +92,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -106,7 +139,10 @@
knowing your computer's root password. And neither
the FBI nor
Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -143,7 +179,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -153,6 +192,7 @@
to Luna, where they found others who had likewise gravitated away from
the long arm of the SPA. When the Tycho Uprising began in 2062, the
universal right to read soon became one of its central aims.</p>
+</div>
<div class="announcement">
<blockquote>
@@ -163,35 +203,46 @@
<div id="AuthorsNote">
<h3>Author's Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the unjust forces that use “pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it forwards into something more visibly
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
<p>The Electronic Frontier Foundation, a separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>The following note has been updated several times since the first
publication of the story.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns">
<p>
The battle for the right to read is already being fought. Although it
may take 50 years for our past freedoms to fade into obscurity, most
@@ -228,15 +279,20 @@
Even the World Wide Web Consortium has fallen under the shadow of the
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which lead to the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
+<p class="inline-block">
With Windows Vista, Microsoft admitted it had built in a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
@@ -244,7 +300,12 @@
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the FBI and Microsoft will keep the
@@ -274,7 +335,12 @@
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
In 1997, when this story was first published, the SPA was
threatening small Internet service providers, demanding they permit
@@ -293,7 +359,12 @@
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width">
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -315,12 +386,15 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
+</div>
</li>
</ul>
+<div class="column-limit"></div>
</div>
<h3 id="BadNews">Bad News</h3>
+<div class="columns">
<p>
The battle for the right to read is going against us so far.
The enemy is organized, and we are not.
@@ -344,10 +418,10 @@
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon can remotely erase any book.
+<li><p class="inline-block">It has a back door with which Amazon can remotely
erase any book.
In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
-<li><p>In case all that isn't Orwellian enough, there is a universal
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is
a universal
back door with which Amazon can remotely change the software, and
introduce any other form of nastiness.</p></li>
</ul>
@@ -369,6 +443,7 @@
our work more generally. There is also a <a href="/help/help.html">list of
ways
to participate in our work</a>.
</p>
+</div>
<h3 id="References">References</h3>
@@ -394,13 +469,7 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
-<blockquote id="fsfs"><p class="big">This essay is published
-in <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Other Texts to Read</h5>
+<h4>Other Texts to Read</h4>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -409,6 +478,13 @@
id="copy-protection">Copy Protection: Just Say No</a>,
published in Computer World.</li>
</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -467,7 +543,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/28 11:58:13 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.de.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.de.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- po/right-to-read.de.po 28 Oct 2016 11:58:13 -0000 1.76
+++ po/right-to-read.de.po 6 Nov 2016 21:28:14 -0000 1.77
@@ -8,7 +8,7 @@
msgstr ""
"Project-Id-Version: right-to-read.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-10-25 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -41,7 +41,7 @@
"lang=\"en\">The Right to Read</cite> in <span xml:lang=\"en\" lang=\"en"
"\">Communications of the ACM</span>, New York, Jg. 40, 1997, 2."
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -49,7 +49,7 @@
"Aus: <cite>Der Weg nach Tycho</cite>, einer Sammlung von Artikeln über die "
"Vorgeschichte der Lunarischen Revolution, veröffentlicht 2096 in Luna City."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -62,7 +62,7 @@
"abzuschlieÃen, wenn sie sich keinen anderen leihen konnte. Es gab niemanden,
"
"den sie zu fragen wagte, auÃer Dan."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -79,7 +79,7 @@
"abscheulich und falsch war ‑ etwas, dass nur Piraten machen "
"würden."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -102,7 +102,7 @@
"erhalten ‑ er hatte sich nicht genügend Mühe gegeben, das "
"Verbrechen zu verhindern."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -126,7 +126,7 @@
"konnte er hoffen, dass seine eigenen Forschungsarbeiten, wenn häufig darauf "
"Bezug genommen wird, genug einbringen würden, diese Darlehen
zurückzuzahlen.]"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -144,7 +144,7 @@
"2047 waren Bibliotheken, die freien öffentlichen Zugang zur "
"wissenschaftlichen Literatur anboten, nur noch dunkle Erinnerung."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -165,7 +165,7 @@
"Frank im Gefängnis, nicht für das Raublesen, sondern für den Besitz eines "
"Debuggers."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -183,7 +183,7 @@
"bedeutete, dass sie illegal waren. Die Entwickler der Debugger kamen ins "
"Gefängnis."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -197,7 +197,7 @@
"Firewall abgeschirmt, so dass er nur für Ãbungsaufgaben verwendet werden "
"konnte."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It was also possible to bypass the copyright monitors by installing a "
"modified system kernel. Dan would eventually find out about the free "
@@ -216,7 +216,7 @@
"Bundespolizei <span xml:lang=\"en\" lang=\"en\">FBI</span> noch der <span "
"xml:lang=\"en\" lang=\"en\">Microsoft Support</span> würden es aushändigen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -228,7 +228,7 @@
"mit ihr zu sprechen erfüllte ihn mit Freude. Und dass sie gerade ihn um "
"Hilfe bat, konnte bedeuten, dass auch sie ihn liebte."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -243,7 +243,7 @@
"würde nicht automatisch davon erfahren. Sie würde es nur herausfinden, wenn
"
"Lissa ihn meldete."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -264,7 +264,7 @@
"kontrollieren. Sie gingen davon aus, dies bedeutete, dass man noch etwas "
"anderes Verbotenes tat, und sie brauchten nicht zu wissen, was es war."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -275,7 +275,7 @@
"der Hochschule gesperrt, und würden unvermeidlich in allen Kursen "
"durchfallen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -290,7 +290,7 @@
"solche, die lediglich Verdacht erregten."
# ⦠Piraterie, +also der illegalen Vervielfältigung+, â¦
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -311,7 +311,7 @@
"SPA entzogen hatten. Als 2062 der Aufstand von Tycho begann, wurde das "
"allgemeine Recht zu lesen schnell eines seiner zentralen Ziele."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list "
"about the dangers of e-books</a>."
@@ -319,11 +319,11 @@
"<a href=\"//defectivebydesign.org/ebooks.html\">Abonnieren Sie unsere "
"Mailingliste über die Gefahren von elektronischen Büchern</a>."
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr "Anmerkungen<!-- des Autors -->"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -340,7 +340,7 @@
"Terminologie dieser Gesellschaft. Um sichtlich noch beklemmender zu klingen, "
"habe ich versucht dies <!--aus heutiger Sicht -->zu projizieren."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -354,7 +354,7 @@
"Foundation die Kampagne <em><a href=\"//DefectiveByDesign.org\">Defective-by-"
"Design</a></em> ein. Bitte unterstützen Sie die Kampagne."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
@@ -363,7 +363,7 @@
"Software Foundation in Beziehung stehende Organisation, kämpft auch gegen "
"DRM."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The following note has been updated several times since the first "
"publication of the story."
@@ -376,7 +376,7 @@
# de l'information</span> (DADVSI) der bloÃe Besitz einer Kopie von
# <b>DeCSS</b>, einem freien Programm zum Entschlüsseln von Video-DVDs,
# eine Straftat.
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The battle for the right to read is already being fought. Although it may "
"take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -401,7 +401,7 @@
"Urheberrechtsrichtlinie<a href=\"#tn1\" id=\"tn1-ref\" class=\"tnote\">[1]</"
"a> vergleichbare Restriktionen in einer Form, nicht ganz so stark."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -427,7 +427,7 @@
# TTIP - Transatlantic Trade and Investment Partnership
# (ins) also the Dominican Republic, El Salvador, Guatemala, Honduras und
Nicaragua.
# Lame Duck (âlahme Enteâ) - wird im politischen System der Vereinigten
Staaten ein gewählter Politiker bezeichnet, der noch im Amt ist, aber nicht zu
einer Wiederwahl antritt bzw. eine Wahl verloren hat (der in absehbarer Zeit
aus dem Amt scheidet,dessen Nachfolger bereits gewählt worden ist).
innenpolitisch gilt er insbesondere als handlungsunfähig.[
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -448,7 +448,7 @@
"Verträge müssen vereitelt oder abgeschafft werden."
# (replace) web specifications -> HTML5 specifications ???
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
@@ -459,7 +459,7 @@
"geratenen; es steht kurz davor ein DRM-System als offiziellen Teil der "
"Internet-Spezifikationen zu genehmigen."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -473,7 +473,7 @@
"unfreien Programm vertrauen kann</a>. Wir müssen bloà auf Freie (Libre) "
"Software bestehen und unfreie Programme zurückweisen."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"With Windows Vista, Microsoft admitted it had built in a back door: "
"Microsoft can use it to forcibly install software “upgrades,” "
@@ -491,7 +491,7 @@
"gegen Nutzer war DRM aufzuerlegen, das Nutzer nicht überwinden können. "
"Natürlich ist Windows 10 nicht besser."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"One of the ideas in the story was not proposed in reality until 2002. This "
"is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -502,7 +502,7 @@
"Microsoft die Root-Passwörter für Privat- und Arbeitsplatzrechner behalten "
"und diese nicht mitteilen!"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
@@ -513,7 +513,7 @@
"em>, aber wie letztlich eingesetzt wird es <em><span xml:lang=\"en\" lang="
"\"en\">Secure Boot</span></em> genannt."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"What Microsoft keeps is not exactly a password in the traditional sense; no "
"person ever types it on a terminal. Rather, it is a signature and "
@@ -535,7 +535,7 @@
"\">zeigt die NSA-Sicherheitslücken in Windows</a>, die bereits ausgenutzt "
"wurden."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -552,7 +552,7 @@
"nennen dies <em><span xml:lang=\"en\" lang=\"en\">Restricted Boot</span></"
"em>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"In 1997, when this story was first published, the SPA was threatening small "
"Internet service providers, demanding they permit the SPA to monitor all "
@@ -570,7 +570,7 @@
"tatsächlich verklagt. Die SPA lieà die Klage später fallen, aber durch das
"
"DMCA erhielt sie die Macht, die sie anstrebte."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The SPA, which actually stands for Software Publishers Association, has been "
"replaced in its police-like role by the Business Software Alliance. The BSA "
@@ -592,7 +592,7 @@
"Drohungen, dass Personen, die Software gemeinsam benutzen, also teilen, im "
"Gefängnis vergewaltigt werden würden."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -602,7 +602,7 @@
"Beispielsweise zeigt ein Rechner einer Universität in der Gegend von Chicago
"
"bei der Anmeldung diese Meldung an:"
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -627,7 +627,7 @@
"gesammelte Daten an die Universitätsverwaltung und/oder an zuständige "
"Strafverfolgungsbehörden weiterzugeben.â"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -636,11 +636,11 @@
"Verfassung: fast jedermann im Voraus zu zwingen, auf die entsprechenden "
"Rechte zu verzichten."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "Schlechte Nachrichten"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The battle for the right to read is going against us so far. The enemy is "
"organized, and we are not."
@@ -649,7 +649,7 @@
"Ungunsten ‑ im Gange. Der ist Feind organisiert, wir "
"hingegen nicht."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -668,7 +668,7 @@
"völlige Zurückweisung des Produktes:"
# ⦠on servers outside the country where you live
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
@@ -678,13 +678,13 @@
"stellt Amazon Informationen wie beispielsweise welches Buch und welche Seite "
"gelesen wurden, Markierungen und jegliche eingegebenen Notizen bereit</ins>."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
"Es verfügt über DRM, die Nutzer von der gemeinsamen Nutzung von Kopien "
"abhalten soll."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
@@ -693,7 +693,7 @@
"löschen kann. Im Jahr 2009 wurden so Tausende Kopien von George Orwells "
"<cite>1984</cite> entfernt."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
@@ -703,7 +703,7 @@
"universelle Hintertür, mit der Amazon die Software aus der Ferne ändern und
"
"jede andere Form von Bosheit einführen kann."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -724,7 +724,7 @@
"Verträgen zuzustimmen, egal ob für Software, E-Bücher, Musik oder für "
"irgendetwas anderes."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we want to stop the bad news and create some good news, we need to "
"organize and fight. Subscribe to the FSF's <a href=\"http://"
@@ -741,12 +741,12 @@
"als assoziiertes Mitglied an die FSF</a>. Es gibt auch eine Reihe von <a "
"href=\"/help/\">Möglichkeiten, an unserer Arbeit zu partizipieren</a>."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Referenzen"
# http://www.uspto.gov/web/offices/com/doc/ipnii/ipnii.txt (Stand: 2012-08-30)
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -760,7 +760,7 @@
"philosophy/not-ipr\">[sic]</a> 1995."
# (Stand: 2012-08-30)
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -771,7 +771,7 @@
"Eine Erklärung des WeiÃbuchs, in: Wired 1996."
# (Stand: 2012-08-30)
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -780,7 +780,7 @@
"lang=\"en\" lang=\"en\">Sold Out</a></cite>, in: The New York Times 1996."
# Retrieved 2013-06-26.
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -792,7 +792,7 @@
"Washington Post 1996 [Internet Archive]."
# (Stand: 2011-03-26) Internet Archive
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"https://web.archive.org/web/20151113122141/http://public-domain."
"org/\">Union for the Public Domain</a>—an organization which aims to "
@@ -804,29 +804,18 @@
"Organisation, deren Ziel es <ins>war</ins> sich übermäÃigen Befugnissen
des "
"Urheber- und Patentrechts zu widersetzen und rückgängig zu machen."
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Dieser Aufsatz wurde englischsprachig in <cite><a href=\"//shop.fsf.org/"
-"product/free-software-free-society/\" xml:lang=\"en\" lang=\"en\">Free "
-"Software, Free Society: The Selected Essays of Richard M. Stallman</a></"
-"cite> veröffentlicht."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "Weitere Texte"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/\">Philosophie des GNU-Projekts</a>"
# Kay, Russel: Copy Protection: Just Say No (2000). In: Computerworld,
# URL:
http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html
(Stand: 2016-03-26).
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.computerworld.com/article/2596679/networking/copy-"
"protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -837,6 +826,17 @@
"lang=\"en\" lang=\"en\">Copy Protection: Just Say No</a></cite>, in: "
"Computerworld 2000."
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Dieser Aufsatz wurde englischsprachig in <cite><a href=\"//shop.fsf.org/"
+"product/free-software-free-society/\" xml:lang=\"en\" lang=\"en\">Free "
+"Software, Free Society: The Selected Essays of Richard M. Stallman</a></"
+"cite> veröffentlicht."
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/right-to-read.el-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.el-diff.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/right-to-read.el-diff.html 18 Oct 2016 16:29:50 -0000 1.12
+++ po/right-to-read.el-diff.html 6 Nov 2016 21:28:14 -0000 1.13
@@ -15,34 +15,71 @@
<title>The Right to Read
- GNU Project - Free Software Foundation</title>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
--></style></em></ins></span>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<span class="removed"><del><strong><h2>The</strong></del></span>
+<span class="inserted"><ins><em><h2 class="center">The</em></ins></span>
Right to Read</h2>
-<p>
+<span class="removed"><del><strong><p></strong></del></span>
+
+<span class="inserted"><ins><em><p class="byline
center"></em></ins></span>
by <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
<span class="removed"><del><strong><blockquote class="note">
<p><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of eBooks</a>.</p>
-</blockquote></strong></del></span>
+</blockquote>
-<p>
+<p></strong></del></span>
+<span class="inserted"><ins><em><p class="center"></em></ins></span>
<em>This article appeared in the February 1997 issue
of <span
class="removed"><del><strong><strong>Communications</strong></del></span>
<span class="inserted"><ins><em><cite>Communications</em></ins></span> of
the <span class="removed"><del><strong>ACM</strong></strong></del></span>
<span class="inserted"><ins><em>ACM</cite></em></ins></span> (Volume 40,
Number
2).</em></p>
-<span class="inserted"><ins><em><hr /></em></ins></span>
-<blockquote><p>
+<span
class="removed"><del><strong><blockquote><p></strong></del></span>
+<span class="inserted"><ins><em><hr class="thin" />
+
+<div class="article">
+<blockquote class="info center"><p></em></ins></span>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -78,7 +115,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -122,7 +162,10 @@
knowing your computer's root password. And neither
the <span class="removed"><del><strong><abbr title="Federal Bureau of
Investigation">FBI</abbr></strong></del></span> <span
class="inserted"><ins><em>FBI</em></ins></span> nor
Microsoft Support would tell you that.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -159,7 +202,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -172,8 +218,9 @@
<span class="removed"><del><strong><h3
id="AuthorsNote">Author's</strong></del></span>
+<span class="inserted"><ins><em></div>
-<span class="inserted"><ins><em><div class="announcement">
+<div class="announcement">
<blockquote>
<p><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of e-books</a>.</p>
</blockquote>
@@ -182,35 +229,49 @@
<div id="AuthorsNote">
<h3>Author's</em></ins></span> Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<span class="removed"><del><strong><ul>
+<li>This</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This</em></ins></span> story is supposedly a historical article that
will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the <span
class="removed"><del><strong>enemies</strong></del></span> <span
class="inserted"><ins><em>unjust forces</em></ins></span> that use
“pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it <span class="removed"><del><strong>from today so as
to sound even</strong></del></span> <span class="inserted"><ins><em>forwards
into something</em></ins></span> more <span
class="inserted"><ins><em>visibly</em></ins></span>
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+<span class="inserted"><ins><em></p>
+</div>
+<div class="column-limit"></div></em></ins></span>
</li>
<li>
-<span class="inserted"><ins><em><p>Computer-enforced restrictions on
lending or reading books (and other
+<span class="inserted"><ins><em><div class="reduced-width">
+<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
<p>The Electronic Frontier Foundation, a separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li></em></ins></span>
+<blockquote class="info center"></em></ins></span>
<p>The following note has been updated several times since the first
publication of the story.</p>
+<span class="inserted"><ins><em></blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns"></em></ins></span>
<p>
The <span class="inserted"><ins><em>battle for the</em></ins></span> right to
read is <span class="removed"><del><strong>a battle</strong></del></span> <span
class="inserted"><ins><em>already</em></ins></span> being <span
class="removed"><del><strong>fought today.</strong></del></span> <span
class="inserted"><ins><em>fought.</em></ins></span> Although it
may take 50 years for our <span class="removed"><del><strong>present way of
life</strong></del></span> <span class="inserted"><ins><em>past
freedoms</em></ins></span> to fade into obscurity, most
@@ -247,8 +308,7 @@
<p>
In 2001 the</strong></del></span> US <span class="removed"><del><strong>began
attempting to use the proposed Free Trade Area of
-the Americas (FTAA) treaty</strong></del></span> <span
class="inserted"><ins><em>campaigns</em></ins></span> to impose <span
class="removed"><del><strong>the same</strong></del></span> <span
class="inserted"><ins><em>such</em></ins></span> rules on <span
class="removed"><del><strong>all</strong></del></span> the <span
class="removed"><del><strong>countries in
-the Western Hemisphere. The FTAA is one</strong></del></span> <span
class="inserted"><ins><em>rest</em></ins></span> of the <span
class="inserted"><ins><em>world through</em></ins></span>
+the Americas (FTAA) treaty</strong></del></span> <span
class="inserted"><ins><em>campaigns</em></ins></span> to impose <span
class="removed"><del><strong>the same</strong></del></span> <span
class="inserted"><ins><em>such</em></ins></span> rules on <span
class="removed"><del><strong>all the countries in</strong></del></span> the
<span class="removed"><del><strong>Western Hemisphere. The FTAA is
one</strong></del></span> <span
class="inserted"><ins><em>rest</em></ins></span> of the <span
class="inserted"><ins><em>world through</em></ins></span>
so-called <span class="removed"><del><strong>free
trade treaties, which</strong></del></span> <span
class="inserted"><ins><em>“free trade” treaties.
<a href="https://stallman.org/business-supremacy-treaties.html">
@@ -280,23 +340,33 @@
Even the World Wide Web Consortium has fallen under the shadow of the
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which lead to the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
+<p class="inline-block">
With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span
class="removed"><del><strong>2003.</p></strong></del></span> <span
class="inserted"><ins><em>a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
downgrades. It can also order all machines running Vista to refuse to
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
-10 is no better</p></em></ins></span>
+10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns"></em></ins></span>
<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the <span
class="removed"><del><strong><abbr>FBI</abbr></strong></del></span>
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep
the
@@ -329,22 +399,27 @@
Vista's many restrictions</strong></del></span> is <span
class="inserted"><ins><em>likely</em></ins></span> to <span
class="removed"><del><strong>impose DRM (Digital Restrictions
Management)</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> that <span
class="removed"><del><strong>users can't overcome. The
threat</strong></del></span>
<span class="inserted"><ins><em>control on behalf</em></ins></span> of <span
class="removed"><del><strong>DRM is why we
-have established</strong></del></span> the <span
class="removed"><del><strong><a href="http://DefectiveByDesign.org">
-Defective by Design</a> campaign.</p></strong></del></span> <span
class="inserted"><ins><em>FBI when asked: it
-already <a href="/proprietary/malware-microsoft.html">shows
-the NSA security bugs in Windows</a> to exploit.</p>
+have established</strong></del></span> the <span class="inserted"><ins><em>FBI
when asked: it
+already</em></ins></span> <a <span
class="removed"><del><strong>href="http://DefectiveByDesign.org">
+Defective by Design</a> campaign.</p></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">shows
+the NSA security bugs in Windows</a> to
exploit.</p></em></ins></span>
<p>
-Secure boot can be implemented in a way that permits the user to
+<span class="removed"><del><strong>When</strong></del></span>
+<span class="inserted"><ins><em>Secure boot can be implemented in a way that
permits the user to
specify the signature key and decide what software to sign. In
practice, PCs designed for Windows 10 carry only Microsoft's key, and
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
-boot</em>.</p></em></ins></span>
+boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
-<span class="removed"><del><strong>When</strong></del></span>
-<span class="inserted"><ins><em>In 1997, when</em></ins></span> this story was
first <span class="removed"><del><strong>written,</strong></del></span> <span
class="inserted"><ins><em>published,</em></ins></span> the SPA was
+In 1997, when</em></ins></span> this story was first <span
class="removed"><del><strong>written,</strong></del></span> <span
class="inserted"><ins><em>published,</em></ins></span> the SPA was
threatening small Internet service providers, demanding they permit
the SPA to monitor all users. Most ISPs surrendered when
threatened, because they <span
class="removed"><del><strong>cannot</strong></del></span> <span
class="inserted"><ins><em>could not</em></ins></span> afford to fight back in
court. One
@@ -360,8 +435,13 @@
reminiscent of the erstwhile Soviet Union, it invites people to inform
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p></em></ins></span>
+software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width"></em></ins></span>
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -383,16 +463,20 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
+<span class="inserted"><ins><em></div></em></ins></span>
</li>
</ul>
-<span class="inserted"><ins><em></div></em></ins></span>
+<span class="inserted"><ins><em><div class="column-limit"></div>
+</div></em></ins></span>
<h3 id="BadNews">Bad News</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
-The battle for the right to read is <span class="removed"><del><strong>already
in progress,</strong></del></span> <span class="inserted"><ins><em>going
against us so far.</em></ins></span>
-The enemy is organized, <span
class="removed"><del><strong>while</strong></del></span> <span
class="inserted"><ins><em>and</em></ins></span> we are <span
class="removed"><del><strong>not, so it is going against us.
-Here are articles about bad things that have happened since the
+The battle for the right to read is <span class="removed"><del><strong>already
in progress,
+The enemy is organized, while we are not, so it is</strong></del></span> going
against <span class="removed"><del><strong>us.
+Here</strong></del></span> <span class="inserted"><ins><em>us so far.
+The enemy is organized, and we</em></ins></span> are <span
class="removed"><del><strong>articles about bad things that have happened since
the
original publication of this article.</p>
<ul>
@@ -414,21 +498,21 @@
completely:</p>
<ul>
-<li><p>It spies on everything the user does:</em></ins></span> it
<span class="removed"><del><strong>to anyone
else</a>,</strong></del></span> <span class="inserted"><ins><em>reports
which book the
-user is reading, and</em></ins></span> which <span
class="inserted"><ins><em>page, and it reports when</em></ins></span> the <span
class="removed"><del><strong>publisher</strong></del></span> <span
class="inserted"><ins><em>user highlights
-text, and any notes the user enters.</p></li>
+<li><p>It spies on everything the user does:</em></ins></span> it
<span class="removed"><del><strong>to anyone
else</a>,</strong></del></span> <span
class="inserted"><ins><em>reports</em></ins></span> which <span
class="inserted"><ins><em>book the
+user is reading, and which page, and it reports when the user highlights
+text, and any notes</em></ins></span> the <span
class="removed"><del><strong>publisher</strong></del></span> <span
class="inserted"><ins><em>user enters.</p></li>
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon</em></ins></span> can
+<li><p class="inline-block">It has a back door with which
Amazon</em></ins></span> can
<span class="removed"><del><strong>revoke at will.</li>
<li><a
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151">Electronic
Publishing:</a> An article about distribution</strong></del></span>
<span class="inserted"><ins><em>remotely erase any book.
In 2009, it erased thousands</em></ins></span> of <span
class="removed"><del><strong>books in
electronic form,</strong></del></span> <span
class="inserted"><ins><em>copies of 1984, by George Orwell.</p></li>
-<li><p>In case all that isn't Orwellian enough, there is a
universal
+<li><p class="inline-block">In case all that isn't Orwellian
enough, there is a universal
back door with which Amazon can remotely change the
software,</em></ins></span> and <span class="removed"><del><strong>copyright
issues affecting</strong></del></span>
<span class="inserted"><ins><em>introduce any other form of
nastiness.</p></li>
</ul>
@@ -455,6 +539,7 @@
our work more generally. There is also a <a href="/help/help.html">list
of ways
to participate in</em></ins></span> our <span
class="removed"><del><strong>work.</strong></del></span> <span
class="inserted"><ins><em>work</a>.</em></ins></span>
</p>
+<span class="inserted"><ins><em></div></em></ins></span>
<h3 id="References">References</h3>
@@ -480,23 +565,32 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
+<span class="inserted"><ins><em><h4>Other Texts to Read</h4>
+
+<ul>
+ <li><a href="/philosophy/philosophy.html">Philosophy of the
+ GNU Project</a></li>
+ <li><a
href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html"
+ id="copy-protection">Copy Protection: Just Say No</a>,
+ published in Computer World.</li>
+</ul>
+</div></em></ins></span>
+
+<hr <span class="inserted"><ins><em>class="thin"</em></ins></span> />
<blockquote id="fsfs"><p class="big">This essay is published
in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
Software, Free Society: The Selected Essays of Richard
M. Stallman</cite></a>.</p></blockquote>
-<h5>Other Texts to Read</h5>
+<span class="removed"><del><strong><h5>Other Texts to Read</h5>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
GNU Project</a></li>
- <li><a <span
class="removed"><del><strong>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"
- id="COPYPROCTECTION">Copy</strong></del></span> <span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html"
- id="copy-protection">Copy</em></ins></span> Protection: Just
Say No</a>,
- <span
class="removed"><del><strong>Published</strong></del></span>
- <span class="inserted"><ins><em>published</em></ins></span> in
Computer World.</li>
-</ul>
+ <li><a
href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"
+ id="COPYPROCTECTION">Copy Protection: Just Say No</a>,
+ Published in Computer World.</li>
+</ul></strong></del></span>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -556,7 +650,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.el.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.el.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- po/right-to-read.el.po 18 Oct 2016 16:29:50 -0000 1.14
+++ po/right-to-read.el.po 6 Nov 2016 21:28:14 -0000 1.15
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2015-04-24 11:30+0200\n"
"Last-Translator: Georgios Zarkadas <address@hidden>\n"
"Language-Team: Greek <address@hidden>\n"
@@ -49,7 +49,7 @@
"<strong>ÎÏικοινÏÎ½Î¯ÎµÏ ÏÎ·Ï ACM</strong> (ΤÏÎ¼Î¿Ï 40,
ÎÏιθμÏÏ 2).</em>"
# type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -59,7 +59,7 @@
"Î£ÎµÎ»Î®Î½Î·Ï Ïο ÎÏÎ¿Ï 2096."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -73,7 +73,7 @@
"ÏÎÏοιο, εκÏÏÏ Î±ÏÏ Ïον Dan."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -90,7 +90,7 @@
"ήÏαν άÏÏÎ·Î¼Î¿Ï ÎºÎ±Î¹ λάθοϗκάÏι ÏοÏ
μÏνο οι
ÏειÏαÏÎÏ Î¸Î± Îκαναν."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -113,7 +113,7 @@
"λήÏη εκÏεÏαμÎνÏν μÎÏÏÏν για Ïην αÏοÏÏοÏή
ÏοÏ
εγκλήμαÏοÏ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -138,7 +138,7 @@
"ÏÏ
Ïνά, θα ÏοÏ
ÎÏεÏναν αÏκεÏÏ ÎµÎ¹ÏÏδημα για
να ξεÏληÏÏÏει Ïο Î´Î¬Î½ÎµÎ¹Ï ÏοÏ
.)"
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -157,7 +157,7 @@
"ÏÏÏÏβαÏη ÏÏην εÏιÏÏημονική βιβλιογÏαÏία
ήÏαν μια αÏνή ανάμνηÏη."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -178,7 +178,7 @@
"για ÏειÏαÏÎ¹ÎºÏ Î´Î¹Î¬Î²Î±Ïμα, αλλά για καÏοÏή
ενÏÏ Î±ÏοÏÏαλμαÏÏÏή."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -197,7 +197,7 @@
"ÏÏη ÏÏ
λακή."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -212,7 +212,7 @@
"μÏοÏεί να ÏÏηÏιμοÏοιηθεί μÏνο για
αÏκήÏÎµÎ¹Ï ÏοÏ
μαθήμαÏοÏ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "It was also possible to bypass the copyright monitors by installing a "
@@ -242,7 +242,7 @@
"abbr> οÏÏε η Î¥ÏοÏÏήÏιξη ÏÎ·Ï Microsoft θα ÏÎ±Ï Ïον
Îδινε."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -256,7 +256,7 @@
"μÏοÏεί να Ïήμαινε ÏÏι κι εκείνη Ïον
αγαÏοÏÏε εÏίÏηÏ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -271,7 +271,7 @@
"μάθαινε αÏ
ÏÏμαÏα γι' αÏ
ÏÏ. Îα Ïο ανακάλÏ
ÏÏαν μÏνο αν η Lissa Ïον ανÎÏεÏε."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -293,7 +293,7 @@
"ÏοÏ
ήÏαν αλλιÏÏ Î±ÏαγοÏεÏ
μÎνο, και δεν
ÏÏειαζÏÏαν να ξÎÏοÏ
ν Ïι είναι αÏ
ÏÏ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -304,7 +304,7 @@
"αÏοÏÏÏαιναν Ïε Ïλα ÏοÏ
Ï Ïα μαθήμαÏα."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -320,7 +320,7 @@
"ÎµÎºÎµÎ¯Î½ÎµÏ ÏοÏ
αÏλά δημιοÏ
ÏγοÏÏαν Ï
ÏοÏίεÏ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -340,7 +340,7 @@
"αÏÏ Ïο μακÏÏ ÏÎÏι ÏÎ·Ï SPA. ÎÏαν η εξÎγεÏÏη
ÏοÏ
ΤÏÏο άÏÏιÏε Ïο 2062, Ïο "
"ÏαγκÏÏμιο δικαίÏμα ÏÏην ανάγνÏÏη Îγινε
ÎÎ½Î±Ï Î±ÏÏ ÏοÏ
Ï ÎºÎµÎ½ÏÏικοÏÏ ÏÎ·Ï ÏÏÏÏοÏ
Ï."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing "
@@ -353,11 +353,11 @@
"ÏαÏÏ
δÏομείοÏ
ÏÏεÏικά με ÏοÏ
Ï ÎºÎ¹Î½Î´ÏνοÏ
Ï
ÏÏν η-βιβλίÏν</a>."
# type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr "ΣημειÏÏÎµÎ¹Ï ÏοÏ
ÏÏ
γγÏαÏÎα"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "This story is supposedly a historical article that will be written in the "
@@ -382,7 +382,7 @@
"ακÏμη Ïιο καÏαθλιÏÏική. ÎείÏε <a
href=\"/philosophy/words-to-avoid."
"html#Piracy\">“ΠειÏαÏεία”</a>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -391,14 +391,14 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The following note has been updated several times since the first "
"publication of the story."
@@ -406,7 +406,7 @@
"ÎÏ
Ïή η ÏημείÏÏη ÎÏει ενημεÏÏθεί αÏκεÏÎÏ
ÏοÏÎÏ Î±ÏÏ Ïην ÏÏÏÏη δημοÏίεÏ
Ïη ÏÎ·Ï "
"ιÏÏοÏίαÏ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The right to read is a battle being fought today. Although it may take "
@@ -443,7 +443,7 @@
"καÏοÏή ενÏÏ Î±Î½ÏιγÏάÏοÏ
ÏοÏ
DeCSS, ÏοÏ
ελεÏθεÏοÏ
ÏÏογÏάμμαÏÎ¿Ï "
"αÏοκÏÏ
ÏÏογÏάÏηÏÎ·Ï Î²Î¯Î½Ïεο Ïε Îνα DVD, είναι
Îγκλημα. "
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -454,7 +454,7 @@
"these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -465,14 +465,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -482,7 +482,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -510,7 +510,7 @@
"href=\"http://DefectiveByDesign.org\"> ÎλαÏÏÏμαÏÎ¹ÎºÏ Î±ÏÏ
ΣÏεδιαÏμÏ</a>."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "One of the ideas in the story was not proposed in reality until 2002. "
@@ -526,7 +526,7 @@
"ÏÏλαγαν Ïα Ïιζικά ÏÏ
νθημαÏικά για ÏοÏ
Ï
ÏÏοÏÏÏικοÏÏ ÏÎ±Ï Ï
ÏολογιÏÏÎÏ ÎºÎ±Î¹ δεν "
"θα ÏÎ±Ï Î¬Ïηναν να Ïα αÏοκÏήÏεÏε."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
@@ -534,7 +534,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -561,7 +561,7 @@
"Ïη Microsoft, Ïον Ï
ÏÎÏÏαÏο ÎλεγÏο ÏÎ¬Î½Ï ÏÏο Ïι
μÏοÏεί να κάνει ο ÏÏήÏÏÎ·Ï ÏÏον "
"Î´Î¹ÎºÏ ÏοÏ
Ï
ÏολογιÏÏή."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -571,7 +571,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "When this story was first written, the SPA was threatening small Internet "
@@ -599,7 +599,7 @@
"αλλά ÏαÏÎλαβε Ïη DMCA, ÏοÏ
ÏοÏ
Ï ÎδÏÏε Ïην
ιÏÏÏ ÏοÏ
ήθελαν."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The SPA, which actually stands for Software Publishers Association, has "
@@ -629,7 +629,7 @@
"βιάζονÏαν. "
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -640,7 +640,7 @@
"ÏοÏ
Σικάγο ÏÏÏβαλε αÏ
ÏÏ Ïο μήνÏ
μα καÏά Ïην
εÏιβεβαίÏÏη ÏαÏ
ÏÏÏηÏÎ±Ï (login):"
# type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -667,7 +667,7 @@
"αξιÏμαÏοÏÏοÏ
Ï ÏÏν αÏÏÏ
νομικÏν αÏÏÏν."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -676,11 +676,11 @@
"ÏεÏιÏÏÏÏεÏοÏ
Ï Î½Î± ÏÏ
μÏÏνήÏοÏ
ν,
ÏÏοκαÏαβολικά, ÏÏην ÏαÏαίÏηÏη αÏÏ Ïα "
"δικαιÏμαÏά ÏοÏ
Ï ÎºÎ¬ÏÏ Î±ÏÏ Î±Ï
Ïήν."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "ÎÏÏημα νÎα"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The battle for the right to read is already in progress, The enemy is "
@@ -696,7 +696,7 @@
"ÏαÏαÏίθενÏαι άÏθÏα ÏÏεÏικά με άÏÏημα
ÏÏάγμαÏα ÏοÏ
ÏÏ
νÎβηÏαν αÏÏ Ïην αÏÏική "
"δημοÏίεÏ
Ïη αÏ
ÏÎ¿Ï ÏοÏ
άÏθÏοÏ
."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -707,31 +707,31 @@
"for rejecting the product completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -743,7 +743,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "If we want to stop the bad news and create some good news, we need to "
@@ -768,12 +768,12 @@
"μαÏ."
# type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "ΠαÏαÏομÏÎÏ"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -786,7 +786,7 @@
"ÎικαιÏμαÏα ΠνεÏ
μαÏÎ¹ÎºÎ®Ï ÎδιοκÏηÏÎ¯Î±Ï [sic]
(1995)."
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -797,7 +797,7 @@
"Pamela Samuelson, Wired, Îαν. 1996"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -805,7 +805,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Το
ξεÏοÏλημα</a>, "
"James Boyle, New York Times, 31 ÎαÏÏίοÏ
1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -816,7 +816,7 @@
"δεδομÎνα ή ιδιÏÏικά δεδομÎνα</a>, Washington Post, 4
Îοε 1996."
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.public-domain.org/\">Union for the Public Domain</"
@@ -831,30 +831,19 @@
"a>—ÎÎ½Î±Ï Î¿ÏγανιÏμÏÏ ÏοÏ
ÎÏει ÏκοÏÏ Î½Î±
ανÏιÏÏαθεί και να ανÏιÏÏÏÎÏει Ïην "
"Ï
ÏεÏ-εξάÏλÏÏη ÏÏν δÏ
νάμεÏν ÏÏν ÏνεÏ
μαÏικÏν δικαιÏμάÏÏν και ÏÏν ÏαÏενÏÏν."
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Το δοκίμιο αÏ
ÏÏ ÎµÎ¯Î½Î±Î¹ δημοÏιεÏ
μÎνο ÏÏο <a
href=\"http://shop.fsf.org/product/"
-"free-software-free-society/\"><cite>Free Software, Free Society: The "
-"Selected Essays of Richard M. Stallman</cite></a>."
-
# type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "Îλλα κείμενα ÏÏÎ¿Ï Î±Î½Î¬Î³Î½ÏÏη"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">ΦιλοÏοÏία ÏοÏ
ÎÏγοÏ
GNU</a>"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.computerworld.com/s/article/49358/"
@@ -869,6 +858,17 @@
"Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">Î ÏοÏÏαÏία
ανÏιγÏαÏήÏ: "
"ÎÏλά ÏείÏε ÎÏι</a>, ÎημοÏιεÏÏηκε ÏÏο Computer
World."
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Το δοκίμιο αÏ
ÏÏ ÎµÎ¯Î½Î±Î¹ δημοÏιεÏ
μÎνο ÏÏο <a
href=\"http://shop.fsf.org/product/"
+"free-software-free-society/\"><cite>Free Software, Free Society: The "
+"Selected Essays of Richard M. Stallman</cite></a>."
+
# type: Content of: <div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
Index: po/right-to-read.es-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.es-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/right-to-read.es-en.html 20 Oct 2016 11:28:33 -0000 1.23
+++ po/right-to-read.es-en.html 6 Nov 2016 21:28:14 -0000 1.24
@@ -3,30 +3,60 @@
<title>The Right to Read
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
--></style>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<h2 class="center">The Right to Read</h2>
-<p>
+<p class="byline center">
by <a href="http://www.stallman.org/"><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
<em>This article appeared in the February 1997 issue
of <cite>Communications of the ACM</cite> (Volume 40, Number
2).</em></p>
-<hr />
+<hr class="thin" />
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<div class="columns">
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -62,7 +92,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -106,7 +139,10 @@
knowing your computer's root password. And neither
the FBI nor
Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -143,7 +179,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -153,6 +192,7 @@
to Luna, where they found others who had likewise gravitated away from
the long arm of the SPA. When the Tycho Uprising began in 2062, the
universal right to read soon became one of its central aims.</p>
+</div>
<div class="announcement">
<blockquote>
@@ -163,35 +203,46 @@
<div id="AuthorsNote">
<h3>Author's Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the unjust forces that use “pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it forwards into something more visibly
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
<p>The Electronic Frontier Foundation, a separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>The following note has been updated several times since the first
publication of the story.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns">
<p>
The battle for the right to read is already being fought. Although it
may take 50 years for our past freedoms to fade into obscurity, most
@@ -228,15 +279,20 @@
Even the World Wide Web Consortium has fallen under the shadow of the
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which lead to the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
+<p class="inline-block">
With Windows Vista, Microsoft admitted it had built in a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
@@ -244,7 +300,12 @@
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the FBI and Microsoft will keep the
@@ -274,7 +335,12 @@
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
In 1997, when this story was first published, the SPA was
threatening small Internet service providers, demanding they permit
@@ -293,7 +359,12 @@
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width">
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -315,12 +386,15 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
+</div>
</li>
</ul>
+<div class="column-limit"></div>
</div>
<h3 id="BadNews">Bad News</h3>
+<div class="columns">
<p>
The battle for the right to read is going against us so far.
The enemy is organized, and we are not.
@@ -344,10 +418,10 @@
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon can remotely erase any book.
+<li><p class="inline-block">It has a back door with which Amazon can remotely
erase any book.
In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
-<li><p>In case all that isn't Orwellian enough, there is a universal
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is
a universal
back door with which Amazon can remotely change the software, and
introduce any other form of nastiness.</p></li>
</ul>
@@ -369,6 +443,7 @@
our work more generally. There is also a <a href="/help/help.html">list of
ways
to participate in our work</a>.
</p>
+</div>
<h3 id="References">References</h3>
@@ -394,13 +469,7 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
-<blockquote id="fsfs"><p class="big">This essay is published
-in <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Other Texts to Read</h5>
+<h4>Other Texts to Read</h4>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -409,6 +478,13 @@
id="copy-protection">Copy Protection: Just Say No</a>,
published in Computer World.</li>
</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -467,7 +543,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/20 11:28:33 $
+$Date: 2016/11/06 21:28:14 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.es.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- po/right-to-read.es.po 20 Oct 2016 11:20:38 -0000 1.46
+++ po/right-to-read.es.po 6 Nov 2016 21:28:14 -0000 1.47
@@ -14,7 +14,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-20 13:16+0200\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-10-20 13:14+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -49,7 +49,7 @@
"<em>Este artÃculo se publicó en febrero de 1997 en <cite>Communications of
"
"the ACM</cite> (Vol. 40, Número 2).</em>"
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -57,7 +57,7 @@
"De <cite>El camino a Tycho</cite>, una colección de artÃculos sobre los "
"antecedentes de la Revolución Lunar, publicado en Luna City en 2096."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -69,7 +69,7 @@
"menos que consiguiera otro, serÃa reprobada en su trabajo de fin de "
"trimestre. No se atrevÃa a pedÃrselo a nadie excepto a Dan."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -85,7 +85,7 @@
"el mundo, desde la escuela primaria le habÃan enseñado que compartir libros
"
"es sucio y malo, cosa de piratas."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -107,7 +107,7 @@
"recibirÃa un durÃsimo castigo por no tomar las medidas adecuadas para
evitar "
"el delito."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -131,7 +131,7 @@
"investigación, en caso de ser citados frecuentemente, le reportaran los "
"suficientes beneficios como para pagar el préstamo)."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -149,7 +149,7 @@
"acceso público y gratuito a los artÃculos académicos eran ya solo un vago "
"recuerdo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -168,7 +168,7 @@
"traición a los estudiantes endeudados). En 2047 Frank estaba en la cárcel, "
"pero no por lecturas piratas, sino por posesión de un depurador."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -186,7 +186,7 @@
"los desarrolladores de esas herramientas de depuración fueron a parar a la "
"cárcel."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -199,7 +199,7 @@
"usado en sus clases de programación estaba detrás de un cortafuegos
especial "
"para que solo se pudiese utilizar en los ejercicios de clase."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It was also possible to bypass the copyright monitors by installing a "
"modified system kernel. Dan would eventually find out about the free "
@@ -218,7 +218,7 @@
"ordenador, cosa que ni el FBI ni el servicio técnico de Microsoft estaban "
"dispuestos a revelar."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -230,7 +230,7 @@
"ella. Cada oportunidad de hablarle lo llenaba de alegrÃa, y el hecho de que "
"le hubiese pedido ayuda podÃa significar que ella también lo amaba."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -244,7 +244,7 @@
"SeguÃa siendo un delito, pero la APS no lo detectarÃa automáticamente:
solo "
"podrÃan descubrirlo si Lissa lo denunciaba."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -264,7 +264,7 @@
"control. Se daba por sentado que se estaba haciendo algo prohibido, no era "
"preciso saber qué exactamente."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -275,7 +275,7 @@
"de la universidad, con lo que inevitablemente serÃan reprobados en todas las
"
"asignaturas."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -289,7 +289,7 @@
"en relación con la disciplina estudiantil: se castigaban las actividades "
"perniciosas, no las que simplemente levantaran sospechas."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -311,7 +311,7 @@
"en 2062, el derecho universal a leer se convirtió en una de sus proclamas "
"fundamentales."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list "
"about the dangers of e-books</a>."
@@ -319,11 +319,11 @@
"<a href=\"http://defectivebydesign.org/ebooks.html\">InscrÃbase a nuestra "
"lista de correo sobre los peligros de los libros electrónicos</a>."
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr "Notas del autor"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -340,7 +340,7 @@
"sociedad en la que su opresividad resulta más patente. Véase <a href=\"/"
"philosophy/words-to-avoid.html#Piracy\">«PiraterÃa»</a>. "
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -355,7 +355,7 @@
"la campaña <a href=\"http://DefectiveByDesign.org\">Defective by Design</a>,
"
"para la que solicitamos su apoyo."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
@@ -363,7 +363,7 @@
"La Electronic Frontier Foundation, una organización independiente, no "
"vinculada a la Free Software Foundation, también hace campaña contra el
DRM."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The following note has been updated several times since the first "
"publication of the story."
@@ -371,7 +371,7 @@
"La siguiente nota ha sido actualizada varias veces desde la primera "
"publicación del cuento."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The battle for the right to read is already being fought. Although it may "
"take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -395,7 +395,7 @@
"restricciones similares, aunque no tan fuertes, mediante una directiva sobre "
"el copyright. "
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -414,7 +414,7 @@
"de las muchas polÃticas injustas que esos tratados imponen en multitud de "
"ámbitos. "
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -432,7 +432,7 @@
"paÃses del PacÃfico. El TTIP impondrÃa restricciones similares en Europa. "
"Hay que abolir y poner fin a todos estos tratados. "
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
@@ -442,7 +442,7 @@
"Wide Web Consortium</cite>, que está a punto de aprobar un sistema DRM como "
"parte oficial de las especificaciones de la red."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -456,7 +456,7 @@
"confiar en un programa que no sea libre</a>. Debemos exigir software libre, "
"y rechazar programas privativos."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"With Windows Vista, Microsoft admitted it had built in a back door: "
"Microsoft can use it to forcibly install software “upgrades,” "
@@ -474,7 +474,7 @@
"era imponer a los usuarios un DRM que no pudieran saltarse. Por supuesto, "
"Windows 10 no es mejor."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"One of the ideas in the story was not proposed in reality until 2002. This "
"is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -484,7 +484,7 @@
"Es la idea de que el FBI y Microsoft guarden las claves de administrador de "
"los ordenadores personales, y no las entreguen a los usuarios."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
@@ -494,7 +494,7 @@
"«computación confiable» y «Palladium», aunque últimamente lo llaman "
"«arranque seguro»."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"What Microsoft keeps is not exactly a password in the traditional sense; no "
"person ever types it on a terminal. Rather, it is a signature and "
@@ -515,7 +515,7 @@
"a la NSA los errores de seguridad de Windows para que pueda aprovecharse de "
"ellos."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -530,7 +530,7 @@
"otro sistema (como GNU/Linux), lo hará bajo el control de Microsoft. A esto "
"lo llamamos <em>arranque restringido</em>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"In 1997, when this story was first published, the SPA was threatening small "
"Internet service providers, demanding they permit the SPA to monitor all "
@@ -548,7 +548,7 @@
"rechazó esas exigencias y fue demandado. Posteriormente la SPA retiró la "
"demanda; sin embargo, la DMCA le otorgó el poder que buscaba."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The SPA, which actually stands for Software Publishers Association, has been "
"replaced in its police-like role by the Business Software Alliance. The BSA "
@@ -568,7 +568,7 @@
"2001, se lanzaron veladas amenazas de que las personas que comparten "
"software serÃan violadas en prisión."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -578,7 +578,7 @@
"ejemplo, un ordenador de una universidad del área de Chicago mostraba este "
"mensaje al iniciar una sesión:"
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -604,7 +604,7 @@
"autoridades universitarias y/o los agentes de la ley las pruebas derivadas "
"de dicha monitorización."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -613,11 +613,11 @@
"el mundo para que acceda a renunciar de antemano a los derechos que la "
"enmienda les otorga. "
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "Malas noticias"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The battle for the right to read is going against us so far. The enemy is "
"organized, and we are not."
@@ -625,7 +625,7 @@
"Hasta ahora la batalla por el derecho a leer no se está resolviendo a "
"nuestro favor. El enemigo está organizado, y nosotros no. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -644,7 +644,7 @@
"\">funcionalidades «orwellianas»</a>. Cualquiera de ellas es motivo "
"suficiente para rechazar por completo el producto."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
@@ -654,11 +654,11 @@
"qué página, e informa cuando el usuario marca un texto o hace alguna "
"anotación."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr "Tiene DRM, para evitar que los usuarios compartan copias."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
@@ -666,7 +666,7 @@
"Tiene una puerta trasera que permite a Amazon borrar por control remoto "
"cualquier libro. En 2009 borraron miles de copias de 1984, de George Orwell."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
@@ -676,7 +676,7 @@
"trasera universal mediante la cual Amazon puede cambiar el software por "
"control remoto, y hacer cualquier otra fechorÃa."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -696,7 +696,7 @@
"consiguiente, rechazo tales contratos, sean para software, libros "
"electrónicos, música o cualquier otra cosa.,"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we want to stop the bad news and create some good news, we need to "
"organize and fight. Subscribe to the FSF's <a href=\"http://"
@@ -712,11 +712,11 @@
"la FSF</a> para apoyar nuestra labor más en general. Hay también una <a
href="
"\"/help/help.html\">lista de maneras de participar en nuestro trabajo</a>."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Referencias"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -729,7 +729,7 @@
"the Working Group on Intellectual Property</cite> [sic] <cite>Rights (1995)</"
"cite>."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -739,7 +739,7 @@
"\">Explicación del «Libro Blanco»: <cite>The Copyright Grab</cite></a>, "
"<cite>Pamela Samuelson, Wired, Jan. 1996</cite>."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -747,7 +747,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\"><cite>Sold Out</"
"cite></a>, <cite>James Boyle, New York Times, 31 March 1996</cite>."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -757,7 +757,7 @@
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
"Private Data</a>, Washington Post, 4 Nov 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"https://web.archive.org/web/20151113122141/http://public-domain."
"org/\">Union for the Public Domain</a>—an organization which aims to "
@@ -768,26 +768,16 @@
"objetivo es oponerse a la excesiva extensión de los poderes del copyright y "
"de las patentes y revertir esta situación."
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Este ensayo está publicado en el libro <a
href=\"http://shop.fsf.org/product/"
-"free-software-free-society/\"><cite>Software libre para una sociedad libre: "
-"Selección de ensayos de Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "Otros textos para leer"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">FilosofÃa del Proyecto
GNU</a>"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.computerworld.com/article/2596679/networking/copy-"
"protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -797,6 +787,16 @@
"protection--just-say-no.html\" id=\"copy-protection\"><cite>Copy Protection: "
"Just Say No</cite></a>, publicado en <cite>Computer World</cite>."
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Este ensayo está publicado en el libro <a
href=\"http://shop.fsf.org/product/"
+"free-software-free-society/\"><cite>Software libre para una sociedad libre: "
+"Selección de ensayos de Richard M. Stallman</cite></a>."
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/right-to-read.fa.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.fa.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- po/right-to-read.fa.po 18 Oct 2016 16:29:50 -0000 1.53
+++ po/right-to-read.fa.po 6 Nov 2016 21:28:15 -0000 1.54
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2009-05-15 11:16+0330\n"
"Last-Translator: Abbas Esmaeeli Some'eh <address@hidden>\n"
"Language-Team: Persian <address@hidden>\n"
@@ -49,7 +49,7 @@
"strong> (Ø³Ø§Ù Û´Û°Ø Ø´Ù
ارÙÙ Û²) ب٠Úاپ رسÛد٠است.</em>"
# type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -58,7 +58,7 @@
"ساب٠Ù
اÙâÙØ´ÛÙاÙØ Ø§Ùتشار ÛاÙت٠در Ø´Ùر اÙÙÙ
Ù
اÙØ Ø³Ø§Ù Û²Û°Û¹Û¶"
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -71,7 +71,7 @@
"ب٠غÛر از د٠شخص دÛÚ¯Ø±Û ÙجÙد Ùداشت Ú©Ù ÙÛزا
بتÙاÙد ÚÙÛ٠تÙاضاÛÛ Ø§Ø² ا٠کÙد."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -88,7 +88,7 @@
"است—Ú©Ø§Ø±Û Ú©Ù ØªÙÙا Ø¯Ø²Ø¯Ø§Ù Ø§Ø¯Ø¨Û Ø§ÙجاÙ
Ù
ÛâدÙÙد."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -109,7 +109,7 @@
"جÙÙÚ¯ÛØ±Û Ø§Ø² ÙÙÙع اÛ٠جÙاÛت را پذÛرا ÙشدÙ
بÙد."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -132,7 +132,7 @@
"ÙرضâÙØ§Û Ø®Ùد را پرداخت Ú©Ùد.)"
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -150,7 +150,7 @@
"خاطرÙâØ§Û Ù
بÙÙ
بد٠شد٠بÙد."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -170,7 +170,7 @@
"خاطر در اختÛار داشت٠ÛÚ© ابزار
اشکاÙâزداÛÛ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -187,7 +187,7 @@
"ابزارÙØ§Û Ø§Ø´Ú©Ø§ÙâزداÛÛ ØºÛر ÙاÙÙÙÛ ÙستÙØ¯Ø Ù
تÙسعÙâدÙÙدگاÙشا٠ب٠زÙدا٠اÙÚ©Ùد٠شدÙد."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -201,7 +201,7 @@
"تÙÙا Ù
ÛâتÙاÙست از Ø¢Ù Ø¨Ø±Ø§Û ØªÙ
رÛÙات Ú©ÙاسÛ
استÙاد٠کÙد."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "It was also possible to bypass the copyright monitors by installing a "
@@ -230,7 +230,7 @@
"اشخاص Ùرار ÙØ®ÙاÙÙد داد."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -243,7 +243,7 @@
"ÙشاÙÙ٠اÛ٠باشد Ú©Ù ÙÛزا ÙÛز دÙستش دارد."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -258,7 +258,7 @@
"تÙÙا اگر ÙÛزا گزارش Ù
ÛâØ¯Ø§Ø¯Ø Ù
تÙج٠Ù
ÛâشدÙد."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -278,7 +278,7 @@
"اÙجاÙ
عÙ
ÙÛ ØºÛر ÙاÙÙÙÛ ÙستÛØ¯Ø Ù Ø§ØتÛاجÛ
ÙبÙد بداÙÙد Ú©Ù ØÙÛÙتا Ú٠کار Ù
ÛâکردÛد."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -289,7 +289,7 @@
"ØتÙ
در درÙس Ø®Ùد Ù
ردÙد Ù
ÛâشدÙد."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -304,7 +304,7 @@
"اÙجاÙ
اÛ٠کار ÙستÙد."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -324,19 +324,19 @@
"ÙÙگاÙ
Û Ú©Ù ÙÛاÙ
٠تاÛک٠در سا٠۲۰۶۲ اتÙاÙ
اÙØªØ§Ø¯Ø Ø٠عÙ
ÙÙ
ÛÙ Ù
طاÙع٠ب٠ÛÚ©Û Ø§Ø² "
"اÙدا٠اصÙÛ ÙÛاÙ
تبدÛ٠گشت."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list "
"about the dangers of e-books</a>."
msgstr ""
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
#, fuzzy
#| msgid "Author's Note"
msgid "Author's Notes"
msgstr "Ûادداشت ÙÙÛسÙدÙ"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -346,7 +346,7 @@
"philosophy/words-to-avoid.html#Piracy\">“Piracy”</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -355,13 +355,13 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid "This note was updated in 2007."
msgid ""
@@ -369,7 +369,7 @@
"publication of the story."
msgstr "[اÛÙ Ûادداشت در سا٠۲۰۰۷ ب٠رÙز شدÙ
است.]"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The right to read is a battle being fought today. Although it may take "
@@ -403,7 +403,7 @@
"DADVSI ک٠در سا٠۲۰۰۶ تصÙÛب Ø´Ø¯Ø ØªÙÙا در اختÛار
داشت٠DeCSSØ ÛÚ© ÙرÙ
âاÙزار آزاد "
"Ø¨Ø±Ø§Û Ú©Ø¯Ú¯Ø´Ø§ÛÛÙ ÙÛÙÙ
âÙØ§Û DVDØ Ø¬Ø±Ù
Ù
ØسÙب Ù
ÛâØ´Ùد."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -414,7 +414,7 @@
"these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -425,14 +425,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -441,7 +441,7 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -460,7 +460,7 @@
"Ù
ÛâتÙاÙد Ùصب بÙâرÙزرساÙâÙا را تØÙ
ÛÙ
Ú©ÙØ¯Ø Ù Ûا ب٠تÙ
اÙ
سÛستÙ
âÙاÛÛ Ú©Ù Ø¯Ø§Ø±Ø§Û ÙÛستا
"
"ÙستÙد دستÙر دÙد تا از Ø§Ø¬Ø±Ø§Û Ø¨Ø¹Ø¶Û
راÙâاÙدازÙØ§Û Ø³Ø®ØªâاÙØ²Ø§Ø±Û Ø³Ø± باز زÙÙد."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "One of the ideas in the story was not proposed in reality until 2002. "
@@ -475,14 +475,14 @@
"اÛ٠تصÙر Ú©Ù <abbr>FBI</abbr> Ù Ù
اÛکرÙساÙت رÙ
ز عبÙر
رÛØ´Ù٠کاÙ
Ù¾ÛÙترتا٠را از "
"Ø´Ù
ا Ù
Ø®ÙÛ Ú©ÙÙد."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
"into use, it is called “secure boot”."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -508,7 +508,7 @@
"Ùادر Ù
Ûâسازد تا Ú©ÙترÙÛ Ø¨Ø¯ÙÙ Ù
ØدÙدÛت بر
Ø¢ÙÚÙ ÛÚ© کاربر در کاÙ
Ù¾ÛÙتر Ø®Ùد اÙجاÙ
"
"Ù
ÛâدÙد اعÙ
ا٠کÙÙد."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -517,7 +517,7 @@
"control. We call this <em>restricted boot</em>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "When this story was first written, the SPA was threatening small Internet "
@@ -545,7 +545,7 @@
"ØÙÛÙتا اÙاÙ
Ù٠دعÙÛ ÙÙ
Ùد. بعدÙا SPA از اÛÙ
اÙداÙ
Ø®Ùد دست Ú©Ø´ÛØ¯Ø Ø§Ù
ا DMCA را ب٠"
"دست Ø¢Ùرد ک٠آÙÚ٠را ب٠دÙباÙØ´ بÙد ÙراÙÙ
Ù
ÛâØ¢Ùرد."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The SPA, which actually stands for Software Publishers Association, has "
@@ -572,7 +572,7 @@
"تÙرÛبا ب٠طÙر ÙØ§Ø¶Ø Ù
ردÙ
را تÙدÛد کرد ک٠اگر
ÙرÙ
âاÙزارÙا را ب٠اشتراک بگذارÙØ¯Ø "
"بازداشت Ø®ÙاÙÙد شد."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The university security policies described above are not imaginary. For "
@@ -587,7 +587,7 @@
"کاÙ
Ù¾ÛÙترÙØ§Û Ø¯Ø§Ùشگا٠شÛگاگ٠ÙÙگاÙ
ÙرÙد بÙ
سÛستÙ
ÚÙÛÙ Ù¾ÛغاÙ
Û Ø±Ø§ ÙÙ
اÛØ´ Ù
ÛâدÙÙد "
"(Ù¾ÛغاÙ
بدÙ٠تغÛÛر ÙÙ٠شد٠است):"
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -609,7 +609,7 @@
"Ø®Ùا٠تعÙدÙاÙ
ÙÙ Ù
سئÙÙا٠سÛستÙ
را آشکار ÙÙ
ÙØ¯Ø Ù
Ù
ک٠است ب٠عÙÙا٠Ù
Ø¯Ø±Ú©Û Ø¨Ø±Ø§Û "
"Ù
سئÙÙا٠داÙشگا٠٠Ûا Ù
جرÛا٠ÙاÙÙÙ Ù
Ùرد
استÙاد٠Ùرار Ú¯Ûرد."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -619,11 +619,11 @@
"Ú¯ÛØ±Ø¯Ø Ø¨Ù Ù
راجع ÙاÙÙÙÛ Ø¨Ø¯ÙÙد .Ù
ترجÙ
] است: Ù
جبÙر ساخت٠اÙراد تا Ù¾ÛشاپÛØ´ از "
"ØÙÙÙ Ø®Ùد ÚØ´Ù
âÙ¾ÙØ´Û Ú©ÙÙد."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The <a href=\"#AuthorsNote\">author's note</a> talks about the battle for "
@@ -639,7 +639,7 @@
"Ù¾ÛÙÙدÙا ب٠Ù
ÙاÙØ§ØªÛ Ø¯Ø±Ø¨Ø§Ø±ÙÙ ÙÙاÙرÛâÙاÛÛ
اشار٠Ù
ÛâÚ©ÙÙد ک٠ب٠Ù
ÙظÙر ÙÙÛ ØÙÙÙ Ø´Ù
ا "
"Ø¨Ø±Ø§Û Ù
طاÙع٠تÙسع٠ÛاÙتÙâاÙد.â"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -650,31 +650,31 @@
"for rejecting the product completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -686,7 +686,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we want to stop the bad news and create some good news, we need to "
"organize and fight. Subscribe to the FSF's <a href=\"http://"
@@ -696,11 +696,11 @@
"of ways to participate in our work</a>."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Ù
راجع"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "The administration's “White Paper”: Information "
@@ -716,7 +716,7 @@
"گزارش ÙÛئت دÙÙت: زÛرسازÛ٠اطÙØ§Ø¹Ø§ØªØ Ù
ØصÙÙات ÙÙØ´Ù
Ùد ٠زÛرسازÛ٠اطÙاعات٠Ù
ÙÛ: "
"گزارش٠اÙجÙ
Ù٠تØÙÛ٠بر رÙÛ ÙÙاÙÛÙÙ Ù
ØصÙÙات ÙÙØ´Ù
Ùد (Û±Û¹Û¹Ûµ)."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -726,7 +726,7 @@
"\">تÙصÛÙÛ Ø¨Ø± گزارش ÙÛئت دÙÙت: تصرÙÙ
Ú©Ù¾ÛâراÛت</a>Ø Pamela SamuelsonØ WiredØ "
"ÚÙئ٠۱۹۹۶"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -734,7 +734,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">ÙرÙختÙ
شد</a>Ø "
"James BoyleØ ÙÛÙÛÙرک تاÛÙ
Ø²Ø Û³Û± Ù
ارس ۱۹۹۶"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -744,7 +744,7 @@
"people.org/archives/interesting-people/199611/msg00012.html\">اطÙاعات
عÙ
ÙÙ
Û "
"Ûا اطÙاعات Ù
ØرÙ
اÙÙ</a>Ø ÙاشÙÚ¯ØªÙ Ù¾Ø³ØªØ Û´ ÙÙاÙ
بر ۱۹۹۶."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.public-domain.org/\">Union for the Public Domain</"
@@ -759,26 +759,16 @@
"سازÙ
اÙÛ Ú©Ù Ùد٠آ٠Ù
ÙاÙÙ
ت در برابر گسترش
بÛØ´ از Øد٠Ùدرت٠کپÛâراÛت Ù Ø٠اÙ
تÛاز "
"اÙØصارÛØ Ù Ù
عکÙس کرد٠رÙÙد آ٠است."
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"اÛÙ Ù
ÙاÙ٠در <a
href=\"http://shop.fsf.org/product/free-software-free-"
-"society/\"><cite>ÙرÙ
âاÙزار Ø¢Ø²Ø§Ø¯Ø Ø¬Ø§Ù
عÙ٠آزاد: Ù
Ùتخب Ù
ÙاÙات رÛÚارد استاÙÙ
Ù</"
-"cite></a> Ù
Ùتشر شد٠است."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "Ø¨Ø±Ø§Û Ù
طاÙعÙ٠بÛشتر"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">ÙÙسÙ٠پرÙÚÙ
Ú¯ÙÙ</a>"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.computerworld.com/s/article/49358/"
@@ -793,6 +783,16 @@
"Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">ØÙاظت از
Ú©Ù¾ÛâبردارÛ: "
"بگÙÛÛد ÙÙ</a>Ø Ù
Ùتشر شد٠در Computer World."
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"اÛÙ Ù
ÙاÙ٠در <a
href=\"http://shop.fsf.org/product/free-software-free-"
+"society/\"><cite>ÙرÙ
âاÙزار Ø¢Ø²Ø§Ø¯Ø Ø¬Ø§Ù
عÙ٠آزاد: Ù
Ùتخب Ù
ÙاÙات رÛÚارد استاÙÙ
Ù</"
+"cite></a> Ù
Ùتشر شد٠است."
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/right-to-read.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.fr-en.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- po/right-to-read.fr-en.html 20 Oct 2016 08:59:04 -0000 1.55
+++ po/right-to-read.fr-en.html 6 Nov 2016 21:28:15 -0000 1.56
@@ -3,30 +3,60 @@
<title>The Right to Read
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
--></style>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<h2 class="center">The Right to Read</h2>
-<p>
+<p class="byline center">
by <a href="http://www.stallman.org/"><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
<em>This article appeared in the February 1997 issue
of <cite>Communications of the ACM</cite> (Volume 40, Number
2).</em></p>
-<hr />
+<hr class="thin" />
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<div class="columns">
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -62,7 +92,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -106,7 +139,10 @@
knowing your computer's root password. And neither
the FBI nor
Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -143,7 +179,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -153,6 +192,7 @@
to Luna, where they found others who had likewise gravitated away from
the long arm of the SPA. When the Tycho Uprising began in 2062, the
universal right to read soon became one of its central aims.</p>
+</div>
<div class="announcement">
<blockquote>
@@ -163,35 +203,46 @@
<div id="AuthorsNote">
<h3>Author's Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the unjust forces that use “pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it forwards into something more visibly
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
<p>The Electronic Frontier Foundation, a separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>The following note has been updated several times since the first
publication of the story.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns">
<p>
The battle for the right to read is already being fought. Although it
may take 50 years for our past freedoms to fade into obscurity, most
@@ -228,15 +279,20 @@
Even the World Wide Web Consortium has fallen under the shadow of the
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which lead to the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
+<p class="inline-block">
With Windows Vista, Microsoft admitted it had built in a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
@@ -244,7 +300,12 @@
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the FBI and Microsoft will keep the
@@ -274,7 +335,12 @@
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
In 1997, when this story was first published, the SPA was
threatening small Internet service providers, demanding they permit
@@ -293,7 +359,12 @@
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width">
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -315,12 +386,15 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
+</div>
</li>
</ul>
+<div class="column-limit"></div>
</div>
<h3 id="BadNews">Bad News</h3>
+<div class="columns">
<p>
The battle for the right to read is going against us so far.
The enemy is organized, and we are not.
@@ -344,10 +418,10 @@
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon can remotely erase any book.
+<li><p class="inline-block">It has a back door with which Amazon can remotely
erase any book.
In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
-<li><p>In case all that isn't Orwellian enough, there is a universal
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is
a universal
back door with which Amazon can remotely change the software, and
introduce any other form of nastiness.</p></li>
</ul>
@@ -369,6 +443,7 @@
our work more generally. There is also a <a href="/help/help.html">list of
ways
to participate in our work</a>.
</p>
+</div>
<h3 id="References">References</h3>
@@ -394,13 +469,7 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
-<blockquote id="fsfs"><p class="big">This essay is published
-in <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Other Texts to Read</h5>
+<h4>Other Texts to Read</h4>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -409,6 +478,13 @@
id="copy-protection">Copy Protection: Just Say No</a>,
published in Computer World.</li>
</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -467,7 +543,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/20 08:59:04 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.fr.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- po/right-to-read.fr.po 20 Oct 2016 18:54:30 -0000 1.116
+++ po/right-to-read.fr.po 6 Nov 2016 21:28:15 -0000 1.117
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-10-20 20:51+0200\n"
"Last-Translator: Sébastien Poher <sbphr @T volted.net>\n"
"Language-Team: French <address@hidden>\n"
@@ -43,7 +43,7 @@
"<em>Cet article a été publié dans la parution de février 1997 de "
"<cite>Communications of the ACM</cite> (volume 40, numéro 2).</em>"
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -51,7 +51,7 @@
"Extrait de <cite>The Road to Tycho</cite>, une collection d'articles sur les "
"antécédents de la révolution lunaire publiée à Luna City en 2096."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -64,7 +64,7 @@
"de mi-session. Il n'y avait personne d'autre à qui elle osait demander, à "
"part Dan."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -80,7 +80,7 @@
"lui avait enseigné dès l'école primaire que partager des livres était "
"vicieux et immoral â une chose que seuls les pirates font."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -102,7 +102,7 @@
"compte. Dan, comme propriétaire d'ordinateur, subirait la punition la plus "
"sévère â pour ne pas avoir tout tenté pour éviter l'infraction."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -126,7 +126,7 @@
"propres articles scientifiques, s'ils étaient souvent référencés, lui "
"rapporteraient assez pour rembourser sa dette)."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -144,7 +144,7 @@
"En 2047, les bibliothèques offrant un accès public gratuit à la
littérature "
"scientifique n'étaient qu'un pâle souvenir."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -164,7 +164,7 @@
"par la trahison). En 2047, Frank était en prison, non pas pour lecture "
"pirate, mais pour possession d'un débogueur."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -182,7 +182,7 @@
"dire qu'ils étaient illégaux ; les développeurs de ces débogueurs furent
"
"envoyés en prison."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -196,7 +196,7 @@
"programmation était gardé derrière un pare-feu spécial afin qu'il puisse "
"uniquement servir aux exercices du cours."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It was also possible to bypass the copyright monitors by installing a "
"modified system kernel. Dan would eventually find out about the free "
@@ -215,7 +215,7 @@
"ordinateur. Or, ni le FBI ni l'Aide technique Microsoft ne vous le "
"révèlerait."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -227,7 +227,7 @@
"occasion de lui parler le remplissait de bonheur. Et le fait qu'elle l'avait "
"choisi pour demander de l'aide pouvait signifier qu'elle l'aimait aussi."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -242,7 +242,7 @@
"pas compte automatiquement. Elle ne s'en rendrait compte que si Lissa le "
"dénonçait."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -263,7 +263,7 @@
"dire que vous étiez en train de faire quelque chose d'interdit et ils se "
"moquaient de savoir de quoi il s'agissait."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -273,7 +273,7 @@
"immédiatement. à la place, ils étaient bannis des systèmes informatiques
de "
"l'école et échouaient inévitablement à leurs examens."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -288,7 +288,7 @@
"punissaient les activités qui causaient du tort et pas celles qui "
"éveillaient simplement des soupçons."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -309,7 +309,7 @@
"Tycho commença en 2062, le droit universel de lire devint bientôt un de ses
"
"objectifs principaux."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list "
"about the dangers of e-books</a>."
@@ -318,11 +318,11 @@
"liste de diffusion (en anglais) concernant les dangers des livres "
"électroniques</a>."
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr "Notes de l'auteur"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -339,7 +339,7 @@
"tyrannique. Consultez « <a href=\"/philosophy/words-to-avoid.html#Piracy"
"\">Piratage</a> »."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -355,7 +355,7 @@
"DefectiveByDesign.org\">Defective by Design</a></cite>.<a id=\"TransNote2-rev"
"\" href=\"#TransNote2\"><sup>2</sup></a>. Nous demandons votre soutien."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
@@ -364,7 +364,7 @@
"lien avec la <cite>Free Software Fondation</cite>, fait également campagne "
"contre les DRM."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The following note has been updated several times since the first "
"publication of the story."
@@ -372,7 +372,7 @@
"La note suivante a été modifiée plusieurs fois depuis la première "
"publication de cette histoire."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The battle for the right to read is already being fought. Although it may "
"take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -396,7 +396,7 @@
"restrictions similaires sous une forme un peu moins rigoureuse dans une "
"directive de 2001 sur le copyright."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -415,7 +415,7 @@
"est l'une des nombreuses politiques injustes que ces traités imposent dans "
"les domaines les plus variés."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -438,7 +438,7 @@
"du Pacifique. Le TIPP imposerait des restrictions similaires à l'Europe. "
"Tous ces traités doivent être repoussés ou abolis."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
@@ -448,7 +448,7 @@
"de l'industrie du copyright; il est sur le point d'approuver l'inscription "
"officielle d'un système de DRM dans les spécifications du web."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -463,7 +463,7 @@
"devons exiger du logiciel exclusivement libre et rejeter les programmes non "
"libres."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"With Windows Vista, Microsoft admitted it had built in a back door: "
"Microsoft can use it to forcibly install software “upgrades,” "
@@ -481,7 +481,7 @@
"d'imposer des DRM que les utilisateurs ne pourraient pas outrepasser. Bien "
"sûr, Windows 10 n'a rien à lui envier."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"One of the ideas in the story was not proposed in reality until 2002. This "
"is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -492,7 +492,7 @@
"administrateur (root) de vos ordinateurs et ne vous permettraient pas de les "
"posséder."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
@@ -503,7 +503,7 @@
"il a été finalement mis en place, il s'appelle « démarrage sécuriséÂ
» <cite>"
"[secure boot]</cite>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"What Microsoft keeps is not exactly a password in the traditional sense; no "
"person ever types it on a terminal. Rather, it is a signature and "
@@ -524,7 +524,7 @@
"demande : elle <a href=\"/proprietary/malware-microsoft.html\">montre déjÃ
"
"au FBI les failles de sécurité de Windows</a> pour qu'il les exploite."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -539,7 +539,7 @@
"autre système (GNU/Linux par exemple) appartient à Microsoft. Nous appelons
"
"cela <em>démarrage restreint</em> <cite>[restricted boot]</cite>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"In 1997, when this story was first published, the SPA was threatening small "
"Internet service providers, demanding they permit the SPA to monitor all "
@@ -557,7 +557,7 @@
"la SPA a laissé tomber la plainte mais la DMCA lui a donné le pouvoir "
"qu'elle recherchait."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The SPA, which actually stands for Software Publishers Association, has been "
"replaced in its police-like role by the Business Software Alliance. The BSA "
@@ -577,7 +577,7 @@
"Argentine, des menaces à peine voilées ont été faites, selon lesquelles
les "
"gens partageant du logiciel seraient violés en prison."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -587,7 +587,7 @@
"imaginaires. Par exemple, un ordinateur dans une université de la région de
"
"Chicago affiche le message suivant au login :"
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -613,7 +613,7 @@
"système peuvent fournir ces indices aux autorités de l'université ou aux "
"forces de l'ordre."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -622,11 +622,11 @@
"presque tous les gens à accepter d'avance de renoncer aux droits qu'il leur "
"accorde."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "Mauvaises nouvelles"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The battle for the right to read is going against us so far. The enemy is "
"organized, and we are not."
@@ -634,7 +634,7 @@
"Jusqu'à présent, la bataille pour le droit de lire tourne à notre
détriment. "
"L'ennemi est organisé alors que nous ne le sommes pas."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -654,7 +654,7 @@
"avérées dont n'importe laquelle est une raison de rejeter complètement le "
"produit."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
@@ -664,12 +664,12 @@
"livre il est en train de lire, quelle page, Ã quel moment il souligne du "
"texte et quelles notes il prend."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
"Elle a un DRM conçu pour empêcher l'utilisateur de partager des copies."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
@@ -678,7 +678,7 @@
"n'importe quel livre. En 2009, elle a effacé des milliers de copies de "
"« 1984 », le roman de George Orwell."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
@@ -688,7 +688,7 @@
"universelle par laquelle Amazon peut modifier le logiciel à distance et "
"introduire n'importe quelle autre forme de vilainie."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -709,7 +709,7 @@
"C'est pourquoi je refuse de signer ce genre de contrat, que ce soit pour du "
"logiciel, des livres électroniques, de la musique ou n'importe quoi d'autre."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we want to stop the bad news and create some good news, we need to "
"organize and fight. Subscribe to the FSF's <a href=\"http://"
@@ -726,11 +726,11 @@
"travail. Il y a aussi de nombreux moyens d'y <a href=\"/help/help.html"
"\">participer</a>."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Références"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -742,7 +742,7 @@
"\">sic</a>] and the National Information Infrastructure: The Report of the "
"Working Group on Intellectual Property [sic] Rights (1995)."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -752,7 +752,7 @@
"archive/4.01/white.paper_pr.html\">The Copyright Grab</a>, Pamela Samuelson,
"
"<cite>Wired</cite>, janv. 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -760,7 +760,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, <cite>New York Times</cite>, 31 mars 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -770,7 +770,7 @@
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
"Private Data</a>, <cite>Washington Post</cite>, 4 nov. 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"https://web.archive.org/web/20151113122141/http://public-domain."
"org/\">Union for the Public Domain</a>—an organization which aims to "
@@ -781,26 +781,16 @@
"le but est de résister à l'extension débridée des pouvoirs du copyright
et "
"des brevets, et de faire marche arrière."
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Cet essai est publié dans <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "Autres textes à lire"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">Philosophie du projet GNU</a>"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.computerworld.com/article/2596679/networking/copy-"
"protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -810,6 +800,16 @@
"protection--just-say-no.html\" id=\"copy-protection\"> Copy Protection: Just "
"Say No</a>, publié dans <cite>Computer World</cite>."
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Cet essai est publié dans <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/right-to-read.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.it-en.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- po/right-to-read.it-en.html 20 Oct 2016 20:27:37 -0000 1.32
+++ po/right-to-read.it-en.html 6 Nov 2016 21:28:15 -0000 1.33
@@ -3,30 +3,60 @@
<title>The Right to Read
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
--></style>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<h2 class="center">The Right to Read</h2>
-<p>
+<p class="byline center">
by <a href="http://www.stallman.org/"><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
<em>This article appeared in the February 1997 issue
of <cite>Communications of the ACM</cite> (Volume 40, Number
2).</em></p>
-<hr />
+<hr class="thin" />
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<div class="columns">
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -62,7 +92,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -106,7 +139,10 @@
knowing your computer's root password. And neither
the FBI nor
Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -143,7 +179,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -153,6 +192,7 @@
to Luna, where they found others who had likewise gravitated away from
the long arm of the SPA. When the Tycho Uprising began in 2062, the
universal right to read soon became one of its central aims.</p>
+</div>
<div class="announcement">
<blockquote>
@@ -163,35 +203,46 @@
<div id="AuthorsNote">
<h3>Author's Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the unjust forces that use “pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it forwards into something more visibly
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
<p>The Electronic Frontier Foundation, a separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>The following note has been updated several times since the first
publication of the story.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns">
<p>
The battle for the right to read is already being fought. Although it
may take 50 years for our past freedoms to fade into obscurity, most
@@ -228,15 +279,20 @@
Even the World Wide Web Consortium has fallen under the shadow of the
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which lead to the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
+<p class="inline-block">
With Windows Vista, Microsoft admitted it had built in a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
@@ -244,7 +300,12 @@
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the FBI and Microsoft will keep the
@@ -274,7 +335,12 @@
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
In 1997, when this story was first published, the SPA was
threatening small Internet service providers, demanding they permit
@@ -293,7 +359,12 @@
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width">
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -315,12 +386,15 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
+</div>
</li>
</ul>
+<div class="column-limit"></div>
</div>
<h3 id="BadNews">Bad News</h3>
+<div class="columns">
<p>
The battle for the right to read is going against us so far.
The enemy is organized, and we are not.
@@ -344,10 +418,10 @@
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon can remotely erase any book.
+<li><p class="inline-block">It has a back door with which Amazon can remotely
erase any book.
In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
-<li><p>In case all that isn't Orwellian enough, there is a universal
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is
a universal
back door with which Amazon can remotely change the software, and
introduce any other form of nastiness.</p></li>
</ul>
@@ -369,6 +443,7 @@
our work more generally. There is also a <a href="/help/help.html">list of
ways
to participate in our work</a>.
</p>
+</div>
<h3 id="References">References</h3>
@@ -394,13 +469,7 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
-<blockquote id="fsfs"><p class="big">This essay is published
-in <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Other Texts to Read</h5>
+<h4>Other Texts to Read</h4>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -409,6 +478,13 @@
id="copy-protection">Copy Protection: Just Say No</a>,
published in Computer World.</li>
</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -467,7 +543,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/20 20:27:37 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.it.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- po/right-to-read.it.po 20 Oct 2016 20:27:37 -0000 1.105
+++ po/right-to-read.it.po 6 Nov 2016 21:28:15 -0000 1.106
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-10-20 22:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian\n"
@@ -44,7 +44,7 @@
"<cite>Communications of the ACM</cite> (volume 40, numero 2).</em>"
# type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -53,7 +53,7 @@
"antefatti della Rivoluzione Lunare, pubblicata a Città della Luna nel 2096."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -66,7 +66,7 @@
"prestito. E Dan era l'unico a cui avrebbe osato chiederlo."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -83,7 +83,7 @@
"sbagliata, una cosa da pirati."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -105,7 +105,7 @@
"dura, per la sua negligenza nel prevenire il crimine."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -130,7 +130,7 @@
"abbastanza spesso."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -149,7 +149,7 @@
"erano che un pallido ricordo."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -170,7 +170,7 @@
"debugger."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -188,7 +188,7 @@
"gli autori di debugger furono imprigionati."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -202,7 +202,7 @@
"che lo confinava unicamente all'uso per gli esercizi in classe."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It was also possible to bypass the copyright monitors by installing a "
"modified system kernel. Dan would eventually find out about the free "
@@ -221,7 +221,7 @@
"della Microsoft te l'avrebbero mai svelata."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -234,7 +234,7 @@
"questo poteva voler dire che anche lei lo amava."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -249,7 +249,7 @@
"accorta a meno che Lissa non lo denunciasse."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -271,7 +271,7 @@
"proibito, senza bisogno di sapere cosa."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -282,7 +282,7 @@
"inevitabilmente avrebbero fallito in tutti i corsi."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -298,7 +298,7 @@
"sospetti."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -319,7 +319,7 @@
"Tycho nel 2062, il diritto universale a leggere ne divenne presto uno degli "
"obiettivi centrali."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list "
"about the dangers of e-books</a>."
@@ -328,11 +328,11 @@
"mailing list sui rischi degli e-book</a>."
# type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr "Note dell'autore"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -349,7 +349,7 @@
"Vedere <a href=\"/philosophy/words-to-avoid.html#Piracy\">“"
"Pirateria”</a>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -363,7 +363,7 @@
"Software Foundation ha lanciato la campagna <a href=\"http://"
"DefectiveByDesign.org\">Defective by Design</a> e chiede il vostro aiuto."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
@@ -372,7 +372,7 @@
"collegata alla Free Software Foundation, organizza campagne contro i DRM."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The following note has been updated several times since the first "
"publication of the story."
@@ -381,7 +381,7 @@
"storia."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The battle for the right to read is already being fought. Although it may "
"take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -404,7 +404,7 @@
"restrizioni simili, anche se non altrettanto forti, in una direttiva del "
"2001 sul diritto d'autore."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -422,7 +422,7 @@
"criminalizzare i programmi che aggirano i DRM è una fra le tante politiche "
"ingiuste imposte da questi trattati in vari campi."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -439,7 +439,7 @@
"Pacifico. TTIP farebbe lo stesso in Europa. Tutti questi trattati devono "
"essere superati o aboliti."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
@@ -448,7 +448,7 @@
"Anche il World Wide Web Consortium sta cedendo al potere delle aziende; sta "
"per approvare un sistema DRM come parte ufficiale delle specifiche del web."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -461,7 +461,7 @@
"software-even-more-important.html\">non si può mai avere fiducia in un "
"programma non libero</a>. Dobbiamo respingere i programmi non liberi."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"With Windows Vista, Microsoft admitted it had built in a back door: "
"Microsoft can use it to forcibly install software “upgrades,” "
@@ -477,7 +477,7 @@
"l'utente non potesse superare. Ovviamente Windows 10 non è migliore."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"One of the ideas in the story was not proposed in reality until 2002. This "
"is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -487,7 +487,7 @@
"2002, quella che l'FBI e Microsoft terranno le parole segrete primarie per "
"il tuo computer personale, senza fornirtele."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
@@ -498,7 +498,7 @@
"come “secure boot”."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"What Microsoft keeps is not exactly a password in the traditional sense; no "
"person ever types it on a terminal. Rather, it is a signature and "
@@ -518,7 +518,7 @@
"dell'FBI quando le verrà chiesto di farlo: già ora <a href=\"/proprietary/"
"malware-microsoft.html\">mostra alla NSA bug di sicurezza in Windows</a>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -533,7 +533,7 @@
"controllo di Microsoft. Noi lo chiamiamo <em>restricted boot</em>."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"In 1997, when this story was first published, the SPA was threatening small "
"Internet service providers, demanding they permit the SPA to monitor all "
@@ -551,7 +551,7 @@
"loro il potere che cercavano."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The SPA, which actually stands for Software Publishers Association, has been "
"replaced in its police-like role by the Business Software Alliance. The BSA "
@@ -571,7 +571,7 @@
"il software sarebbero state violentate in carcere."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -582,7 +582,7 @@
"nell'area di Chicago si poteva leggere, al momento dell'accesso:"
# type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -608,7 +608,7 @@
"dell'Università e/o a agenti dell'ordine pubblico."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -616,11 +616,11 @@
"Ã invero un approccio interessante al Quarto Emendamento: pressare da subito
"
"i più a rinunciare ai propri diritti che questo garantisce."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "Cattive notizie"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The battle for the right to read is going against us so far. The enemy is "
"organized, and we are not."
@@ -628,7 +628,7 @@
"La battaglia per il diritto a leggere è già in corso, e stiamo subendo. Il "
"nemico è organizzato e noi non lo siamo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -646,7 +646,7 @@
"\">funzioni Orwelliane</a>, ciascuna delle quali abbastanza grave per "
"abbandonare il prodotto:"
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
@@ -655,11 +655,11 @@
"Spia il lettore: riferisce quale libro viene letto, a quale pagina, e "
"traccia le sottolineature e le note."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr "Ha DRM per evitare che gli utenti condividano copie."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
@@ -668,7 +668,7 @@
"libro e che nel 2009 è stata usata per cancellare copie del libro \"1984\" "
"di George Orwell."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
@@ -678,7 +678,7 @@
"Amazon può cambiare il software da remoto, introducendo qualsiasi tipo di "
"funzioni."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -696,7 +696,7 @@
"di accettare questi contratti, per software, e-book, musica o qualsiasi "
"altra cosa."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we want to stop the bad news and create some good news, we need to "
"organize and fight. Subscribe to the FSF's <a href=\"http://"
@@ -713,12 +713,12 @@
"\"/help/help.html\">modi per aiutare il nostro lavoro</a>."
# type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Riferimenti"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -731,7 +731,7 @@
"of the Working Group on Intellectual Property [sic] Rights (1995)."
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -742,7 +742,7 @@
"Wired, gennaio 1996"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -750,7 +750,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 marzo 1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -761,7 +761,7 @@
"Private Data</a>, Washington Post, 4 Novembre 1996."
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"https://web.archive.org/web/20151113122141/http://public-domain."
"org/\">Union for the Public Domain</a>—an organization which aims to "
@@ -772,30 +772,19 @@
"contrastare e ad invertire l'eccessiva estensione dei poteri concessi dai "
"diritti di copia e dai brevetti."
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Questo testo è stato pubblicato in <a href=\"http://shop.fsf.org/product/"
-"free-software-free-society/\"><cite> Free Software, Free Society: The "
-"Selected Essays of Richard M. Stallman</cite></a>."
-
# type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "Altri testi da leggere"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">Filosofia del progetto GNU</a>"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.computerworld.com/article/2596679/networking/copy-"
"protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -805,6 +794,17 @@
"protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
"Say No</a>, Pubblicato in Computer World."
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Questo testo è stato pubblicato in <a href=\"http://shop.fsf.org/product/"
+"free-software-free-society/\"><cite> Free Software, Free Society: The "
+"Selected Essays of Richard M. Stallman</cite></a>."
+
# type: Content of: <div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
Index: po/right-to-read.ja-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ja-en.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/right-to-read.ja-en.html 31 Oct 2016 04:28:15 -0000 1.29
+++ po/right-to-read.ja-en.html 6 Nov 2016 21:28:15 -0000 1.30
@@ -3,30 +3,60 @@
<title>The Right to Read
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
--></style>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<h2 class="center">The Right to Read</h2>
-<p>
+<p class="byline center">
by <a href="http://www.stallman.org/"><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
<em>This article appeared in the February 1997 issue
of <cite>Communications of the ACM</cite> (Volume 40, Number
2).</em></p>
-<hr />
+<hr class="thin" />
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<div class="columns">
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -62,7 +92,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -106,7 +139,10 @@
knowing your computer's root password. And neither
the FBI nor
Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -143,7 +179,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -153,6 +192,7 @@
to Luna, where they found others who had likewise gravitated away from
the long arm of the SPA. When the Tycho Uprising began in 2062, the
universal right to read soon became one of its central aims.</p>
+</div>
<div class="announcement">
<blockquote>
@@ -163,35 +203,46 @@
<div id="AuthorsNote">
<h3>Author's Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the unjust forces that use “pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it forwards into something more visibly
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
<p>The Electronic Frontier Foundation, a separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>The following note has been updated several times since the first
publication of the story.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns">
<p>
The battle for the right to read is already being fought. Although it
may take 50 years for our past freedoms to fade into obscurity, most
@@ -228,15 +279,20 @@
Even the World Wide Web Consortium has fallen under the shadow of the
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which lead to the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
+<p class="inline-block">
With Windows Vista, Microsoft admitted it had built in a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
@@ -244,7 +300,12 @@
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the FBI and Microsoft will keep the
@@ -274,7 +335,12 @@
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
In 1997, when this story was first published, the SPA was
threatening small Internet service providers, demanding they permit
@@ -293,7 +359,12 @@
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width">
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -315,12 +386,15 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
+</div>
</li>
</ul>
+<div class="column-limit"></div>
</div>
<h3 id="BadNews">Bad News</h3>
+<div class="columns">
<p>
The battle for the right to read is going against us so far.
The enemy is organized, and we are not.
@@ -344,10 +418,10 @@
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon can remotely erase any book.
+<li><p class="inline-block">It has a back door with which Amazon can remotely
erase any book.
In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
-<li><p>In case all that isn't Orwellian enough, there is a universal
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is
a universal
back door with which Amazon can remotely change the software, and
introduce any other form of nastiness.</p></li>
</ul>
@@ -369,6 +443,7 @@
our work more generally. There is also a <a href="/help/help.html">list of
ways
to participate in our work</a>.
</p>
+</div>
<h3 id="References">References</h3>
@@ -394,13 +469,7 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
-<blockquote id="fsfs"><p class="big">This essay is published
-in <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Other Texts to Read</h5>
+<h4>Other Texts to Read</h4>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -409,6 +478,13 @@
id="copy-protection">Copy Protection: Just Say No</a>,
published in Computer World.</li>
</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -467,7 +543,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/31 04:28:15 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.ja.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ja.po,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- po/right-to-read.ja.po 31 Oct 2016 04:28:15 -0000 1.66
+++ po/right-to-read.ja.po 6 Nov 2016 21:28:15 -0000 1.67
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-10-31 10:30+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -39,7 +39,7 @@
"<em>ãã®è¨äºã¯<cite>Communications of the
ACM</cite>1997å¹´2æå·(第40å·»No.2)ã«"
"æ²è¼ããã¾ããã</em>"
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -47,7 +47,7 @@
"æé¢é©å½ã®å
è¡è
ã«é¢ããè¨äºéã<cite>ãã£ã³ã¸ã®é</cite>ãã«ãã·ãã£çºè¡ã"
"2096å¹´ãããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -60,7 +60,7 @@
"ã¯ããçµãããããã¨ãã§ããªãã£ãããã³ãé¤ãã°ãä»ã«å½¼å¥³ãé
¼ããè
ã¯ããª"
"ãã£ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -76,7 +76,7 @@
"ããã¨ãããããããééã£ããã¨ããããæµ·è³ã
ããè¡ããããªãã¨ã ã¨æããã"
"ã¦ããã®ã§ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -96,7 +96,7 @@
"ã³ã³ãã¥ã¼ã¿ææè
ã§ããå½¼ã¯ãç¯ç½ªã®çºçãããã¦é»æ¢ããªãã£ããã¨ããåã§æ"
"ãå³ããåç½°ãåãããã¨ã¨ãªãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -117,7 +117,7 @@
"ãç 究è
ãã¡ã«æ¯æãããããã³ã¯å¦è
ã«ãªãã¤ããã
ã£ãã®ã§ãå°æ¥å½¼èªèº«ã®ç 究"
"è«æãé »ç¹ã«åç
§ãããã°ããã®ãã¼ã³ãè¿æ¸ã§ããã¨æããã¨ãã§ããã®ã
ã)"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -133,7 +133,7 @@
"ããã«ãªã£ãã2047å¹´ã¾ã§ã«ããã¤ã¦å³æ¸é¤¨ã§ã¯å¦è¡æç®ã«èªç±ã«èª°ã§ãã¢ã¯ã»ã¹ã§"
"ãããã¨ãªã©ããã¼ãããªè¨æ¶ã®å½¼æ¹ã«æ¶ãã¦ãã¾ã£ãã®ã§ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -152,7 +152,7 @@
"è£åãã¸èªæãããã®ã§ãã)ã2047å¹´ããã©ã³ã¯ã¯ååæã®ä¸ã«ãããããããå½¼ã"
"æçãããã®ã¯æµ·è³èªæ¸ã®ããã§ã¯ãªãããããã¬ã®ææã®ããã
ã£ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -168,7 +168,7 @@
"ããã¬ã®ä¸»è¦ãªå©ç¨æ¹æ³ã¨ãªã£ãã¨ããå¤æ±ºãä¸ãããããã«ãã£ã¦ãããã¬ã¯éæ³"
"ã¨ããããããã¬ã®éçºè
ãã¡ã¯æçãããã®ã§ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -181,7 +181,7 @@
"ããã¬ã¯ç¹å¥ãªãã¡ã¤ã¢ã¦ã©ã¼ã«ã®èå¾ã«ç½®ãããã¯ã©ã¹ã®å®ç¿ã§ã®ã¿ä½¿ããããã«"
"ãªã£ã¦ããã®ã§ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It was also possible to bypass the copyright monitors by installing a "
"modified system kernel. Dan would eventually find out about the free "
@@ -198,7 +198,7 @@
"ãã¥ã¼ã¿ã®ã«ã¼ãã»ãã¹ã¯ã¼ããç¥ããªããã¨ã«ã¯ã¤ã³ã¹ãã¼ã«ã§ããªãã®ã
ã£ãã"
"FBIããã¤ã¯ãã½ããã»ãµãã¼ãããã¹ã¯ã¼ããæãã¦ã¯ãããªãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -210,7 +210,7 @@
"彼女ã¨è©±ãæã¯ãã¤ãããã³ã®å¿ã¯åã³ã«æºã¡ããµããã®ã
ã£ããããã¦ãªããµã¯ä»"
"ãªãã¬å½¼ã«å©ããæ±ãã¦ããã®ã
ããã彼女ãå½¼ãæãã¦ããã®ãããããªãã£ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -224,7 +224,7 @@
"ãè¾¼ãã ãããããã¯ä¾ç¶ã¨ãã¦ç¯ç½ªã
ããSPAã¯èªåçã«ã¯çºè¦ãããã¨ãã§ããª"
"ãããªããµãå½¼ãå ±åããå
´åã®ã¿ãå½¼ãã¯ç¥ããã¨ã«ãªãã®ã ã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -243,7 +243,7 @@
"ããã
ãã§çå¾ãä½ãç¦æ¢ããã¦ãããã¨ããã£ã¦ããã¨ã¿ãªãã®ã«ååã§ãå®éã«"
"ä½ããã£ã¦ãããç¥ãå¿
è¦ã¯ãªãã¨ããããã ã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -253,7 +253,7 @@
"ããã«å½¼ãã¯å¦æ ¡ã®ã³ã³ãã¥ã¼ã¿ã·ã¹ãã
ã®å©ç¨ãç¦æ¢ãããå¿
ç¶çã«ãã¹ã¦ã®åä½"
"ãè½ã¨ãã¨ãããã¨ã«ãªã£ã¦ãã¾ãã®ã ã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -266,7 +266,7 @@
"ã¦ç°ãªã£ãæ¹éãä¿æãã¦ãããå½æã®å½¼ãã¯ãæ害ãªæ´»åãç½°ããã®ã§ãã£ã¦ãç"
"ããæãããã ãã®è
ã¯ç½°ããªãã£ãã®ã§ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -285,7 +285,7 @@
"2062å¹´ã«ãã£ã³èèµ·ãå§ã¾ã£ãã¨ããä¸äººã«ã¨ã£ã¦ã®èªã権å©ã¯ã¾ããªããã®ä¸å¿ç"
"ãªç®çã®ä¸ã¤ã¨ãªã£ãã®ã§ããã"
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list "
"about the dangers of e-books</a>."
@@ -293,11 +293,11 @@
"<a
href=\"http://defectivebydesign.org/ebooks.html\">é»åæ¸ç±ã®å±éºã«ã¤ãã¦ã"
"ããããã¡ã®ã¡ã¼ãªã³ã°ãªã¹ãã«åå ãã ãã</a>"
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr "ä½è
ã®æ³¨é"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -313,7 +313,7 @@
"ãã¡ãã®ã<a
href=\"/philosophy/words-to-avoid.html#Piracy\">ãæµ·è³è¡çºã</a>"
"ãã覧ãã ããã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -327,7 +327,7 @@
"DefectiveByDesign.org\">Defective by
Design</a>(è¨è¨ããééã£ã¦ãã)ãã£ã³"
"ãã¼ã³ãè¨ç½®ãã¾ãããçããã®ãµãã¼ãããé¡ããã¾ãã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
@@ -335,13 +335,13 @@
"é»åããã³ãã£ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³ããããªã¼ã½ããã¦ã§ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³ã¨"
"ã¯é¢ä¿ãªãå¥ã®å£ä½ã§ãããDRMã«å対ããéåããã¦ãã¾ãã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The following note has been updated several times since the first "
"publication of the story."
msgstr
"ãã®æ³¨éã¯ã¹ãã¼ãªã¼ã®æåã®çºè¡¨ããä½åãæ´æ°ããã¾ããã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The battle for the right to read is already being fought. Although it may "
"take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -362,7 +362,7 @@
"ã¨ãã§ããããã°ã©ã ã®é
å¸ãç¯ç½ªã¨ãããã¨ã«ãã£ã¦ã§ããã¨ã¼ãããé£åãåæ§"
"ã«å¼·åã§ã¯ããã¾ãããä¼¼ããããªå¶éã2001å¹´ã®èä½æ¨©æ令ã§èª²ãã¦ãã¾ãã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -379,7 +379,7 @@
"DRMãç ´ãããã°ã©ã
ãç½°ããDMCAã®ããªã·ã¼ã¯ãããããã®ä¸å
¬æ£ãªããªã·ã¼ã®ä¸ã¤"
"ã§ããããã£ãæ¡ç´ãåºç¯å²ã®åéã«æ¸¡ã£ã¦æ¼ãä»ãããã®ã§ãã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -396,7 +396,7 @@
"ã®æ§é
ãã¨ã¼ãããã«æ¼ãä»ããã§ãããããã¹ã¦ã®ãããã£ãæ¡ç´ã¯ç
´æ£ããªãã"
"ã°ãªãã¾ããã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
@@ -405,7 +405,7 @@
"WWWã³ã³ã½ã¼ã·ã¢ã ã§ããããèä½æ¨©æ¥çã®å½±ã®å
ã«é¥ã£ã¦ãã¾ãã¾ãããä»ãDRMã·"
"ã¹ãã ãã¦ã§ãã®ä»æ§ã®å
¬å¼é¨åã¨ããæ¿èªã®ããã«ããã¾ãã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -419,7 +419,7 @@
"(ãªãã¬)ã½ããã¦ã§ã¢ã ãã主張ããä¸èªç±ãªããã°ã©ã
ãæå¦ããªãã¦ã¯ãªãã¾ã"
"ãã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"With Windows Vista, Microsoft admitted it had built in a back door: "
"Microsoft can use it to forcibly install software “upgrades,” "
@@ -435,7 +435,7 @@
"ããã¨ãã§ãã¾ããVistaã®ã¦ã¼ã¶ã®å¼¾å§ã®ä¸»ãªç®çã¯ãã¦ã¼ã¶ãå
æã§ããªãDRMã®"
"æ¼ãä»ãã§ããããã¡ãããã¦ã£ã³ãã¦ãºã¯æ±ºãã¦ããã¯ããã¾ããã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"One of the ideas in the story was not proposed in reality until 2002. This "
"is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -445,7 +445,7 @@
"ããããã¯ãFBIã¨ãã¤ã¯ãã½ãããããªãã®ãã¼ã½ãã«ã»ã³ã³ãã¥ã¼ã¿ã®ã«ã¼ããã¹"
"ã¯ã¼ããä¿æããããªãã«ã¯æãããªãã¨ãããã®ã§ãã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
@@ -455,7 +455,7 @@
"ã©ã¸ã¦ã
ãã®ãããªåãä¸ãã¾ããããæçµçã«ä½¿ã段ã«ãªã£ã¦ãããã¯ãã»ãã¥"
"ã¢ã»ãã¼ããã¨å¼ã°ãã¾ãã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"What Microsoft keeps is not exactly a password in the traditional sense; no "
"person ever types it on a terminal. Rather, it is a signature and "
@@ -476,7 +476,7 @@
"microsoft.html\">ã¦ã£ã³ãã¦ãºã®NSAã»ãã¥ãªãã£ãã°ãè¦ãã¦ããã®ã§ã</a>ã"
"ãã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -490,7 +490,7 @@
"ããª)ã»ãã®ã·ã¹ãã
ãã¤ã³ã¹ãã¼ã«ã§ãããã©ããã¯ããã¤ã¯ãã½ããã®ã³ã³ããã¼"
"ã«ä¸ã«ããã¾ãããããããããã¡ã¯<em>å¶éããããã¼ã</em>ã¨å¼ã³ã¾ãã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"In 1997, when this story was first published, the SPA was threatening small "
"Internet service providers, demanding they permit the SPA to monitor all "
@@ -506,7 +506,7 @@
"ã³ãã®Community
ConneXionã¯è¦æ±ãæå¦ãå®éã«è¨´ãããã¾ãããSPAã¯å¾ã«è¨´è¨ã"
"åãä¸ãã¾ããããæ±ãã¦ããåãDMCAãä¸ãã¦ãããã®ã§ãã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The SPA, which actually stands for Software Publishers Association, has been "
"replaced in its police-like role by the Business Software Alliance. The BSA "
@@ -524,7 +524,7 @@
"ãã¦å±éãããBSAã®æãã¹ããã£ã³ãã¼ã³ã¯ãã½ããã¦ã§ã¢ãå
±æãã人ã
ã¯ç£çã§"
"ã¬ã¤ããããã ããã¨ãããããªãã¨ãé åãã«è¿°ã¹ã¦è
ããããªå
容ã§ããã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -534,7 +534,7 @@
"ãã°ãã·ã«ã´å°åã«ããæ大å¦ã®ã³ã³ãã¥ã¼ã¿ã¯ããã°ã¤ã³ããéã«ä»¥ä¸ã®ãããª"
"ã¡ãã»ã¼ã¸ã表示ãã¾ãã"
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -557,7 +557,7 @@
"å¤æãããªãã°ãã·ã¹ãã
è·å¡ã¯ãã®ãããªç£è¦ã§å¾ããã証æ ã大å¦ãããã¯è¦å¯"
"å½å±ã«å¼ã渡ããã¨ãããå¾ãã¨ãããã¨ãç解ãã¦ãããã®ã¨ãã¾ãã"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -566,11 +566,11 @@
"ã«åæããããå§åãããã¦ããã¨ããç¹ã§ãæ²æ³ä¿®æ£ç¬¬4æ¡ã¸ã®èå³æ·±ãã¢ããã¼ã"
"ã§ãã"
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "æªããã¥ã¼ã¹"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The battle for the right to read is going against us so far. The enemy is "
"organized, and we are not."
@@ -578,7 +578,7 @@
"èªã権å©ã®æ¦ãã¯ããã¾ã§ããããã¡ã«ä¸å©ã§ãããæµã¯çµç¹åããã¦ãã¾ãããã"
"ãããã¡ã¯ããã§ã¯ããã¾ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -596,7 +596,7 @@
"ã«ãã£ã¦å®è¡ããã¦ãã¾ãããã®æ©è½ã®ã©ãããããã®è£½åãå®å
¨ã«æå¦ãããã¨ã«"
"å¤ããã§ããã: "
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
@@ -606,12 +606,12 @@
"ã¸ããå
±åããã¦ã¼ã¶ããã¤ãã¯ã¹ãããã¤ã©ã¤ãããããã¦ã¼ã¶ãå
¥åããã©ããª"
"注éãå ±åãã¾ãã"
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
"ããã¯DRMãæããã¦ã¼ã¶ãã³ãã¼ãå
±æãããã¨ãé»æ¢ãããã¨ãæå³ãã¦ãã¾ãã"
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
@@ -619,7 +619,7 @@
"ããã¯Amazonãé
éæä½ã§ãããªãæ¬ãåé¤ã§ããããã¯ãã¢ãæãã¾ãã2009å¹´ã"
"ã¸ã§ã¼ã¸ã»ãªã¼ã¦ã§ã«èã®1984ã®ã³ãã¼ãä½åé¨ãåé¤ãã¾ããã"
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
@@ -629,7 +629,7 @@
"Amazonã¯é
éæä½ã§ã½ããã¦ã§ã¢ãå¤æ´ãããã¨ãã§ããã»ãã®ãããã種é¡ã®ä¸å¿«"
"ãå°å
¥ã§ãã¾ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -648,7 +648,7 @@
"ãã¯ãããã£ãå¥ç´ã«åæãããã¨ãæå¦ãã¾ããå¥ç´ããã½ããã¦ã§ã¢ãé»åæ¸"
"ç±ãé³æ¥½ãããã¯ã»ãã®ãã®ãä½ã§ãã£ã¦ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we want to stop the bad news and create some good news, we need to "
"organize and fight. Subscribe to the FSF's <a href=\"http://"
@@ -663,11 +663,11 @@
"\">FSFã«åå
ãã¦</a>ããããã¡ã®ä»äºã«ä¸è¬çã«æ¯æ´ã§ãã¾ãã<a
href=\"/help/"
"help.html\">ããããã¡ã®ä»äºã«åå
ããæ¹æ³ã®ãªã¹ã</a>ãããã¾ãã"
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "åèæç®"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -678,7 +678,7 @@
"\"/philosophy/not-ipr.html\">sic</a>]ããã³å½å®¶æ
å
±ã¤ã³ãã©ã¹ãã©ã¯ãã£ã¼: ç¥"
"ç財ç£[sic]権ã«é¢ããã¯ã¼ãã³ã°ã°ã«ã¼ãå ±åæ¸(1995)ã"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -687,7 +687,7 @@
"<a
href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">ç½æ¸"
"ã®è§£èª¬: èä½æ¨©ã®æ¨ªé </a>ãPamela SamuelsonãWiredã1996å¹´1æå·"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -695,7 +695,7 @@
"<a
href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">ã売ãåãã</a>ã"
"James Boyleããã¥ã¼ã¨ã¼ã¯ã¿ã¤ã 㺠1996å¹´3æ31æ¥ã"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -705,7 +705,7 @@
"people.org/archives/interesting-people/199611/msg00012.html\">å
¬çãã¼ã¿ãç§"
"çãã¼ã¿ã</a>ãã¯ã·ã³ãã³ãã¹ãã1996å¹´11æ4æ¥ã"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"https://web.archive.org/web/20151113122141/http://public-domain."
"org/\">Union for the Public Domain</a>—an organization which aims to "
@@ -715,26 +715,16 @@
"org/\">ãããªãã¯ãã¡ã¤ã³é£å</a>—èä½æ¨©ã¨ç¹è¨±ã®æ¨©åã®éå°ãªæ¡å¤§ã«æµæ"
"ããæ¹éã転æããããã¨ããå£ä½ã"
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"ãã®å°è«ã¯<a
href=\"http://shop.fsf.org/product/free-software-free-society/"
-"\"><cite>èªç±ã½ããã¦ã§ã¢ãèªç±ãªç¤¾ä¼:
ãªãã£ã¼ãã»Mã»ã¹ãã¼ã«ãã³å°è«é¸é</"
-"cite></a>ã«åé²ãããåºçããã¾ããã"
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "ãã®ä»ã®èªã¿ãã®"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a
href=\"/philosophy/philosophy.html\">GNUããã¸ã§ã¯ãã®ç念</a>"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.computerworld.com/article/2596679/networking/copy-"
"protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -744,6 +734,16 @@
"copyprotection--just-say-no.html\" id=\"copy-protection\">èä½æ¨©ä¿è·:
åã«"
"ãã¼ã¨è¨ãã</a>ãComputer Worldèªã«æ²è¼ã"
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"ãã®å°è«ã¯<a
href=\"http://shop.fsf.org/product/free-software-free-society/"
+"\"><cite>èªç±ã½ããã¦ã§ã¢ãèªç±ãªç¤¾ä¼:
ãªãã£ã¼ãã»Mã»ã¹ãã¼ã«ãã³å°è«é¸é</"
+"cite></a>ã«åé²ãããåºçããã¾ããã"
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/right-to-read.ko-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ko-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- po/right-to-read.ko-diff.html 18 Oct 2016 16:29:50 -0000 1.34
+++ po/right-to-read.ko-diff.html 6 Nov 2016 21:28:15 -0000 1.35
@@ -15,34 +15,71 @@
<title>The Right to Read
- GNU Project - Free Software Foundation</title>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
--></style></em></ins></span>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<span class="removed"><del><strong><h2>The</strong></del></span>
+<span class="inserted"><ins><em><h2 class="center">The</em></ins></span>
Right to Read</h2>
-<p>
+<span class="removed"><del><strong><p></strong></del></span>
+
+<span class="inserted"><ins><em><p class="byline
center"></em></ins></span>
by <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
<span class="removed"><del><strong><blockquote class="note">
<p><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of eBooks</a>.</p>
-</blockquote></strong></del></span>
+</blockquote>
-<p>
+<p></strong></del></span>
+<span class="inserted"><ins><em><p class="center"></em></ins></span>
<em>This article appeared in the February 1997 issue
of <span
class="removed"><del><strong><strong>Communications</strong></del></span>
<span class="inserted"><ins><em><cite>Communications</em></ins></span> of
the <span class="removed"><del><strong>ACM</strong></strong></del></span>
<span class="inserted"><ins><em>ACM</cite></em></ins></span> (Volume 40,
Number
2).</em></p>
-<span class="inserted"><ins><em><hr /></em></ins></span>
-<blockquote><p>
+<span
class="removed"><del><strong><blockquote><p></strong></del></span>
+<span class="inserted"><ins><em><hr class="thin" />
+
+<div class="article">
+<blockquote class="info center"><p></em></ins></span>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -78,7 +115,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -122,7 +162,10 @@
knowing your computer's root password. And neither
the <span class="removed"><del><strong><abbr title="Federal Bureau of
Investigation">FBI</abbr></strong></del></span> <span
class="inserted"><ins><em>FBI</em></ins></span> nor
Microsoft Support would tell you that.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -159,7 +202,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -174,8 +220,9 @@
<span class="removed"><del><strong><h3 id="AuthorsNote">Author's
Note</h3>
<p>[This</strong></del></span>
+<span class="inserted"><ins><em></div>
-<span class="inserted"><ins><em><div class="announcement">
+<div class="announcement">
<blockquote>
<p><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of e-books</a>.</p>
</blockquote>
@@ -184,35 +231,46 @@
<div id="AuthorsNote">
<h3>Author's Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the unjust forces that use “pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it forwards into something more visibly
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
<p>The Electronic Frontier Foundation, a separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>The following</em></ins></span> note has been updated several times
since the first
-publication of the <span
class="removed"><del><strong>story.]</p></strong></del></span> <span
class="inserted"><ins><em>story.</p></em></ins></span>
+publication of the <span
class="removed"><del><strong>story.]</p></strong></del></span> <span
class="inserted"><ins><em>story.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns"></em></ins></span>
<p>
The <span class="inserted"><ins><em>battle for the</em></ins></span> right to
read is <span class="removed"><del><strong>a battle</strong></del></span> <span
class="inserted"><ins><em>already</em></ins></span> being <span
class="removed"><del><strong>fought today.</strong></del></span> <span
class="inserted"><ins><em>fought.</em></ins></span> Although it
may take 50 years for our <span class="removed"><del><strong>present way of
life</strong></del></span> <span class="inserted"><ins><em>past
freedoms</em></ins></span> to fade into obscurity, most
@@ -226,42 +284,41 @@
distribution of programs that can break DRM a crime.</em></ins></span> The
European
Union imposed similar restrictions in a 2001 copyright <span
class="removed"><del><strong>directive. In France, under the DADVSI law
adopted</strong></del></span> <span
class="inserted"><ins><em>directive,</em></ins></span> in <span
class="removed"><del><strong>2006, mere possession of a copy of DeCSS, the free
program
-to decrypt video on a DVD, is a crime.</p>
+to decrypt video on a DVD, is</strong></del></span> a <span
class="removed"><del><strong>crime.</p></strong></del></span>
+<span class="inserted"><ins><em>form not quite as
strong.</p></em></ins></span>
<p>
-In 2001, Disney-funded Senator Hollings proposed a bill called the
-SSSCA that would require every new computer to have mandatory
-copy-restriction facilities that the user cannot bypass. Following
-the Clipper chip and similar US government key-escrow proposals, this
-shows</strong></del></span> a <span class="removed"><del><strong>long-term
trend: computer systems are increasingly set up to
-give absentees with clout control over the people actually using the
+<span class="removed"><del><strong>In 2001, Disney-funded Senator Hollings
proposed a bill called the
+SSSCA that would require every new computer</strong></del></span>
+<span class="inserted"><ins><em>The US campaigns</em></ins></span> to <span
class="removed"><del><strong>have mandatory
+copy-restriction facilities that</strong></del></span> <span
class="inserted"><ins><em>impose such rules on</em></ins></span> the <span
class="removed"><del><strong>user cannot bypass.
Following</strong></del></span> <span class="inserted"><ins><em>rest
of</em></ins></span> the <span class="removed"><del><strong>Clipper chip and
similar US government key-escrow proposals, this
+shows</strong></del></span> <span class="inserted"><ins><em>world through
+so-called “free trade” treaties.
+<a href="https://stallman.org/business-supremacy-treaties.html">
+Business-supremacy treaties</a> is</em></ins></span> a <span
class="removed"><del><strong>long-term trend: computer
systems</strong></del></span> <span class="inserted"><ins><em>more fitting term
for them, since
+they</em></ins></span> are <span class="removed"><del><strong>increasingly set
up</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to give <span
class="removed"><del><strong>absentees with clout control</strong></del></span>
<span class="inserted"><ins><em>business dominion</em></ins></span> over <span
class="removed"><del><strong>the people actually using the
computer system. The SSSCA was later renamed to the unpronounceable
-CBDTPA, which was glossed</strong></del></span>
-<span class="inserted"><ins><em>form not quite</em></ins></span> as <span
class="removed"><del><strong>the “Consume But Don't Try
+CBDTPA, which was glossed as the “Consume But Don't Try
Programming Act”.
-</p></strong></del></span> <span
class="inserted"><ins><em>strong.</p></em></ins></span>
+</p>
-<p>
-The <span class="removed"><del><strong>Republicans took control of the US
senate shortly thereafter.
+<p></strong></del></span> <span class="inserted"><ins><em>nominally
democratic
+states.</em></ins></span> The <span class="removed"><del><strong>Republicans
took control</strong></del></span> <span class="inserted"><ins><em>DMCA's
policy</em></ins></span> of <span class="removed"><del><strong>the US senate
shortly thereafter.
They are less tied to Hollywood than the Democrats, so they did not
-press these proposals. Now that the Democrats are back in control,
+press these proposals. Now</strong></del></span> <span
class="inserted"><ins><em>criminalizing programs</em></ins></span> that <span
class="removed"><del><strong>the Democrats are back in control,
the danger is once again higher.</p>
<p>
-In 2001 the</strong></del></span> US <span class="removed"><del><strong>began
attempting to use the proposed Free Trade Area of
-the Americas (FTAA) treaty</strong></del></span> <span
class="inserted"><ins><em>campaigns</em></ins></span> to impose <span
class="removed"><del><strong>the same</strong></del></span> <span
class="inserted"><ins><em>such</em></ins></span> rules on <span
class="removed"><del><strong>all the countries in</strong></del></span> the
<span class="removed"><del><strong>Western Hemisphere. The FTAA is
one</strong></del></span> <span
class="inserted"><ins><em>rest</em></ins></span> of the <span
class="inserted"><ins><em>world through</em></ins></span>
-so-called <span class="removed"><del><strong>free
-trade treaties, which</strong></del></span> <span
class="inserted"><ins><em>“free trade” treaties.
-<a href="https://stallman.org/business-supremacy-treaties.html">
-Business-supremacy treaties</a> is a more fitting term for them, since
-they</em></ins></span> are <span
class="removed"><del><strong>actually</strong></del></span> designed to give
business
-<span class="removed"><del><strong>increased power</strong></del></span> <span
class="inserted"><ins><em>dominion</em></ins></span> over <span
class="inserted"><ins><em>nominally</em></ins></span> democratic <span
class="removed"><del><strong>governments; imposing laws like the
-DMCA is typical of this spirit.</strong></del></span>
-<span class="inserted"><ins><em>states.</em></ins></span> The <span
class="removed"><del><strong>FTAA was effectively killed by
-Lula, President</strong></del></span> <span class="inserted"><ins><em>DMCA's
policy</em></ins></span> of <span class="removed"><del><strong>Brazil, who
rejected the DMCA requirement and
-others.</p></strong></del></span> <span
class="inserted"><ins><em>criminalizing programs that
-break DRM is one of many unjust policies that these treaties impose
-across a wide range of fields.</p></em></ins></span>
+In 2001 the US began attempting to use the proposed Free Trade Area of
+the Americas (FTAA) treaty to impose the same rules on all the countries in
+the Western Hemisphere. The FTAA</strong></del></span>
+<span class="inserted"><ins><em>break DRM</em></ins></span> is one of <span
class="removed"><del><strong>the so-called free
+trade treaties, which are actually designed to give business
+increased power over democratic governments; imposing laws like the
+DMCA is typical of this spirit. The FTAA was effectively killed by
+Lula, President</strong></del></span> <span class="inserted"><ins><em>many
unjust policies that these treaties impose
+across a wide range</em></ins></span> of <span
class="removed"><del><strong>Brazil, who rejected the DMCA requirement and
+others.</p></strong></del></span> <span
class="inserted"><ins><em>fields.</p></em></ins></span>
<p>
<span class="removed"><del><strong>Since then, the</strong></del></span>
@@ -270,34 +327,44 @@
and <span class="removed"><del><strong>Mexico</strong></del></span> <span
class="inserted"><ins><em>South Korea</em></ins></span> through bilateral <span
class="removed"><del><strong>“free trade”</strong></del></span>
agreements, and on countries such as
Costa Rica through another treaty, CAFTA. <span
class="removed"><del><strong>Ecuador's President Correa refused to sign a
“free trade” agreement</strong></del></span> <span
class="inserted"><ins><em>Obama has escalated the
-campaign with two new proposed treaties, the TPP and the TTIP. The
-TPP would impose the DMCA, along</em></ins></span> with <span
class="inserted"><ins><em>many other wrongs, on 12
-countries on</em></ins></span> the <span class="removed"><del><strong>US, but
I've heard Ecuador
-had adopted something like</strong></del></span> <span
class="inserted"><ins><em>Pacific Ocean. The TTIP would impose similar
+campaign</em></ins></span> with <span class="inserted"><ins><em>two new
proposed treaties,</em></ins></span> the <span class="removed"><del><strong>US,
but I've heard Ecuador
+had adopted something like</strong></del></span> <span
class="inserted"><ins><em>TPP and</em></ins></span> the <span
class="removed"><del><strong>DMCA</strong></del></span> <span
class="inserted"><ins><em>TTIP. The
+TPP would impose the DMCA, along with many other wrongs, on 12
+countries on the Pacific Ocean. The TTIP would impose similar
strictures on Europe. All these treaties must be defeated, or
abolished.</p>
<p>
-Even</em></ins></span> the <span
class="removed"><del><strong>DMCA</strong></del></span> <span
class="inserted"><ins><em>World Wide Web Consortium has fallen under the shadow
of the
+Even the World Wide Web Consortium has fallen under the shadow of the
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which lead to the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
+<p class="inline-block">
With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span
class="removed"><del><strong>2003.</p></strong></del></span> <span
class="inserted"><ins><em>a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
downgrades. It can also order all machines running Vista to refuse to
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
-10 is no better</p></em></ins></span>
+10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns"></em></ins></span>
<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the <span
class="removed"><del><strong><abbr>FBI</abbr></strong></del></span>
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep
the
@@ -330,22 +397,27 @@
Vista's many restrictions</strong></del></span> is <span
class="inserted"><ins><em>likely</em></ins></span> to <span
class="removed"><del><strong>impose DRM (Digital Restrictions
Management)</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> that <span
class="removed"><del><strong>users can't overcome. The
threat</strong></del></span>
<span class="inserted"><ins><em>control on behalf</em></ins></span> of <span
class="removed"><del><strong>DRM is why we
-have established</strong></del></span> the <span
class="removed"><del><strong><a href="http://DefectiveByDesign.org">
-Defective by Design</a> campaign.</p></strong></del></span> <span
class="inserted"><ins><em>FBI when asked: it
-already <a href="/proprietary/malware-microsoft.html">shows
-the NSA security bugs in Windows</a> to exploit.</p>
+have established</strong></del></span> the <span class="inserted"><ins><em>FBI
when asked: it
+already</em></ins></span> <a <span
class="removed"><del><strong>href="http://DefectiveByDesign.org">
+Defective by Design</a> campaign.</p></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">shows
+the NSA security bugs in Windows</a> to
exploit.</p></em></ins></span>
<p>
-Secure boot can be implemented in a way that permits the user to
+<span class="removed"><del><strong>When</strong></del></span>
+<span class="inserted"><ins><em>Secure boot can be implemented in a way that
permits the user to
specify the signature key and decide what software to sign. In
practice, PCs designed for Windows 10 carry only Microsoft's key, and
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
-boot</em>.</p></em></ins></span>
+boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
-<span class="removed"><del><strong>When</strong></del></span>
-<span class="inserted"><ins><em>In 1997, when</em></ins></span> this story was
first <span class="removed"><del><strong>written,</strong></del></span> <span
class="inserted"><ins><em>published,</em></ins></span> the SPA was
+In 1997, when</em></ins></span> this story was first <span
class="removed"><del><strong>written,</strong></del></span> <span
class="inserted"><ins><em>published,</em></ins></span> the SPA was
threatening small Internet service providers, demanding they permit
the SPA to monitor all users. Most ISPs surrendered when
threatened, because they <span
class="removed"><del><strong>cannot</strong></del></span> <span
class="inserted"><ins><em>could not</em></ins></span> afford to fight back in
court. One
@@ -361,8 +433,13 @@
reminiscent of the erstwhile Soviet Union, it invites people to inform
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p></em></ins></span>
+software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width"></em></ins></span>
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -384,12 +461,15 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
-<span class="inserted"><ins><em></li>
+<span class="inserted"><ins><em></div>
+</li>
</ul>
+<div class="column-limit"></div>
</div></em></ins></span>
<h3 id="BadNews">Bad News</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
The battle for the right to read is <span class="removed"><del><strong>already
in progress,</strong></del></span> <span class="inserted"><ins><em>going
against us so far.</em></ins></span>
The enemy is organized, <span
class="removed"><del><strong>while</strong></del></span> <span
class="inserted"><ins><em>and</em></ins></span> we are <span
class="removed"><del><strong>not, so it is going against us.
@@ -422,14 +502,14 @@
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon</em></ins></span> can
+<li><p class="inline-block">It has a back door with which
Amazon</em></ins></span> can
<span class="removed"><del><strong>revoke at will.</li>
<li><a
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151">Electronic
Publishing:</a> An article about distribution</strong></del></span>
<span class="inserted"><ins><em>remotely erase any book.
In 2009, it erased thousands</em></ins></span> of <span
class="removed"><del><strong>books in
electronic form,</strong></del></span> <span
class="inserted"><ins><em>copies of 1984, by George Orwell.</p></li>
-<li><p>In case all that isn't Orwellian enough, there is a
universal
+<li><p class="inline-block">In case all that isn't Orwellian
enough, there is a universal
back door with which Amazon can remotely change the
software,</em></ins></span> and <span class="removed"><del><strong>copyright
issues affecting</strong></del></span>
<span class="inserted"><ins><em>introduce any other form of
nastiness.</p></li>
</ul>
@@ -456,6 +536,7 @@
our work more generally. There is also a <a href="/help/help.html">list
of ways
to participate in</em></ins></span> our <span
class="removed"><del><strong>work.</strong></del></span> <span
class="inserted"><ins><em>work</a>.</em></ins></span>
</p>
+<span class="inserted"><ins><em></div></em></ins></span>
<h3 id="References">References</h3>
@@ -481,23 +562,32 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
+<span class="inserted"><ins><em><h4>Other Texts to Read</h4>
+
+<ul>
+ <li><a href="/philosophy/philosophy.html">Philosophy of the
+ GNU Project</a></li>
+ <li><a
href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html"
+ id="copy-protection">Copy Protection: Just Say No</a>,
+ published in Computer World.</li>
+</ul>
+</div></em></ins></span>
+
+<hr <span class="inserted"><ins><em>class="thin"</em></ins></span> />
<blockquote id="fsfs"><p class="big">This essay is published
in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
Software, Free Society: The Selected Essays of Richard
M. Stallman</cite></a>.</p></blockquote>
-<h5>Other Texts to Read</h5>
+<span class="removed"><del><strong><h5>Other Texts to Read</h5>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
GNU Project</a></li>
- <li><a <span
class="removed"><del><strong>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"
- id="COPYPROCTECTION">Copy</strong></del></span> <span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html"
- id="copy-protection">Copy</em></ins></span> Protection: Just
Say No</a>,
- <span
class="removed"><del><strong>Published</strong></del></span>
- <span class="inserted"><ins><em>published</em></ins></span> in
Computer World.</li>
-</ul>
+ <li><a
href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"
+ id="COPYPROCTECTION">Copy Protection: Just Say No</a>,
+ Published in Computer World.</li>
+</ul></strong></del></span>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -557,7 +647,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.ko.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ko.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/right-to-read.ko.po 18 Oct 2016 16:29:50 -0000 1.48
+++ po/right-to-read.ko.po 6 Nov 2016 21:28:15 -0000 1.49
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2015-02-02 16:49+0900\n"
"Last-Translator: Jongmin Yoon <address@hidden>\n"
"Language-Team: Korean <address@hidden>\n"
@@ -46,7 +46,7 @@
"<em>ì´ ê¸ì 1997ë
2ìì ë°íë <strong>Communications of the
ACM</strong>(ì "
"40ê¶ 2í¸)ì ê²ì¬ëìë ê²ì
ëë¤.</em>"
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -55,7 +55,7 @@
"í°ì½ë¡ ê°ë 길(The Road to Tycho)</cite>ìì ê°ì ¸ì¨ ê²ì
ëë¤.
ì´ ì±
ì 2096ë
"
"ì 루ë ìí°(Lunar City)ìì ì¶íëììµëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -69,7 +69,7 @@
"í©ì´ììµëë¤. íì§ë§, ê·¸ë
ê° ëìì ìì²í ë§í ì¬ëì
ë ì´ì¸ì ì무ë ìì"
"ìµëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -85,7 +85,7 @@
"ìµëë¤. ìëíë©´ ì´ë ë구ëì²ë¼ ê·¸ë ì´ë±íêµ ëë¶í°
ì±
ì ê³µì íë ê²ì ë¹ì´"
"íê³ ëìë¤ë ê²ì ë°°ìì기 ë문ì
ëë¤. ì½í íìì²ë¼
ë§ì
ëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -106,7 +106,7 @@
"ìì¤í
ì ê·¸ ì¬ì¤ì ììë¼ ê²ì
ëë¤. ê·¸ë ì»´í¨í°ì ìì
ìì´ê¸° ë문ì ë²ì£ íì"
"를 ê·¼ì ìí¤ê¸° ìí´ ê°ë¹í기 íë ê°í¹í ë²ì ë°ê² ë
ê²ì
ëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -129,7 +129,7 @@
"를 ê°ê² ëë©´ ê·¸ ëì¼ë¡ ëì¶ ê²½ë¹ë¥¼ 충ë¹í ì ìì¼ë¦¬ë¼ê³
기ëí ì ìììµë"
"ë¤.)"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -145,7 +145,7 @@
"í기 ììíê³ , 2047ë
ì ì´ë¥´ë©´ íì ìë£ì ëí ìì
ë¡ì´ ì ê·¼ì íì©íë ëì"
"ê´ì ê±°ì ì¬ë¼ì§ê² ëììµëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -163,7 +163,7 @@
"ëë¤.(ë¹ì íëì´ë íìë¤ì ë°°ì ì ì í¹ì ì½ê² ë¹ ì ¸
ë¤ììµëë¤.) íëí¬ë ì´"
"ë ìë°ì´ ìë ëë²ê±° ìì§ë¥¼ ì´ì ë¡ 2047ë
ì
ìê°ëììµëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -179,7 +179,7 @@
"ëë¼ê³ íê²°íìµëë¤. ê·¸ê²ì 곧 ëë²ê¹
í´ ìì²´ê°
ë¶ë²ì´ë¼ë ê²ì ì미íê³ , ë"
"ë²ê±°ì ê°ë°ìë¤ì ê°ì¥ì¼ë¡ ë³´ë´ì¡ìµëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -191,7 +191,7 @@
"ì´ë¥¼ ê³µê¸í ì ìììµëë¤. ëì´ ìíí¸ì¨ì´ ìì
ìê°ì
ì¬ì©í ëë²ê±°ë ì¤ì§ "
"ìì
ì¤ìµì©ì¼ë¡ë§ ì¬ì©ë ì ìê²ë í¹ë³í ë°©íë²½ ë¤ì
ëì¬ì§ ê²ì´ììµëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "It was also possible to bypass the copyright monitors by installing a "
@@ -219,7 +219,7 @@
"Bureau of Investigation\">FBI</abbr>ë ë§ì´í¬ë¡ìíí¸ ê³ ê° ì§ì
ì¼í°ê° ë£¨í¸ "
"í¨ì¤ìë를 ìë ¤ì¤ ë¦¬ë ë§ë¬´í ê²ì
ëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -231,7 +231,7 @@
"ííë 모ë ìê°ë§ë¤ ê·¸ë ë²
ì°¬ í¬ì´ì ëê¼ìµëë¤. ëí
ê·¸ë
ê° ìì ì íí´ ë"
"ìì ì²íê³ ìë¤ë ê²ì ê·¸ë
ëí ìì ì ì¬ëíê³
ìë¤ë ìë¯¸ì¼ ì ììµëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -245,7 +245,7 @@
"ë²ì´ê¸°ë íì§ë§, ê·¸ë
ê° ê·¸ë¥¼ ê³ ë°íì§ ìë í
ìíí¸ì¨ì´ ë³´í¸êµì´ ê·¸ ì¬ì¤ì "
"ììë¼ ìë ìì ê²ì
ëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -263,7 +263,7 @@
"ì ê°ìíë ê²ì ì´ë µê² íë ê²ì´ ê¸ì§ëë ê²ì
ëë¤.
íêµë ê¸ì§ë íì를 í"
"ë¤ë ê²ì ì¤ìíì§ ê·¸ ìì²´ê° ë¬´ìì¸ì§ì ëí´ìë
ê´ì¬ì ê°ì§ ììµëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -273,7 +273,7 @@
"ìì¤í
ì ì¬ì©í ì ìê² ë기 ë문ì, ì´ì© ì ìì´ ëª¨ë
과목ìì ëì íê² ë"
"ë ê²ì
ëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -286,7 +286,7 @@
"ì ê·ì íìµëë¤. íêµë ë¨ìí íìê° ìë í´ë¡ì´
íìì ëí´ íìë¤ì ì²ë²í"
"ìµëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -305,7 +305,7 @@
"ëë¥ì ì¬ëë¤ê³¼ ë§ë ì ìììµëë¤. ì기 2062ë
,
í°ì½ìì íëª
ì´ ììëìì "
"ë, ìì ë¡ê² ì½ê³ ì íë ì´ ë³´í¸ì ì¸ ê¶ë¦¬ë 곧 íëª
ì
ì¤ì¬ 목íê° ëììµëë¤."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing "
@@ -317,11 +317,11 @@
"<a href=\"http://defectivebydesign.org/ebooks.html\">ì ìì±
ì ìíì
ê´í ë©"
"ì¼ë§ 리ì¤í¸ì ê°ì
í´ ì£¼ì¸ì.</a>"
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr "ì ìì ë§"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "This story is supposedly a historical article that will be written in the "
@@ -343,7 +343,7 @@
"ìì ì ìì íê³ ìë¤. ê·¸ë 기ì ê·¸ ì¬íì ì©ì´ë¥¼
ì¬ì©íê³ ìë¤. ëë ì¬ê¸°ì ì¬"
"ì©ë ì©ì´ë¥¼ ì¡°ê¸ ë ìµìì ì¼ë¡ ë¤ë¦¬ëë¡ íìë¤. "
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -352,13 +352,13 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "[This note has been updated several times since the first publication of "
@@ -368,7 +368,7 @@
"publication of the story."
msgstr "[ìëì ë´ì©ì ì´ ì´ì¼ê¸°ê° ì²ì ì¶íë ì´í ì¬ë¬
ì°¨ë¡ ìì ëììµëë¤.]"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The right to read is a battle being fought today. Although it may take "
@@ -402,7 +402,7 @@
"ë¥ ì ìíë©´ DVD ë¹ëì¤ë¥¼ ëì½ë©íë ìì íë¡ê·¸ë¨ì¸
DeCSSì ë³µì 물ì ë¨ìí "
"ìì§íë ê²ë ë²ì£ê° ë©ëë¤."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -413,7 +413,7 @@
"these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -424,14 +424,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -440,7 +440,7 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -465,7 +465,7 @@
"ìµëë¤. DRMì ìí ë문ì ì°ë¦¬ë <a
href=\"http://DefectiveByDesign.org"
"\">Defective by Design</a> ìº íì¸ì ììíìµëë¤."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "One of the ideas in the story was not proposed in reality until 2002. "
@@ -480,14 +480,14 @@
"ë¤. ê·¸ê²ì ì¬ë¬ë¶ì ê°ì¸ì© ì»´í¨í°ì ë£¨í¸ í¨ì¤ìë를
<abbr>FBI</abbr>ì ë§ì´í¬"
"ë¡ìíí¸ê° ë³´ì íê³ ì¬ë¬ë¶ì´ ê°ì§ 못íëë¡ íë¤ë ê²ì
ëë¤."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
"into use, it is called “secure boot”."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -512,7 +512,7 @@
"ë§ì´í¬ë¡ìíí¸ì íë ¥íë ì´ë¤ ì¹ ì¬ì´í¸ìê²ë
ì¬ì©ìê° ìì ì ì»´í¨í°ìì í "
"ì ìë ì¼ì ëí ì ëì ì¸ íµì ê¶ì ë¶ì¬í©ëë¤."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -521,7 +521,7 @@
"control. We call this <em>restricted boot</em>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "When this story was first written, the SPA was threatening small Internet "
@@ -548,7 +548,7 @@
"ìì¡ì ë¹íìµëë¤. SPAë íì ìì¡ì ì·¨ííì§ë§, DMCAê°
ìíë íì ê·¸ë¤ì ì"
"íë ê¶íì ê°ê² ëììµëë¤."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The SPA, which actually stands for Software Publishers Association, has "
@@ -574,7 +574,7 @@
"ë°íëë¡ ë¶ì¶ê¹ëë¤. ì르í¨í°ëìì 2001ë
ì ë²ì¸
ê·¸ë¤ì ëì°í ìº íì¸ì ìí"
"í¸ì¨ì´ë¥¼ ê³µì íë ì¬ëì ì±ííë¹í ê²ì´ë¼ë ìê·¼í
ê°ì¶°ì§ íë°ì´ììµëë¤."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -584,7 +584,7 @@
"ë©´, ìì¹´ê³ ì§ìì ìì¹í í ëíì ì»´í¨í°ìë ë¡ê·¸ì¸í
ë ë¤ìê³¼ ê°ì ë©ìì§"
"ê° ì¶ë ¥ë©ëë¤."
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -605,7 +605,7 @@
"ë¶ë² íì를 ë°í ì ìë ì¦ê±°ê° ëíë¬ì ëìë ê´ë¦¬
ì§ìì´ ì´ë¬í ì¦ê±°ë¥¼ ë"
"í ë¹êµì´ë 경찰ì ì ê³µí ì ììì ìë ¤ë립ëë¤."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -614,11 +614,11 @@
"ìµëë¤. ìëíë©´ 모ë ì¬ëì´ íë²ìì ê¶ë¦¬ë¥¼ ì¬ì ì
í¬ê¸°íëë° ëìíëë¡ ê°"
"ì íê³ ì기 ë문ì
ëë¤."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "ëì ììë¤"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The battle for the right to read is already in progress, The enemy is "
@@ -633,7 +633,7 @@
"ì§ ììµëë¤. ê·¸ëì ì°ë¦¬ìê² ë¶ë¦¬í´ì ¸ ê°ëë¤. ì´ ê¸ì´
ì²ì ë°íë ì´íì ì¼ì´"
"ë ëì ììë¤ì ë¤ìê³¼ ê°ìµëë¤."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -644,31 +644,31 @@
"for rejecting the product completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -680,7 +680,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "If we want to stop the bad news and create some good news, we need to "
@@ -702,11 +702,11 @@
"ì ì´ë 기ê¸ì ëì¸ ì ìë <a
href=\"http://www.fsf.org/associate\">FSF íì"
"íì</a>ì ê°ì
í´ ì£¼ì¸ì."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "ì°¸ê³ ìë£"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -718,7 +718,7 @@
"a>] and the National Information Infrastructure: The Report of the Working "
"Group on Intellectual Property [sic] Rights (1995)."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -728,7 +728,7 @@
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
"Wired, Jan. 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -736,7 +736,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -746,7 +746,7 @@
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
"Private Data</a>, Washington Post, 4 Nov 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.public-domain.org/\">Union for the Public Domain</"
@@ -760,26 +760,16 @@
"<a href=\"http://www.public-domain.org/\">Union for the Public Domain</a>: ì
"
"ìê¶ê³¼ í¹íì ì§ëì¹ íëì ë°ëíê³ ì´ë¥¼ ëë리ë
ê²ì 목ì ì¼ë¡ íë ë¨ì²´."
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"ì´ ê¸ì ‘<a href=\"http://shop.fsf.org/product/free-software-free-"
-"society/\">ìì ìíí¸ì¨ì´, ìì ì¬í: 리ì²ì¤ M. ì¤í¨ë¨¼ ì
ìì ì§</a>’"
-"ì í¬í¨ëì´ ì¶íëììµëë¤."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "ì½ì´ì¼ í ë¤ë¥¸ ê¸ë¤"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">GNU íë¡ì í¸ì ì² í</a>"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.computerworld.com/s/article/49358/"
@@ -794,6 +784,16 @@
"Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">ë³µì ë°©ì§: ê·¸ë¥
ì«ì´</"
"a>, Computer World."
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"ì´ ê¸ì ‘<a href=\"http://shop.fsf.org/product/free-software-free-"
+"society/\">ìì ìíí¸ì¨ì´, ìì ì¬í: 리ì²ì¤ M. ì¤í¨ë¨¼ ì
ìì ì§</a>’"
+"ì í¬í¨ëì´ ì¶íëììµëë¤."
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/right-to-read.lt-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.lt-diff.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/right-to-read.lt-diff.html 18 Oct 2016 16:29:50 -0000 1.10
+++ po/right-to-read.lt-diff.html 6 Nov 2016 21:28:15 -0000 1.11
@@ -15,34 +15,71 @@
<title>The Right to Read
- GNU Project - Free Software Foundation</title>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
--></style></em></ins></span>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<span class="removed"><del><strong><h2>The</strong></del></span>
+<span class="inserted"><ins><em><h2 class="center">The</em></ins></span>
Right to Read</h2>
-<p>
+<span class="removed"><del><strong><p></strong></del></span>
+
+<span class="inserted"><ins><em><p class="byline
center"></em></ins></span>
by <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
<span class="removed"><del><strong><blockquote class="note">
<p><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of eBooks</a>.</p>
-</blockquote></strong></del></span>
+</blockquote>
-<p>
+<p></strong></del></span>
+<span class="inserted"><ins><em><p class="center"></em></ins></span>
<em>This article appeared in the February 1997 issue
of <span
class="removed"><del><strong><strong>Communications</strong></del></span>
<span class="inserted"><ins><em><cite>Communications</em></ins></span> of
the <span class="removed"><del><strong>ACM</strong></strong></del></span>
<span class="inserted"><ins><em>ACM</cite></em></ins></span> (Volume 40,
Number
2).</em></p>
-<span class="inserted"><ins><em><hr /></em></ins></span>
-<blockquote><p>
+<span
class="removed"><del><strong><blockquote><p></strong></del></span>
+<span class="inserted"><ins><em><hr class="thin" />
+
+<div class="article">
+<blockquote class="info center"><p></em></ins></span>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -78,7 +115,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -122,7 +162,10 @@
knowing your computer's root password. And neither
the <span class="removed"><del><strong><abbr title="Federal Bureau of
Investigation">FBI</abbr></strong></del></span> <span
class="inserted"><ins><em>FBI</em></ins></span> nor
Microsoft Support would tell you that.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -159,7 +202,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -172,8 +218,9 @@
<span class="removed"><del><strong><h3
id="AuthorsNote">Author's</strong></del></span>
+<span class="inserted"><ins><em></div>
-<span class="inserted"><ins><em><div class="announcement">
+<div class="announcement">
<blockquote>
<p><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of e-books</a>.</p>
</blockquote>
@@ -182,35 +229,49 @@
<div id="AuthorsNote">
<h3>Author's</em></ins></span> Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<span class="removed"><del><strong><ul>
+<li>This</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This</em></ins></span> story is supposedly a historical article that
will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the <span
class="removed"><del><strong>enemies</strong></del></span> <span
class="inserted"><ins><em>unjust forces</em></ins></span> that use
“pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it <span class="removed"><del><strong>from today so as
to sound even</strong></del></span> <span class="inserted"><ins><em>forwards
into something</em></ins></span> more <span
class="inserted"><ins><em>visibly</em></ins></span>
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+<span class="inserted"><ins><em></p>
+</div>
+<div class="column-limit"></div></em></ins></span>
</li>
<li>
-<span class="inserted"><ins><em><p>Computer-enforced restrictions on
lending or reading books (and other
+<span class="inserted"><ins><em><div class="reduced-width">
+<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
<p>The Electronic Frontier Foundation, a separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li></em></ins></span>
+<blockquote class="info center"></em></ins></span>
<p>The following note has been updated several times since the first
publication of the story.</p>
+<span class="inserted"><ins><em></blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns"></em></ins></span>
<p>
The <span class="inserted"><ins><em>battle for the</em></ins></span> right to
read is <span class="removed"><del><strong>a battle</strong></del></span> <span
class="inserted"><ins><em>already</em></ins></span> being <span
class="removed"><del><strong>fought today.</strong></del></span> <span
class="inserted"><ins><em>fought.</em></ins></span> Although it
may take 50 years for our <span class="removed"><del><strong>present way of
life</strong></del></span> <span class="inserted"><ins><em>past
freedoms</em></ins></span> to fade into obscurity, most
@@ -279,23 +340,33 @@
Even the World Wide Web Consortium has fallen under the shadow of the
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which lead to the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
+<p class="inline-block">
With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span
class="removed"><del><strong>2003.</p></strong></del></span> <span
class="inserted"><ins><em>a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
downgrades. It can also order all machines running Vista to refuse to
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
-10 is no better</p></em></ins></span>
+10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns"></em></ins></span>
<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the <span
class="removed"><del><strong><abbr>FBI</abbr></strong></del></span>
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep
the
@@ -328,22 +399,27 @@
Vista's many restrictions</strong></del></span> is <span
class="inserted"><ins><em>likely</em></ins></span> to <span
class="removed"><del><strong>impose DRM (Digital Restrictions
Management)</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> that <span
class="removed"><del><strong>users can't overcome. The
threat</strong></del></span>
<span class="inserted"><ins><em>control on behalf</em></ins></span> of <span
class="removed"><del><strong>DRM is why we
-have established</strong></del></span> the <span
class="removed"><del><strong><a href="http://DefectiveByDesign.org">
-Defective by Design</a> campaign.</p></strong></del></span> <span
class="inserted"><ins><em>FBI when asked: it
-already <a href="/proprietary/malware-microsoft.html">shows
-the NSA security bugs in Windows</a> to exploit.</p>
+have established</strong></del></span> the <span class="inserted"><ins><em>FBI
when asked: it
+already</em></ins></span> <a <span
class="removed"><del><strong>href="http://DefectiveByDesign.org">
+Defective by Design</a> campaign.</p></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">shows
+the NSA security bugs in Windows</a> to
exploit.</p></em></ins></span>
<p>
-Secure boot can be implemented in a way that permits the user to
+<span class="removed"><del><strong>When</strong></del></span>
+<span class="inserted"><ins><em>Secure boot can be implemented in a way that
permits the user to
specify the signature key and decide what software to sign. In
practice, PCs designed for Windows 10 carry only Microsoft's key, and
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
-boot</em>.</p></em></ins></span>
+boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
-<span class="removed"><del><strong>When</strong></del></span>
-<span class="inserted"><ins><em>In 1997, when</em></ins></span> this story was
first <span class="removed"><del><strong>written,</strong></del></span> <span
class="inserted"><ins><em>published,</em></ins></span> the SPA was
+In 1997, when</em></ins></span> this story was first <span
class="removed"><del><strong>written,</strong></del></span> <span
class="inserted"><ins><em>published,</em></ins></span> the SPA was
threatening small Internet service providers, demanding they permit
the SPA to monitor all users. Most ISPs surrendered when
threatened, because they <span
class="removed"><del><strong>cannot</strong></del></span> <span
class="inserted"><ins><em>could not</em></ins></span> afford to fight back in
court. One
@@ -359,8 +435,13 @@
reminiscent of the erstwhile Soviet Union, it invites people to inform
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p></em></ins></span>
+software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width"></em></ins></span>
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -382,12 +463,15 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
+<span class="inserted"><ins><em></div></em></ins></span>
</li>
</ul>
-<span class="inserted"><ins><em></div></em></ins></span>
+<span class="inserted"><ins><em><div class="column-limit"></div>
+</div></em></ins></span>
<h3 id="BadNews">Bad News</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
The battle for the right to read is <span class="removed"><del><strong>already
in progress,</strong></del></span> <span class="inserted"><ins><em>going
against us so far.</em></ins></span>
The enemy is organized, <span
class="removed"><del><strong>while</strong></del></span> <span
class="inserted"><ins><em>and</em></ins></span> we are <span
class="removed"><del><strong>not, so it is going against us.
@@ -420,14 +504,14 @@
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon</em></ins></span> can
+<li><p class="inline-block">It has a back door with which
Amazon</em></ins></span> can
<span class="removed"><del><strong>revoke at will.</li>
<li><a
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151">Electronic
Publishing:</a> An article about distribution</strong></del></span>
<span class="inserted"><ins><em>remotely erase any book.
In 2009, it erased thousands</em></ins></span> of <span
class="removed"><del><strong>books in
electronic form,</strong></del></span> <span
class="inserted"><ins><em>copies of 1984, by George Orwell.</p></li>
-<li><p>In case all that isn't Orwellian enough, there is a
universal
+<li><p class="inline-block">In case all that isn't Orwellian
enough, there is a universal
back door with which Amazon can remotely change the
software,</em></ins></span> and <span class="removed"><del><strong>copyright
issues affecting</strong></del></span>
<span class="inserted"><ins><em>introduce any other form of
nastiness.</p></li>
</ul>
@@ -454,6 +538,7 @@
our work more generally. There is also a <a href="/help/help.html">list
of ways
to participate in</em></ins></span> our <span
class="removed"><del><strong>work.</strong></del></span> <span
class="inserted"><ins><em>work</a>.</em></ins></span>
</p>
+<span class="inserted"><ins><em></div></em></ins></span>
<h3 id="References">References</h3>
@@ -479,23 +564,32 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
+<span class="inserted"><ins><em><h4>Other Texts to Read</h4>
+
+<ul>
+ <li><a href="/philosophy/philosophy.html">Philosophy of the
+ GNU Project</a></li>
+ <li><a
href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html"
+ id="copy-protection">Copy Protection: Just Say No</a>,
+ published in Computer World.</li>
+</ul>
+</div></em></ins></span>
+
+<hr <span class="inserted"><ins><em>class="thin"</em></ins></span> />
<blockquote id="fsfs"><p class="big">This essay is published
in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
Software, Free Society: The Selected Essays of Richard
M. Stallman</cite></a>.</p></blockquote>
-<h5>Other Texts to Read</h5>
+<span class="removed"><del><strong><h5>Other Texts to Read</h5>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
GNU Project</a></li>
- <li><a <span
class="removed"><del><strong>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"
- id="COPYPROCTECTION">Copy</strong></del></span> <span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html"
- id="copy-protection">Copy</em></ins></span> Protection: Just
Say No</a>,
- <span
class="removed"><del><strong>Published</strong></del></span>
- <span class="inserted"><ins><em>published</em></ins></span> in
Computer World.</li>
-</ul>
+ <li><a
href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"
+ id="COPYPROCTECTION">Copy Protection: Just Say No</a>,
+ Published in Computer World.</li>
+</ul></strong></del></span>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -554,7 +648,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.lt.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.lt.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/right-to-read.lt.po 18 Oct 2016 16:29:50 -0000 1.13
+++ po/right-to-read.lt.po 6 Nov 2016 21:28:15 -0000 1.14
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-01-25 16:54+0200\n"
"Last-Translator: Donatas Klimašauskas <address@hidden>\n"
"Language-Team: Lithuanian <address@hidden>\n"
@@ -43,7 +43,7 @@
"<em>Å is straipsnis pasirodÄ 1997 m. vasario <strong>Communications of "
"the ACM</strong> leidime (40 tomas, 2 numeris).</em>"
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -51,7 +51,7 @@
"IÅ¡ <cite>The Road To Tycho</cite> – straipsnių apie Lunarian "
"revoliucijos protÄvius rinkinys, iÅ¡leistas 2096 m. Luna mieste."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -63,7 +63,7 @@
"kitÄ
, ji neišlaikytų jos viduriniojo termino projekto. Ji nedrįso
paprašyti "
"nieko kito, išskyrus Dan."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -79,7 +79,7 @@
"jis buvo mokomas nuo pagrindinÄs mokyklos, kad dalinimasis knygomis buvo "
"bjaurus ir neteisingas – kažkas tokio, kÄ
darytų tik piratai."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -101,7 +101,7 @@
"gautų griežÄiausiÄ
bausmÄ – už kanÄių to nusikaltimo
prevencijai "
"neprisiÄmimÄ
."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -124,7 +124,7 @@
"siekÄ akademinÄs karjeros, jis galÄjo tikÄtis, kad jo paties moksliniai "
"straipsniai, jei dažnai cituoti, atneÅ¡tų pakankamai grÄ
žinti Å¡iÄ
paskolÄ
.)"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -141,7 +141,7 @@
"pradÄjo imti mokesÄius už prieigÄ
. 2047 m., bibliotekos
siÅ«lanÄios "
"laisvÄ
, vieÅ¡Ä
prieigÄ
prie mokslinÄs literatÅ«ros buvo blanki atmintis."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -159,7 +159,7 @@
"suvilioti iÅ¡davystei). 2047 m., Frank buvo kalÄjime, ne už piratinį
"
"skaitymÄ
, bet už derintuvÄs turÄjimÄ
."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -175,7 +175,7 @@
"praktikoje tapo jų principiniu naudojimu. Tai reiÅ¡kÄ jie buvo nelegalÅ«s;
"
"derintuvių autoriai buvo nusiųsti į kalÄjimÄ
."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -188,7 +188,7 @@
"klasÄje naudota derintuvÄ buvo laikoma už specialios ugniasienÄs taip,
kad "
"jÄ
bÅ«tų galima naudoti tik klasÄs praktinÄms užduotims."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "It was also possible to bypass the copyright monitors by installing a "
@@ -216,7 +216,7 @@
"šakninio slaptažodžio. Ir nei <abbr title=\"Federal Bureau of
Investigation"
"\">FBI</abbr>, nei Microsoft Support jums tÄ
pasakytų."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -228,7 +228,7 @@
"Kiekviena proga su ja pasiÅ¡nekÄti jį užpildydavo pasigÄrÄjimu. Ir, kad
ji "
"pasirinko jį papraÅ¡yti pagalbos, tai galÄjo reikÅ¡ti ji jį irgi mylÄjo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -242,7 +242,7 @@
"jis. Vis tiek tai buvo nusikaltimas, bet SPA automatiškai apie tai "
"nesužinotų. Jie sužinotų tik jei Lissa jį įduotų."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -262,7 +262,7 @@
"Jie priÄmÄ, kad tai reiÅ¡kÄ jÅ«s darÄte kažkÄ
kitkÄ
uždraustÄ
ir
jiems "
"nereikÄjo žinoti kas tai buvo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -272,7 +272,7 @@
"jiems uždrausdavo tos mokyklos kompiuterines sistemas ir neišvengiamai "
"neišlaikytų visų jų dalykų."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -286,7 +286,7 @@
"studento disciplinÄ
; jie baudÄ veiklas, kurios buvo žalingos, ne tas,
kurios "
"vos kÄlÄ Ä¯tarimÄ
."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -306,7 +306,7 @@
"prasidÄjo Tycho sukilimas, universali teisÄ skaityti greitai tapo vienu iÅ¡
"
"jo svarbiausių tikslų."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing "
@@ -318,11 +318,11 @@
"<a href=\"http://defectivebydesign.org/ebooks.html\">Prisijunkite prie mūsų
"
"laiÅ¡kų apie e-knygų pavojus siuntimo sÄ
rašo</a>."
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr "Autoriaus pastabos"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "This story is supposedly a historical article that will be written in the "
@@ -347,7 +347,7 @@
"Pamatykite <a href=\"/philosophy/words-to-avoid.html#Piracy\">„"
"Piratavimas“</a>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -356,13 +356,13 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The following note has been updated several times since the first "
"publication of the story."
@@ -370,7 +370,7 @@
"Pastaroji pastaba nuo pirmo Å¡ios istorijos publikavimo buvo keletÄ
kartų "
"atnaujinta."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The right to read is a battle being fought today. Although it may take "
@@ -405,7 +405,7 @@
"paprastas DeCSS – laisva programa DVD video deÅ¡ifravimui, kopijos "
"turÄjimas yra nusikaltimas."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -416,7 +416,7 @@
"these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -427,14 +427,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -443,7 +443,7 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -469,7 +469,7 @@
"naudotojai negali apeiti. DRM pavojus yra tai, dÄl ko mes įsteigÄme <a
href="
"\"http://DefectiveByDesign.org\">Defective by Design</a> kampanijÄ
."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "One of the ideas in the story was not proposed in reality until 2002. "
@@ -484,14 +484,14 @@
"Tai yra idÄja, kad <abbr>FBI</abbr> ir Microsoft laikys jÅ«sų asmeninių "
"kompiuterių Å¡akninius slaptažodžius ir neleis jums jų turÄti."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
"into use, it is called “secure boot”."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -517,7 +517,7 @@
"bendradarbiauja su Microsoft, visiÅ¡kai kontroliuoti tÄ
, kÄ
naudotojas gali
"
"daryti jo paties kompiuteriu."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -526,7 +526,7 @@
"control. We call this <em>restricted boot</em>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "When this story was first written, the SPA was threatening small Internet "
@@ -552,7 +552,7 @@
"SPA vÄliau atsiÄmÄ tÄ
ieÅ¡kinį, bet įgijo DMCA, kuris jiems suteikÄ
galiÄ
, "
"kurios jie siekÄ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The SPA, which actually stands for Software Publishers Association, has "
@@ -581,7 +581,7 @@
"padarÄ Å¡iek tiek paslÄptus grasinimus, kad žmonÄs besidalinantys
programine "
"įranga būtų išprievartauti."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -591,7 +591,7 @@
"Pavyzdžiui, viename Äikagos srities universitete kompiuteris prisijungus "
"parodÄ Å¡iÄ
žinutÄ:"
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -615,7 +615,7 @@
"personalas gali pateikti tÄ
tokio stebÄjimo įrodymÄ
Universiteto "
"administratoriams ir (arba) teisÄtvarkos pareigÅ«nams."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -623,11 +623,11 @@
"Tai yra įdomus požiÅ«ris į KetvirtÄ
pataisÄ
: beveik visus spausti
sutikti, iš "
"anksto, atsisakyti jų teisių pagal jÄ
."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "Blogos naujienos"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The battle for the right to read is already in progress, The enemy is "
@@ -642,7 +642,7 @@
"taigi, jis eina priešais mus. Štai yra straipsniai apie blogus dalykus, "
"kurie įvyko po pirmo šio straipsnio publikavimo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -653,31 +653,31 @@
"for rejecting the product completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -689,7 +689,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "If we want to stop the bad news and create some good news, we need to "
@@ -712,11 +712,11 @@
"Ir <a href=\"http://www.fsf.org/associate\">prisijunkite prie FSF</a> "
"pagalbai finansuoti mÅ«sų darbÄ
."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Nuorodos"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -729,7 +729,7 @@
"infrastruktÅ«ra: IntelektinÄs nuosavybÄs [tai jau taip] teisių darbo
grupÄs "
"ataskaita (1995 m.)."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -739,7 +739,7 @@
"\">Baltosios ataskaitos paaiškinimas: Autorių teisių sugriebimas</a>,
Pamela "
"Samuelson, Wired, 1996 m. sausis."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -747,7 +747,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Parduota</a>, "
"James Boyle, New York Times, 1996 m. kovo 31 d."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -757,7 +757,7 @@
"people.org/archives/interesting-people/199611/msg00012.html\">Vieši duomenys
"
"ar privatÅ«s duomenys</a>, Washington Post, 1996 m. lapkriÄio 4 d."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.public-domain.org/\">Union for the Public Domain</"
@@ -772,26 +772,16 @@
"organizacija, kuri siekia prieÅ¡intis ir apgrÄžti autorių teisių ir
patento "
"galių perdÄtÄ
iÅ¡plÄtimÄ
."
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Å i esÄ yra publikuota <a href=\"http://shop.fsf.org/product/free-software-"
-"free-society/\"><cite>Laisva programinÄ Ä¯ranga, laisva visuomenÄ:
rinktinÄs "
-"Richard M. Stallman esÄs</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "Kiti tekstai skaitymui"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">GNU projekto filosofija</a>."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.computerworld.com/s/article/49358/"
@@ -806,6 +796,16 @@
"Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">Kopijavimo apsauga: "
"tiesiog pasakykite ne</a>, publikuotas Computer World."
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Å i esÄ yra publikuota <a href=\"http://shop.fsf.org/product/free-software-"
+"free-society/\"><cite>Laisva programinÄ Ä¯ranga, laisva visuomenÄ:
rinktinÄs "
+"Richard M. Stallman esÄs</cite></a>."
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/right-to-read.nl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.nl-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/right-to-read.nl-diff.html 18 Oct 2016 16:29:50 -0000 1.24
+++ po/right-to-read.nl-diff.html 6 Nov 2016 21:28:15 -0000 1.25
@@ -15,34 +15,71 @@
<title>The Right to Read
- GNU Project - Free Software Foundation</title>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
--></style></em></ins></span>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<span class="removed"><del><strong><h2>The</strong></del></span>
+<span class="inserted"><ins><em><h2 class="center">The</em></ins></span>
Right to Read</h2>
-<p>
+<span class="removed"><del><strong><p></strong></del></span>
+
+<span class="inserted"><ins><em><p class="byline
center"></em></ins></span>
by <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
<span class="removed"><del><strong><blockquote class="note">
<p><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of eBooks</a>.</p>
-</blockquote></strong></del></span>
+</blockquote>
-<p>
+<p></strong></del></span>
+<span class="inserted"><ins><em><p class="center"></em></ins></span>
<em>This article appeared in the February 1997 issue
of <span
class="removed"><del><strong><strong>Communications</strong></del></span>
<span class="inserted"><ins><em><cite>Communications</em></ins></span> of
the <span class="removed"><del><strong>ACM</strong></strong></del></span>
<span class="inserted"><ins><em>ACM</cite></em></ins></span> (Volume 40,
Number
2).</em></p>
-<span class="inserted"><ins><em><hr /></em></ins></span>
-<blockquote><p>
+<span
class="removed"><del><strong><blockquote><p></strong></del></span>
+<span class="inserted"><ins><em><hr class="thin" />
+
+<div class="article">
+<blockquote class="info center"><p></em></ins></span>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -78,7 +115,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -122,7 +162,10 @@
knowing your computer's root password. And neither
the <span class="removed"><del><strong><abbr title="Federal Bureau of
Investigation">FBI</abbr></strong></del></span> <span
class="inserted"><ins><em>FBI</em></ins></span> nor
Microsoft Support would tell you that.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -159,7 +202,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -172,8 +218,9 @@
<span class="removed"><del><strong><h3
id="AuthorsNote">Author's</strong></del></span>
+<span class="inserted"><ins><em></div>
-<span class="inserted"><ins><em><div class="announcement">
+<div class="announcement">
<blockquote>
<p><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of e-books</a>.</p>
</blockquote>
@@ -182,35 +229,49 @@
<div id="AuthorsNote">
<h3>Author's</em></ins></span> Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<span class="removed"><del><strong><ul>
+<li>This</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This</em></ins></span> story is supposedly a historical article that
will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the <span
class="removed"><del><strong>enemies</strong></del></span> <span
class="inserted"><ins><em>unjust forces</em></ins></span> that use
“pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it <span class="removed"><del><strong>from today so as
to sound even</strong></del></span> <span class="inserted"><ins><em>forwards
into something</em></ins></span> more <span
class="inserted"><ins><em>visibly</em></ins></span>
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+<span class="inserted"><ins><em></p>
+</div>
+<div class="column-limit"></div></em></ins></span>
</li>
<li>
-<span class="inserted"><ins><em><p>Computer-enforced restrictions on
lending or reading books (and other
+<span class="inserted"><ins><em><div class="reduced-width">
+<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
<p>The Electronic Frontier Foundation, a separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li></em></ins></span>
+<blockquote class="info center"></em></ins></span>
<p>The following note has been updated several times since the first
publication of the story.</p>
+<span class="inserted"><ins><em></blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns"></em></ins></span>
<p>
The <span class="inserted"><ins><em>battle for the</em></ins></span> right to
read is <span class="removed"><del><strong>a battle</strong></del></span> <span
class="inserted"><ins><em>already</em></ins></span> being <span
class="removed"><del><strong>fought today.</strong></del></span> <span
class="inserted"><ins><em>fought.</em></ins></span> Although it
may take 50 years for our <span class="removed"><del><strong>present way of
life</strong></del></span> <span class="inserted"><ins><em>past
freedoms</em></ins></span> to fade into obscurity, most
@@ -279,23 +340,33 @@
Even the World Wide Web Consortium has fallen under the shadow of the
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which lead to the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
+<p class="inline-block">
With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span
class="removed"><del><strong>2003.</p></strong></del></span> <span
class="inserted"><ins><em>a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
downgrades. It can also order all machines running Vista to refuse to
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
-10 is no better</p></em></ins></span>
+10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns"></em></ins></span>
<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the <span
class="removed"><del><strong><abbr>FBI</abbr></strong></del></span>
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep
the
@@ -328,22 +399,27 @@
Vista's many restrictions</strong></del></span> is <span
class="inserted"><ins><em>likely</em></ins></span> to <span
class="removed"><del><strong>impose DRM (Digital Restrictions
Management)</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> that <span
class="removed"><del><strong>users can't overcome. The
threat</strong></del></span>
<span class="inserted"><ins><em>control on behalf</em></ins></span> of <span
class="removed"><del><strong>DRM is why we
-have established</strong></del></span> the <span
class="removed"><del><strong><a href="http://DefectiveByDesign.org">
-Defective by Design</a> campaign.</p></strong></del></span> <span
class="inserted"><ins><em>FBI when asked: it
-already <a href="/proprietary/malware-microsoft.html">shows
-the NSA security bugs in Windows</a> to exploit.</p>
+have established</strong></del></span> the <span class="inserted"><ins><em>FBI
when asked: it
+already</em></ins></span> <a <span
class="removed"><del><strong>href="http://DefectiveByDesign.org">
+Defective by Design</a> campaign.</p></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">shows
+the NSA security bugs in Windows</a> to
exploit.</p></em></ins></span>
<p>
-Secure boot can be implemented in a way that permits the user to
+<span class="removed"><del><strong>When</strong></del></span>
+<span class="inserted"><ins><em>Secure boot can be implemented in a way that
permits the user to
specify the signature key and decide what software to sign. In
practice, PCs designed for Windows 10 carry only Microsoft's key, and
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
-boot</em>.</p></em></ins></span>
+boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
-<span class="removed"><del><strong>When</strong></del></span>
-<span class="inserted"><ins><em>In 1997, when</em></ins></span> this story was
first <span class="removed"><del><strong>written,</strong></del></span> <span
class="inserted"><ins><em>published,</em></ins></span> the SPA was
+In 1997, when</em></ins></span> this story was first <span
class="removed"><del><strong>written,</strong></del></span> <span
class="inserted"><ins><em>published,</em></ins></span> the SPA was
threatening small Internet service providers, demanding they permit
the SPA to monitor all users. Most ISPs surrendered when
threatened, because they <span
class="removed"><del><strong>cannot</strong></del></span> <span
class="inserted"><ins><em>could not</em></ins></span> afford to fight back in
court. One
@@ -359,8 +435,13 @@
reminiscent of the erstwhile Soviet Union, it invites people to inform
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p></em></ins></span>
+software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width"></em></ins></span>
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -382,16 +463,19 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
+<span class="inserted"><ins><em></div></em></ins></span>
</li>
</ul>
-<span class="inserted"><ins><em></div></em></ins></span>
+<span class="inserted"><ins><em><div class="column-limit"></div>
+</div></em></ins></span>
<h3 id="BadNews">Bad News</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
The battle for the right to read is <span class="removed"><del><strong>already
in progress,</strong></del></span> <span class="inserted"><ins><em>going
against us so far.</em></ins></span>
-The enemy is organized, <span
class="removed"><del><strong>while</strong></del></span> <span
class="inserted"><ins><em>and</em></ins></span> we are <span
class="removed"><del><strong>not, so it is going against us.
-Here are articles about bad things that have happened since the
+The enemy is <span class="removed"><del><strong>organized, while we are not,
so it is going against us.
+Here</strong></del></span> <span class="inserted"><ins><em>organized, and
we</em></ins></span> are <span class="removed"><del><strong>articles about bad
things that have happened since the
original publication of this article.</p>
<ul>
@@ -414,20 +498,20 @@
<ul>
<li><p>It spies on everything the user does:</em></ins></span> it
<span class="removed"><del><strong>to anyone
else</a>,</strong></del></span> <span class="inserted"><ins><em>reports
which book the
-user is reading, and</em></ins></span> which <span
class="inserted"><ins><em>page, and it reports when the user highlights
-text, and any notes</em></ins></span> the <span
class="removed"><del><strong>publisher</strong></del></span> <span
class="inserted"><ins><em>user enters.</p></li>
+user is reading, and</em></ins></span> which <span
class="inserted"><ins><em>page, and it reports when</em></ins></span> the <span
class="removed"><del><strong>publisher</strong></del></span> <span
class="inserted"><ins><em>user highlights
+text, and any notes the user enters.</p></li>
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon</em></ins></span> can
+<li><p class="inline-block">It has a back door with which
Amazon</em></ins></span> can
<span class="removed"><del><strong>revoke at will.</li>
<li><a
href="http://www.zdnet.com/article/seybold-opens-chapter-on-digital-books/">Electronic
Publishing:</a> An article about distribution</strong></del></span>
<span class="inserted"><ins><em>remotely erase any book.
In 2009, it erased thousands</em></ins></span> of <span
class="removed"><del><strong>books in
electronic form,</strong></del></span> <span
class="inserted"><ins><em>copies of 1984, by George Orwell.</p></li>
-<li><p>In case all that isn't Orwellian enough, there is a
universal
+<li><p class="inline-block">In case all that isn't Orwellian
enough, there is a universal
back door with which Amazon can remotely change the
software,</em></ins></span> and <span class="removed"><del><strong>copyright
issues affecting</strong></del></span>
<span class="inserted"><ins><em>introduce any other form of
nastiness.</p></li>
</ul>
@@ -454,6 +538,7 @@
our work more generally. There is also a <a href="/help/help.html">list
of ways
to participate in</em></ins></span> our <span
class="removed"><del><strong>work.</strong></del></span> <span
class="inserted"><ins><em>work</a>.</em></ins></span>
</p>
+<span class="inserted"><ins><em></div></em></ins></span>
<h3 id="References">References</h3>
@@ -479,13 +564,15 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
+<span class="removed"><del><strong><hr />
<blockquote id="fsfs"><p class="big">This essay is published
in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
Software, Free Society: The Selected Essays of Richard
M. Stallman</cite></a>.</p></blockquote>
-<h5>Other Texts to Read</h5>
+<h5>Other</strong></del></span>
+
+<span class="inserted"><ins><em><h4>Other</em></ins></span> Texts to
<span class="removed"><del><strong>Read</h5></strong></del></span> <span
class="inserted"><ins><em>Read</h4></em></ins></span>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -494,6 +581,13 @@
id="copy-protection">Copy Protection: Just Say No</a>,
published in Computer World.</li>
</ul>
+<span class="inserted"><ins><em></div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M.
Stallman</cite></a>.</p></blockquote></em></ins></span>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -552,7 +646,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.nl.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/right-to-read.nl.po 18 Oct 2016 16:29:50 -0000 1.31
+++ po/right-to-read.nl.po 6 Nov 2016 21:28:15 -0000 1.32
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Tom Uijldert <address@hidden>\n"
"Language-Team: Dutch\n"
@@ -48,7 +48,7 @@
"<em>Dit artikel verscheen eerder in het februarinummer uit 1997 van "
"<strong>Communications of the ACM</strong> (Volume 40, nummer 2).</em>"
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -56,7 +56,7 @@
"Uit <cite>De Gang Naar Tycho</cite>, een serie artikelen over de "
"voorgeschiedenis van de Luna-revolutie, verschenen in Maanstad in 2096"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -68,7 +68,7 @@
"een andere kon lenen zou ze te laat zijn met haar werkstuk. Ze durfde het "
"alleen Dirk te vragen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -85,7 +85,7 @@
"het uitlenen van boeken iets slechts en crimineels was—iets wat alleen "
"piraten deden."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -106,7 +106,7 @@
"Hijzelf, als eigenaar van de computer, zou de zwaarste straf krijgen—"
"omdat hij niet zijn best zou hebben gedaan deze misdaad te voorkomen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -130,7 +130,7 @@
"zijn eigen wetenschappelijke publicaties zijn lening terug te kunnen "
"betalen, mits zijn publicaties maar vaak genoeg zouden worden gerefereerd.)"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -148,7 +148,7 @@
"toegang. Tegen 2047 was zelfs de <em> herinnering</em> aan bibliotheken die "
"vrijelijk toegang boden vervaagd."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -168,7 +168,7 @@
"gevangenis. Niet voor lees-piraterij maar voor het in bezit hebben van een "
"debug-programma."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -185,7 +185,7 @@
"betekende dus dat ze illegaal waren; de ontwikkelaars van debug-programma's "
"belandden in de cel."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -198,7 +198,7 @@
"Dirk in de lessen gebruikte zat achter een speciale firewall zodat deze "
"alleen voor de lessen kon worden gebruikt."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
# | It was also possible to bypass the copyright monitors by installing a
# | modified system kernel. Dan would eventually find out about the free
# | kernels, even entire free operating systems, that had existed around the
@@ -234,7 +234,7 @@
"\"Federal Bureau of Investigation\">FBI</abbr>, noch Microsoft support zou "
"je die geven."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -247,7 +247,7 @@
"uitgerekend hém vroeg haar te helpen zou wel eens kunnen betekenen "
"dat zij ook wat voor hem voelde."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -262,7 +262,7 @@
"misdaad maar de SBD zou er niet automatisch achter komen. Dat zou alleen "
"gebeuren wanneer Lisa hem zou verraden."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -282,7 +282,7 @@
"Ze namen daarbij automatisch aan dat je dus iets illegaals aan het doen was "
"en het interesseerde ze daarbij niet wat dat dan was."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -292,7 +292,7 @@
"meteen. In plaats daarvan werd hen de toegang tot de schoolcomputers "
"ontzegd, zodat ze uiteindelijk hun tentamens niet konden halen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -306,7 +306,7 @@
"activiteiten die schadelijk waren werden bestraft, niet de activiteiten die "
"slechts verdacht waren."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -326,7 +326,7 @@
"de lange arm van de SBD. Toen de Tycho revolutie in 2062 begon werd het "
"centrale thema hiervan het universele recht om te lezen."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
# | <a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list
# | about the dangers of [-eBooks</a>.-] {+e-books</a>.+}
#, fuzzy
@@ -340,11 +340,11 @@
"<a href=\"http://defectivebydesign.org/ebooks.html\">Meld je aan bij onze "
"mailinglijst over de gevaren van e-boeken</a>."
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr "Opmerkingen van de auteur"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
# | This story is supposedly a historical article that will be written in the
# | future by someone else, describing Dan Halbert's youth under a repressive
# | society shaped by the [-enemies-] {+unjust forces+} that use
@@ -376,7 +376,7 @@
"weerspiegelen zodat het nog repressiever klinkt. Zie ook <a href=\"/"
"philosophy/words-to-avoid.html#Piracy\">“piraterij”</a>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -385,13 +385,13 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The following note has been updated several times since the first "
"publication of the story."
@@ -399,7 +399,7 @@
"De volgende opmerking is meerdere keren bijgewerkt sinds de eerste "
"publicatie."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
# | The {+battle for the+} right to read is [-a battle-] {+already+} being
# | [-fought today.-] {+fought.+} Although it may take 50 years for our
# | [-present way of life-] {+past freedoms+} to fade into obscurity, most of
@@ -450,7 +450,7 @@
"van het programma DeCSS, een vrij programma voor het ontcijferen van DVD-"
"versleuteling."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -461,7 +461,7 @@
"these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -472,14 +472,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -488,7 +488,7 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
# | [-Vista also gives-]{+With Windows Vista,+} Microsoft [-additional powers;
# | for instance,-] {+admitted it had built in a back door:+} Microsoft can
# | {+use it to+} forcibly install [-upgrades, and it-] {+software
@@ -525,7 +525,7 @@
"bedreiging is de aanleiding voor de <a href=\"http://DefectiveByDesign.org"
"\">Defective by Design</a>-campagne."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
# | One of the ideas in the story was not proposed in reality until 2002.
# | This is the idea that the [-<abbr>FBI</abbr>-] {+FBI+} and Microsoft will
# | keep the root passwords for your personal computers, and not let you have
@@ -544,14 +544,14 @@
"voorgesteld. Dat is het voorstel waarbij de <abbr>FBI</abbr> en Microsoft "
"het systeemwachtwoord van je systeem beheren en het jou niet geven."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
"into use, it is called “secure boot”."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
# | What Microsoft keeps is not exactly a password in the traditional sense;
# | no person ever types it on a terminal. Rather, it is a signature and
# | encryption key that corresponds to a second key stored in your computer.
@@ -585,7 +585,7 @@
"computer. Dit geeft Microsoft, en mogelijk iedere website die met Microsoft "
"samenwerkt, totale controle over wat een gebruiker kan doen op zijn computer."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -594,7 +594,7 @@
"control. We call this <em>restricted boot</em>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
# | [-When-]{+In 1997, when+} this story was first [-written,-] {+published,+}
# | the SPA was threatening small Internet service providers, demanding they
# | permit the SPA to monitor all users. Most ISPs surrendered when
@@ -629,7 +629,7 @@
"verkreeg in plaats daarvan wel de DMCA, die hen de macht geeft die ze "
"zochten."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
# | The SPA, which actually stands for Software Publishers Association, has
# | been replaced in its police-like role by the Business Software Alliance.
# | The BSA is not, today, an official police force; unofficially, it acts
@@ -664,7 +664,7 @@
"terreurcampagne van de BSA in Argentinië in 2001 suggereerde dat mensen "
"die software deelden verkracht zouden worden."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -674,7 +674,7 @@
"verzonnen. Computers op een universiteit bij Chigago laten deze boodschap "
"zien wanneer je inlogt:"
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -696,7 +696,7 @@
"door de beheerders kan worden aangeleverd als bewijs aan de universiteit en/"
"of de autoriteiten."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -704,11 +704,11 @@
"Dit is een interessante toepassing van het vierde amendement: zet iedereen "
"bij voorbaat onder druk om af te zien van hun rechten."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "Slecht nieuws"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
# | The battle for the right to read is [-already in progress,-] {+going
# | against us so far.+} The enemy is organized, [-while-] {+and+} we are
# | [-not, so it is going against us. Here are articles about bad things that
@@ -728,7 +728,7 @@
"diverse slechte ontwikkelingen op dit gebied sinds de publicatie van dit "
"artikel."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -739,31 +739,31 @@
"for rejecting the product completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -775,7 +775,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
# | If we want to stop the bad news and create some good news, we need to
# | organize and fight. [-The-] {+Subscribe to the+} FSF's <a
# | href=\"http://defectivebydesign.org\"> Defective by Design</a> campaign
@@ -805,11 +805,11 @@
"bij de mailinglijst om hulp te bieden. En <a href=\"http://www.fsf.org/"
"associate\">sluit je aan bij de FSF</a> om ons werk te helpen financieren."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Referenties"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -821,7 +821,7 @@
"a>] and the National Information Infrastructure: The Report of the Working "
"Group on Intellectual Property [sic] Rights (1995)."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -831,7 +831,7 @@
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
"Wired, januari 1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -839,7 +839,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 maart 1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -849,7 +849,7 @@
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
"Private Data</a>, Washington Post, 4 november 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
# | <a [-href=\"http://www.public-domain.org/\">Union-]
# |
{+href=\"https://web.archive.org/web/20151113122141/http://public-domain.org/\">Union+}
# | for the Public Domain</a>—an organization which aims to resist and
@@ -868,27 +868,17 @@
"a>—een organisatie die tot doel heeft het doorslaan van auteursrechten "
"en patenten tegen te gaan."
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Dit verhaal is gepubliceerd in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Vrije software, vrije maatschappij: "
-"geselecteerde artikelen van Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "Andere artikelen die je kunt lezen"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr ""
"<a href=\"/philosophy/philosophy.html\">De filosofie van het GNU-project</a>"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.computerworld.com/article/2596679/networking/copy-"
"protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -898,6 +888,16 @@
"protection--just-say-no.html\" id=\"copy-protection\">Kopieerbeveiliging: "
"zeg gewoon nee</a>, gepubliceerd door Computer World."
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Dit verhaal is gepubliceerd in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Vrije software, vrije maatschappij: "
+"geselecteerde artikelen van Richard M. Stallman</cite></a>."
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/right-to-read.pl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.pl-diff.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/right-to-read.pl-diff.html 18 Oct 2016 16:29:50 -0000 1.12
+++ po/right-to-read.pl-diff.html 6 Nov 2016 21:28:15 -0000 1.13
@@ -15,34 +15,71 @@
<title>The Right to Read
- GNU Project - Free Software Foundation</title>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
--></style></em></ins></span>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<span class="removed"><del><strong><h2>The</strong></del></span>
+<span class="inserted"><ins><em><h2 class="center">The</em></ins></span>
Right to Read</h2>
-<p>
+<span class="removed"><del><strong><p></strong></del></span>
+
+<span class="inserted"><ins><em><p class="byline
center"></em></ins></span>
by <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
<span class="removed"><del><strong><blockquote class="note">
<p><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of eBooks</a>.</p>
-</blockquote></strong></del></span>
+</blockquote>
-<p>
+<p></strong></del></span>
+<span class="inserted"><ins><em><p class="center"></em></ins></span>
<em>This article appeared in the February 1997 issue
of <span
class="removed"><del><strong><strong>Communications</strong></del></span>
<span class="inserted"><ins><em><cite>Communications</em></ins></span> of
the <span class="removed"><del><strong>ACM</strong></strong></del></span>
<span class="inserted"><ins><em>ACM</cite></em></ins></span> (Volume 40,
Number
2).</em></p>
-<span class="inserted"><ins><em><hr /></em></ins></span>
-<blockquote><p>
+<span
class="removed"><del><strong><blockquote><p></strong></del></span>
+<span class="inserted"><ins><em><hr class="thin" />
+
+<div class="article">
+<blockquote class="info center"><p></em></ins></span>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -78,7 +115,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -122,7 +162,10 @@
knowing your computer's root password. And neither
the <span class="removed"><del><strong><abbr title="Federal Bureau of
Investigation">FBI</abbr></strong></del></span> <span
class="inserted"><ins><em>FBI</em></ins></span> nor
Microsoft Support would tell you that.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -159,7 +202,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -172,8 +218,9 @@
<span class="removed"><del><strong><h3
id="AuthorsNote">Author's</strong></del></span>
+<span class="inserted"><ins><em></div>
-<span class="inserted"><ins><em><div class="announcement">
+<div class="announcement">
<blockquote>
<p><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of e-books</a>.</p>
</blockquote>
@@ -182,35 +229,49 @@
<div id="AuthorsNote">
<h3>Author's</em></ins></span> Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<span class="removed"><del><strong><ul>
+<li>This</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This</em></ins></span> story is supposedly a historical article that
will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the <span
class="removed"><del><strong>enemies</strong></del></span> <span
class="inserted"><ins><em>unjust forces</em></ins></span> that use
“pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it <span class="removed"><del><strong>from today so as
to sound even</strong></del></span> <span class="inserted"><ins><em>forwards
into something</em></ins></span> more <span
class="inserted"><ins><em>visibly</em></ins></span>
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+<span class="inserted"><ins><em></p>
+</div>
+<div class="column-limit"></div></em></ins></span>
</li>
<li>
-<span class="inserted"><ins><em><p>Computer-enforced restrictions on
lending or reading books (and other
+<span class="inserted"><ins><em><div class="reduced-width">
+<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
<p>The Electronic Frontier Foundation, a separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li></em></ins></span>
+<blockquote class="info center"></em></ins></span>
<p>The following note has been updated several times since the first
publication of the story.</p>
+<span class="inserted"><ins><em></blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns"></em></ins></span>
<p>
The <span class="inserted"><ins><em>battle for the</em></ins></span> right to
read is <span class="removed"><del><strong>a battle</strong></del></span> <span
class="inserted"><ins><em>already</em></ins></span> being <span
class="removed"><del><strong>fought today.</strong></del></span> <span
class="inserted"><ins><em>fought.</em></ins></span> Although it
may take 50 years for our <span class="removed"><del><strong>present way of
life</strong></del></span> <span class="inserted"><ins><em>past
freedoms</em></ins></span> to fade into obscurity, most
@@ -279,23 +340,33 @@
Even the World Wide Web Consortium has fallen under the shadow of the
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which lead to the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
+<p class="inline-block">
With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span
class="removed"><del><strong>2003.</p></strong></del></span> <span
class="inserted"><ins><em>a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
downgrades. It can also order all machines running Vista to refuse to
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
-10 is no better</p></em></ins></span>
+10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns"></em></ins></span>
<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the <span
class="removed"><del><strong><abbr>FBI</abbr></strong></del></span>
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep
the
@@ -328,22 +399,27 @@
Vista's many restrictions</strong></del></span> is <span
class="inserted"><ins><em>likely</em></ins></span> to <span
class="removed"><del><strong>impose DRM (Digital Restrictions
Management)</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> that <span
class="removed"><del><strong>users can't overcome. The
threat</strong></del></span>
<span class="inserted"><ins><em>control on behalf</em></ins></span> of <span
class="removed"><del><strong>DRM is why we
-have established</strong></del></span> the <span
class="removed"><del><strong><a href="http://DefectiveByDesign.org">
-Defective by Design</a> campaign.</p></strong></del></span> <span
class="inserted"><ins><em>FBI when asked: it
-already <a href="/proprietary/malware-microsoft.html">shows
-the NSA security bugs in Windows</a> to exploit.</p>
+have established</strong></del></span> the <span class="inserted"><ins><em>FBI
when asked: it
+already</em></ins></span> <a <span
class="removed"><del><strong>href="http://DefectiveByDesign.org">
+Defective by Design</a> campaign.</p></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">shows
+the NSA security bugs in Windows</a> to
exploit.</p></em></ins></span>
<p>
-Secure boot can be implemented in a way that permits the user to
+<span class="removed"><del><strong>When</strong></del></span>
+<span class="inserted"><ins><em>Secure boot can be implemented in a way that
permits the user to
specify the signature key and decide what software to sign. In
practice, PCs designed for Windows 10 carry only Microsoft's key, and
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
-boot</em>.</p></em></ins></span>
+boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
-<span class="removed"><del><strong>When</strong></del></span>
-<span class="inserted"><ins><em>In 1997, when</em></ins></span> this story was
first <span class="removed"><del><strong>written,</strong></del></span> <span
class="inserted"><ins><em>published,</em></ins></span> the SPA was
+In 1997, when</em></ins></span> this story was first <span
class="removed"><del><strong>written,</strong></del></span> <span
class="inserted"><ins><em>published,</em></ins></span> the SPA was
threatening small Internet service providers, demanding they permit
the SPA to monitor all users. Most ISPs surrendered when
threatened, because they <span
class="removed"><del><strong>cannot</strong></del></span> <span
class="inserted"><ins><em>could not</em></ins></span> afford to fight back in
court. One
@@ -359,8 +435,13 @@
reminiscent of the erstwhile Soviet Union, it invites people to inform
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p></em></ins></span>
+software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width"></em></ins></span>
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -382,12 +463,15 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
+<span class="inserted"><ins><em></div></em></ins></span>
</li>
</ul>
-<span class="inserted"><ins><em></div></em></ins></span>
+<span class="inserted"><ins><em><div class="column-limit"></div>
+</div></em></ins></span>
<h3 id="BadNews">Bad News</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
The battle for the right to read is <span class="removed"><del><strong>already
in progress,</strong></del></span> <span class="inserted"><ins><em>going
against us so far.</em></ins></span>
The enemy is organized, <span
class="removed"><del><strong>while</strong></del></span> <span
class="inserted"><ins><em>and</em></ins></span> we are <span
class="removed"><del><strong>not, so it is going against us.
@@ -420,14 +504,14 @@
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon</em></ins></span> can
+<li><p class="inline-block">It has a back door with which
Amazon</em></ins></span> can
<span class="removed"><del><strong>revoke at will.</li>
<li><a
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151">Electronic
Publishing:</a> An article about distribution</strong></del></span>
<span class="inserted"><ins><em>remotely erase any book.
In 2009, it erased thousands</em></ins></span> of <span
class="removed"><del><strong>books in
electronic form,</strong></del></span> <span
class="inserted"><ins><em>copies of 1984, by George Orwell.</p></li>
-<li><p>In case all that isn't Orwellian enough, there is a
universal
+<li><p class="inline-block">In case all that isn't Orwellian
enough, there is a universal
back door with which Amazon can remotely change the
software,</em></ins></span> and <span class="removed"><del><strong>copyright
issues affecting</strong></del></span>
<span class="inserted"><ins><em>introduce any other form of
nastiness.</p></li>
</ul>
@@ -454,6 +538,7 @@
our work more generally. There is also a <a href="/help/help.html">list
of ways
to participate in</em></ins></span> our <span
class="removed"><del><strong>work.</strong></del></span> <span
class="inserted"><ins><em>work</a>.</em></ins></span>
</p>
+<span class="inserted"><ins><em></div></em></ins></span>
<h3 id="References">References</h3>
@@ -479,23 +564,32 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
+<span class="inserted"><ins><em><h4>Other Texts to Read</h4>
+
+<ul>
+ <li><a href="/philosophy/philosophy.html">Philosophy of the
+ GNU Project</a></li>
+ <li><a
href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html"
+ id="copy-protection">Copy Protection: Just Say No</a>,
+ published in Computer World.</li>
+</ul>
+</div></em></ins></span>
+
+<hr <span class="inserted"><ins><em>class="thin"</em></ins></span> />
<blockquote id="fsfs"><p class="big">This essay is published
in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
Software, Free Society: The Selected Essays of Richard
M. Stallman</cite></a>.</p></blockquote>
-<h5>Other Texts to Read</h5>
+<span class="removed"><del><strong><h5>Other Texts to Read</h5>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
GNU Project</a></li>
- <li><a <span
class="removed"><del><strong>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"
- id="COPYPROCTECTION">Copy</strong></del></span> <span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html"
- id="copy-protection">Copy</em></ins></span> Protection: Just
Say No</a>,
- <span
class="removed"><del><strong>Published</strong></del></span>
- <span class="inserted"><ins><em>published</em></ins></span> in
Computer World.</li>
-</ul>
+ <li><a
href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"
+ id="COPYPROCTECTION">Copy Protection: Just Say No</a>,
+ Published in Computer World.</li>
+</ul></strong></del></span>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -554,7 +648,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.pl.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.pl.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/right-to-read.pl.po 18 Oct 2016 16:29:50 -0000 1.48
+++ po/right-to-read.pl.po 6 Nov 2016 21:28:15 -0000 1.49
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-02-07 20:31-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -49,7 +49,7 @@
"<em>Ten artykuÅ pojawiÅ siÄ w lutym 1997
w <strong>Communications "
"of the ACM</strong> (Volume 40, Number 2).</em>"
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -58,7 +58,7 @@
"na temat źródeÅ KsiÄżycowej Rewolucji, opublikowanego w Luna
City "
"w roku 2096."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -70,7 +70,7 @@
"a bez pożyczenia innego nie zaliczyÅaby projektu koÅczÄ
cego semestr.
"
"Nie odważyÅa siÄ o to prosiÄ nikogo, oprócz Dana."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -86,7 +86,7 @@
"uczono go, jak wszystkich, że dzielenie siÄ ksiÄ
żkami jest czymŠ"
"paskudnym i zÅym, czymÅ, co robiÄ
tylko piraci."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -108,7 +108,7 @@
"wszystkim siÄ dowie. On zaÅ, jako wÅaÅciciel komputera, zostanie
najsurowiej "
"ukarany – za to, że nie usiÅowaÅ zapobiec
przestÄpstwu."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -132,7 +132,7 @@
"miaÅ nadziejÄ, że jego wÅasne prace, jeÅli bÄdÄ
wystarczajÄ
co
czÄsto "
"cytowane, przyniosÄ
mu tyle, że wystarczy na spÅatÄ tego
kredytu)."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -150,7 +150,7 @@
"2047 biblioteki oferujÄ
ce publiczny darmowy dostÄp do literatury "
"naukowej byÅy już tylko mglistym wspomnieniem."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -170,7 +170,7 @@
"W 2047 Frank trafiÅ do wiÄzienia, nie za pirackie czytanie, "
"ale za posiadanie debuggera."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -186,7 +186,7 @@
"sÄ
d orzekÅ, że praktycznie staÅo siÄ to ich podstawowym
zastosowaniem. "
"Co znaczyÅo, że byÅy nielegalne; twórcom debuggerów groziÅo
wiÄzienie."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -200,7 +200,7 @@
"za specjalnym firewallem i można byÅo z niego korzystaÄ
tylko "
"podczas ÄwiczeÅ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
# | It was also possible to bypass the copyright monitors by installing a
# | modified system kernel. Dan would eventually find out about the free
# | kernels, even entire free operating systems, that had existed around the
@@ -237,7 +237,7 @@
"komputera. A ani <abbr title=\"Federal Bureau of Investigation\">FBI</"
"abbr>, ani Pomoc Techniczna Microsoftu by go wam nie podaÅy."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -250,7 +250,7 @@
"to jego wybraÅa, by poprosiÄ o pomoc, mógÅ znaczyÄ, że ona
również go "
"kocha."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -265,7 +265,7 @@
"przestÄpstwo, ale dla SPA niewykrywalne automatycznie. Mogliby siÄ o "
"tym dowiedzieÄ tylko, gdyby Lissa na niego doniosÅa."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -287,7 +287,7 @@
"oznacza, iż robicie jakieÅ inne zakazane rzeczy, oni zaÅ nie muszÄ
"
"wiedzieÄ, jakie to rzeczy."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -297,7 +297,7 @@
"bezpoÅrednio. Zamiast tego blokowano im dostÄp do szkolnych systemów "
"komputerowych, tak że byÅo pewne, że oblejÄ
semestr."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -311,7 +311,7 @@
"do problemu dyscypliny studentów – karano dziaÅania, które
"
"byÅy szkodliwe, nie te, które tylko wzbudzaÅy podejrzenia."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -332,7 +332,7 @@
"w 2062 zaczÄÅo siÄ Powstanie Tycho, powszechne prawo do czytania
"
"wkrótce staÅo siÄ jednym z jego gÅównych celów."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
# | <a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list
# | about the dangers of [-eBooks</a>.-] {+e-books</a>.+}
#, fuzzy
@@ -346,11 +346,11 @@
"<a href=\"http://defectivebydesign.org/ebooks.html\">Zapiszcie siÄ na "
"naszÄ
listÄ mailowÄ
o zagrożeniach ebookami</a>."
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr "Uwagi autora"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
# | This story is supposedly a historical article that will be written in the
# | future by someone else, describing Dan Halbert's youth under a repressive
# | society shaped by the [-enemies-] {+unjust forces+} that use
@@ -382,7 +382,7 @@
"brzmiaÅo jeszcze bardziej represyjnie. Zobacz <a
href=\"/philosophy/words-to-"
"avoid.html#Piracy\">„piractwo”</a>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -391,13 +391,13 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The following note has been updated several times since the first "
"publication of the story."
@@ -405,7 +405,7 @@
"Ta uwaga byÅa kilka razy aktualizowana od pierwszego ukazania siÄ "
"opowiadania."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
# | The {+battle for the+} right to read is [-a battle-] {+already+} being
# | [-fought today.-] {+fought.+} Although it may take 50 years for our
# | [-present way of life-] {+past freedoms+} to fade into obscurity, most of
@@ -458,7 +458,7 @@
"samo posiadanie kopii DeCSS, wolnego programu do rozszyfrowywania "
"filmów na DVD, jest przestÄpstwem."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -469,7 +469,7 @@
"these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -480,14 +480,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -496,7 +496,7 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
# | [-Vista also gives-]{+With Windows Vista,+} Microsoft [-additional powers;
# | for instance,-] {+admitted it had built in a back door:+} Microsoft can
# | {+use it to+} forcibly install [-upgrades, and it-] {+software
@@ -534,7 +534,7 @@
"dla którego stworzyliÅmy kampaniÄ <a
href=\"http://DefectiveByDesign.org\"> "
"Defective by Design</a>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
# | One of the ideas in the story was not proposed in reality until 2002.
# | This is the idea that the [-<abbr>FBI</abbr>-] {+FBI+} and Microsoft will
# | keep the root passwords for your personal computers, and not let you have
@@ -553,14 +553,14 @@
"administracyjnymi do komputerów osobistych i nie pozwalaÅy Wam go
"
"mieÄ, nie byÅ wysuwany aż do roku 2002."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
"into use, it is called “secure boot”."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
# | What Microsoft keeps is not exactly a password in the traditional sense;
# | no person ever types it on a terminal. Rather, it is a signature and
# | encryption key that corresponds to a second key stored in your computer.
@@ -595,7 +595,7 @@
"i innym firmom wspóÅpracujÄ
cym z Microsoftem nieograniczonÄ
"
"kontrolÄ nad tym co użytkownik może robiÄ ze swoim komputerem."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -604,7 +604,7 @@
"control. We call this <em>restricted boot</em>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
# | [-When-]{+In 1997, when+} this story was first [-written,-] {+published,+}
# | the SPA was threatening small Internet service providers, demanding they
# | permit the SPA to monitor all users. Most ISPs surrendered when
@@ -638,7 +638,7 @@
"zaniechaÅa sprawy, ale uzyskaÅa DMCA, która daÅa im wÅadzÄ,
po "
"jakÄ
siÄgali."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
# | The SPA, which actually stands for Software Publishers Association, has
# | been replaced in its police-like role by the Business Software Alliance.
# | The BSA is not, today, an official police force; unofficially, it acts
@@ -674,7 +674,7 @@
"BSA przekazywaÅa zawoalowane groźby, że osoby dzielÄ
ce siÄ "
"oprogramowaniem bÄdÄ
gwaÅcone w wiÄzieniach."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -684,7 +684,7 @@
"przykÅad, komputer jednego z uniwersytetów z okolic Chicago "
"podczas logowania siÄ użytkownika wyÅwietlaÅ taki komunikat:"
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -709,7 +709,7 @@
"regulaminu Uniwersytetu, personel może przekazaÄ taki dowód wÅadzom "
"Uniwersytetu i/lub funkcjonariuszom porzÄ
dku prawnego."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -718,11 +718,11 @@
"wszystkich, aby z góry zgodzili siÄ oddaÄ zapisane w niej swoje "
"prawa."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "ZÅe wieÅci"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
# | The battle for the right to read is [-already in progress,-] {+going
# | against us so far.+} The enemy is organized, [-while-] {+and+} we are
# | [-not, so it is going against us. Here are articles about bad things that
@@ -742,7 +742,7 @@
"artykuÅy o zÅych rzeczach, które siÄ wydarzyÅy od czasu napisania
tego "
"artykuÅu."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -753,31 +753,31 @@
"for rejecting the product completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -789,7 +789,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
# | If we want to stop the bad news and create some good news, we need to
# | organize and fight. [-The-] {+Subscribe to the+} FSF's <a
# | href=\"http://defectivebydesign.org\"> Defective by Design</a> campaign
@@ -819,11 +819,11 @@
"siÄ na listÄ mailowÄ
aby pomóc. <a href=\"http://www.fsf.org/"
"associate\">PrzyÅÄ
czcie siÄ do FSF</a> aby pomóc naszym
staraniom."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Bibliografia"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -838,7 +838,7 @@
"Krajowa Infrastruktura Informacyjna. Raport Grupy Roboczej do spraw "
"Praw WÅasnoÅci Intelektualnej)."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -848,7 +848,7 @@
"explanation of the White Paper: The Copyright Grab</a> (BiaÅa KsiÄga "
"objaÅniona. Grabież praw autorskich), Pamela Samuelson, Wired, styczeÅ
1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -856,7 +856,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a> "
"(Wyprzedane), James Boyle, New York Times, 31 marca 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -867,7 +867,7 @@
"Private Data</a> (Dane publiczne czy dane prywatne), Washington Post, 4 "
"listopada 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
# | <a [-href=\"http://www.public-domain.org/\">Union-]
# |
{+href=\"https://web.archive.org/web/20151113122141/http://public-domain.org/\">Union+}
# | for the Public Domain</a>—an organization which aims to resist and
@@ -887,26 +887,16 @@
"przerostu potÄgi praw autorskich i patentów i powrót do "
"poprzedniego stanu."
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Ten esej jest opublikowany w <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "Inne teksty"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">Filozofia Projektu GNU</a>"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
# | <a
# |
[-href=\"http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No\"
# | id=\"COPYPROCTECTION\">Copy-]
@@ -928,6 +918,16 @@
"Say No</a> (Zabezpieczenia przeciw kopiowaniu – powiedzcie nie), "
"opublikowane w piÅmie Computer World."
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Ten esej jest opublikowany w <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/right-to-read.pot
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- po/right-to-read.pot 18 Oct 2016 16:29:50 -0000 1.49
+++ po/right-to-read.pot 6 Nov 2016 21:28:15 -0000 1.50
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -36,13 +36,13 @@
"of the ACM</cite> (Volume 40, Number 2).</em>"
msgstr ""
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -50,7 +50,7 @@
"dared ask, except Dan."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -60,7 +60,7 @@
"that only pirates would do."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -72,7 +72,7 @@
"punishment—for not taking pains to prevent the crime."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -85,7 +85,7 @@
"bring in enough to repay this loan.)"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -95,7 +95,7 @@
"offering free public access to scholarly literature were a dim memory."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -106,7 +106,7 @@
"was in prison, not for pirate reading, but for possessing a debugger."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -116,7 +116,7 @@
"developers were sent to prison."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -124,7 +124,7 @@
"a special firewall so that it could be used only for class exercises."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It was also possible to bypass the copyright monitors by installing a "
"modified system kernel. Dan would eventually find out about the free "
@@ -135,7 +135,7 @@
"would tell you that."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -143,7 +143,7 @@
"that could mean she loved him too."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -152,7 +152,7 @@
"only find out if Lissa reported him."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -164,14 +164,14 @@
"and they did not need to know what it was."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
"all their classes."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -180,7 +180,7 @@
"merely raised suspicion."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -192,17 +192,17 @@
"became one of its central aims."
msgstr ""
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list "
"about the dangers of e-books</a>."
msgstr ""
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr ""
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -212,7 +212,7 @@
"href=\"/philosophy/words-to-avoid.html#Piracy\">“Piracy”</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -221,19 +221,19 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The following note has been updated several times since the first "
"publication of the story."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The battle for the right to read is already being fought. Although it may "
"take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -246,7 +246,7 @@
"in a form not quite as strong."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through "
"so-called “free trade” treaties. <a "
@@ -257,7 +257,7 @@
"unjust policies that these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -268,14 +268,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a "
@@ -284,7 +284,7 @@
"and reject nonfree programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"With Windows Vista, Microsoft admitted it had built in a back door: "
"Microsoft can use it to forcibly install software “upgrades,” "
@@ -294,21 +294,21 @@
"overcome. Of course, Windows 10 is no better"
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"One of the ideas in the story was not proposed in reality until 2002. This "
"is the idea that the FBI and Microsoft will keep the root passwords for your "
"personal computers, and not let you have them."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as "
"“trusted computing” and “Palladium”, but as "
"ultimately put into use, it is called “secure boot”."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"What Microsoft keeps is not exactly a password in the traditional sense; no "
"person ever types it on a terminal. Rather, it is a signature and "
@@ -320,7 +320,7 @@
"NSA security bugs in Windows</a> to exploit."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -329,7 +329,7 @@
"control. We call this <em>restricted boot</em>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"In 1997, when this story was first published, the SPA was threatening small "
"Internet service providers, demanding they permit the SPA to monitor all "
@@ -339,7 +339,7 @@
"the suit, but the DMCA gave it the power it sought."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The SPA, which actually stands for Software Publishers Association, has been "
"replaced in its police-like role by the Business Software Alliance. The BSA "
@@ -350,14 +350,14 @@
"would be raped in prison."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
"upon login:"
msgstr ""
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -371,23 +371,23 @@
"authorities and/or law enforcement officials."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The battle for the right to read is going against us so far. The enemy is "
"organized, and we are not."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a "
"href=\"/philosophy/the-danger-of-ebooks.html\"> abolish readers' traditional "
@@ -400,31 +400,31 @@
"completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -436,7 +436,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we want to stop the bad news and create some good news, we need to "
"organize and fight. Subscribe to the FSF's <a "
@@ -446,11 +446,11 @@
"href=\"/help/help.html\">list of ways to participate in our work</a>."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr ""
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a "
@@ -459,27 +459,27 @@
"[sic] Rights (1995)."
msgstr ""
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
"Wired, Jan. 1996"
msgstr ""
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
msgstr ""
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a "
"href=\"http://web.archive.org/web/20130508120533/http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html\">Public
"
"Data or Private Data</a>, Washington Post, 4 Nov 1996."
msgstr ""
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a "
"href=\"https://web.archive.org/web/20151113122141/http://public-domain.org/\">Union
"
@@ -487,23 +487,15 @@
"reverse the overextension of copyright and patent powers."
msgstr ""
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a "
-"href=\"http://shop.fsf.org/product/free-software-free-society/\"><cite>Free "
-"Software, Free Society: The Selected Essays of Richard "
-"M. Stallman</cite></a>."
-msgstr ""
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr ""
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU
Project</a>"
msgstr ""
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a "
"href=\"http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html\"
"
@@ -511,6 +503,14 @@
"Computer World."
msgstr ""
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a "
+"href=\"http://shop.fsf.org/product/free-software-free-society/\"><cite>Free "
+"Software, Free Society: The Selected Essays of Richard "
+"M. Stallman</cite></a>."
+msgstr ""
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/right-to-read.pt-br-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.pt-br-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/right-to-read.pt-br-diff.html 18 Oct 2016 16:29:50 -0000 1.24
+++ po/right-to-read.pt-br-diff.html 6 Nov 2016 21:28:15 -0000 1.25
@@ -15,34 +15,71 @@
<title>The Right to Read
- GNU Project - Free Software Foundation</title>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
--></style></em></ins></span>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<span class="removed"><del><strong><h2>The</strong></del></span>
+<span class="inserted"><ins><em><h2 class="center">The</em></ins></span>
Right to Read</h2>
-<p>
+<span class="removed"><del><strong><p></strong></del></span>
+
+<span class="inserted"><ins><em><p class="byline
center"></em></ins></span>
by <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
<span class="removed"><del><strong><blockquote class="note">
<p><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of eBooks</a>.</p>
-</blockquote></strong></del></span>
+</blockquote>
-<p>
+<p></strong></del></span>
+<span class="inserted"><ins><em><p class="center"></em></ins></span>
<em>This article appeared in the February 1997 issue
of <span
class="removed"><del><strong><strong>Communications</strong></del></span>
<span class="inserted"><ins><em><cite>Communications</em></ins></span> of
the <span class="removed"><del><strong>ACM</strong></strong></del></span>
<span class="inserted"><ins><em>ACM</cite></em></ins></span> (Volume 40,
Number
2).</em></p>
-<span class="inserted"><ins><em><hr /></em></ins></span>
-<blockquote><p>
+<span
class="removed"><del><strong><blockquote><p></strong></del></span>
+<span class="inserted"><ins><em><hr class="thin" />
+
+<div class="article">
+<blockquote class="info center"><p></em></ins></span>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -78,7 +115,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -122,7 +162,10 @@
knowing your computer's root password. And neither
the <span class="removed"><del><strong><abbr title="Federal Bureau of
Investigation">FBI</abbr></strong></del></span> <span
class="inserted"><ins><em>FBI</em></ins></span> nor
Microsoft Support would tell you that.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -159,7 +202,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -174,8 +220,9 @@
<span class="removed"><del><strong><h3 id="AuthorsNote">Author's
Note</h3>
<p>[This</strong></del></span>
+<span class="inserted"><ins><em></div>
-<span class="inserted"><ins><em><div class="announcement">
+<div class="announcement">
<blockquote>
<p><a href="http://defectivebydesign.org/ebooks.html">Join our
mailing list about the dangers of e-books</a>.</p>
</blockquote>
@@ -184,35 +231,46 @@
<div id="AuthorsNote">
<h3>Author's Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the unjust forces that use “pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it forwards into something more visibly
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
<p>The Electronic Frontier Foundation, a separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>The following</em></ins></span> note has been updated several times
since the first
-publication of the <span
class="removed"><del><strong>story.]</p></strong></del></span> <span
class="inserted"><ins><em>story.</p></em></ins></span>
+publication of the <span
class="removed"><del><strong>story.]</p></strong></del></span> <span
class="inserted"><ins><em>story.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns"></em></ins></span>
<p>
The <span class="inserted"><ins><em>battle for the</em></ins></span> right to
read is <span class="removed"><del><strong>a battle</strong></del></span> <span
class="inserted"><ins><em>already</em></ins></span> being <span
class="removed"><del><strong>fought today.</strong></del></span> <span
class="inserted"><ins><em>fought.</em></ins></span> Although it
may take 50 years for our <span class="removed"><del><strong>present way of
life</strong></del></span> <span class="inserted"><ins><em>past
freedoms</em></ins></span> to fade into obscurity, most
@@ -226,42 +284,41 @@
distribution of programs that can break DRM a crime.</em></ins></span> The
European
Union imposed similar restrictions in a 2001 copyright <span
class="removed"><del><strong>directive. In France, under the DADVSI law
adopted</strong></del></span> <span
class="inserted"><ins><em>directive,</em></ins></span> in <span
class="removed"><del><strong>2006, mere possession of a copy of DeCSS, the free
program
-to decrypt video on a DVD, is a crime.</p>
+to decrypt video on a DVD, is</strong></del></span> a <span
class="removed"><del><strong>crime.</p></strong></del></span>
+<span class="inserted"><ins><em>form not quite as
strong.</p></em></ins></span>
<p>
-In 2001, Disney-funded Senator Hollings proposed a bill called the
-SSSCA that would require every new computer to have mandatory
-copy-restriction facilities that the user cannot bypass. Following
-the Clipper chip and similar US government key-escrow proposals, this
-shows</strong></del></span> a <span class="removed"><del><strong>long-term
trend: computer systems are increasingly set up to
-give absentees with clout control over the people actually using the
+<span class="removed"><del><strong>In 2001, Disney-funded Senator Hollings
proposed a bill called the
+SSSCA that would require every new computer</strong></del></span>
+<span class="inserted"><ins><em>The US campaigns</em></ins></span> to <span
class="removed"><del><strong>have mandatory
+copy-restriction facilities that</strong></del></span> <span
class="inserted"><ins><em>impose such rules on</em></ins></span> the <span
class="removed"><del><strong>user cannot bypass.
Following</strong></del></span> <span class="inserted"><ins><em>rest
of</em></ins></span> the <span class="removed"><del><strong>Clipper chip and
similar US government key-escrow proposals, this
+shows</strong></del></span> <span class="inserted"><ins><em>world through
+so-called “free trade” treaties.
+<a href="https://stallman.org/business-supremacy-treaties.html">
+Business-supremacy treaties</a> is</em></ins></span> a <span
class="removed"><del><strong>long-term trend: computer
systems</strong></del></span> <span class="inserted"><ins><em>more fitting term
for them, since
+they</em></ins></span> are <span class="removed"><del><strong>increasingly set
up</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to give <span
class="removed"><del><strong>absentees with clout control</strong></del></span>
<span class="inserted"><ins><em>business dominion</em></ins></span> over <span
class="removed"><del><strong>the people actually using the
computer system. The SSSCA was later renamed to the unpronounceable
-CBDTPA, which was glossed</strong></del></span>
-<span class="inserted"><ins><em>form not quite</em></ins></span> as <span
class="removed"><del><strong>the “Consume But Don't Try
+CBDTPA, which was glossed as the “Consume But Don't Try
Programming Act”.
-</p></strong></del></span> <span
class="inserted"><ins><em>strong.</p></em></ins></span>
+</p>
-<p>
-The <span class="removed"><del><strong>Republicans took control of the US
senate shortly thereafter.
+<p></strong></del></span> <span class="inserted"><ins><em>nominally
democratic
+states.</em></ins></span> The <span class="removed"><del><strong>Republicans
took control</strong></del></span> <span class="inserted"><ins><em>DMCA's
policy</em></ins></span> of <span class="removed"><del><strong>the US senate
shortly thereafter.
They are less tied to Hollywood than the Democrats, so they did not
-press these proposals. Now that the Democrats are back in control,
+press these proposals. Now</strong></del></span> <span
class="inserted"><ins><em>criminalizing programs</em></ins></span> that <span
class="removed"><del><strong>the Democrats are back in control,
the danger is once again higher.</p>
<p>
-In 2001 the</strong></del></span> US <span class="removed"><del><strong>began
attempting to use the proposed Free Trade Area of
-the Americas (FTAA) treaty</strong></del></span> <span
class="inserted"><ins><em>campaigns</em></ins></span> to impose <span
class="removed"><del><strong>the same</strong></del></span> <span
class="inserted"><ins><em>such</em></ins></span> rules on <span
class="removed"><del><strong>all the countries in</strong></del></span> the
<span class="removed"><del><strong>Western Hemisphere. The FTAA is
one</strong></del></span> <span
class="inserted"><ins><em>rest</em></ins></span> of the <span
class="inserted"><ins><em>world through</em></ins></span>
-so-called <span class="removed"><del><strong>free
-trade treaties, which</strong></del></span> <span
class="inserted"><ins><em>“free trade” treaties.
-<a href="https://stallman.org/business-supremacy-treaties.html">
-Business-supremacy treaties</a> is a more fitting term for them, since
-they</em></ins></span> are <span
class="removed"><del><strong>actually</strong></del></span> designed to give
business
-<span class="removed"><del><strong>increased power</strong></del></span> <span
class="inserted"><ins><em>dominion</em></ins></span> over <span
class="inserted"><ins><em>nominally</em></ins></span> democratic <span
class="removed"><del><strong>governments; imposing laws like the
-DMCA is typical of this spirit.</strong></del></span>
-<span class="inserted"><ins><em>states.</em></ins></span> The <span
class="removed"><del><strong>FTAA was effectively killed by
-Lula, President</strong></del></span> <span class="inserted"><ins><em>DMCA's
policy</em></ins></span> of <span class="removed"><del><strong>Brazil, who
rejected the DMCA requirement and
-others.</p></strong></del></span> <span
class="inserted"><ins><em>criminalizing programs that
-break DRM is one of many unjust policies that these treaties impose
-across a wide range of fields.</p></em></ins></span>
+In 2001 the US began attempting to use the proposed Free Trade Area of
+the Americas (FTAA) treaty to impose the same rules on all the countries in
+the Western Hemisphere. The FTAA</strong></del></span>
+<span class="inserted"><ins><em>break DRM</em></ins></span> is one of <span
class="removed"><del><strong>the so-called free
+trade treaties, which are actually designed to give business
+increased power over democratic governments; imposing laws like the
+DMCA is typical of this spirit. The FTAA was effectively killed by
+Lula, President</strong></del></span> <span class="inserted"><ins><em>many
unjust policies that these treaties impose
+across a wide range</em></ins></span> of <span
class="removed"><del><strong>Brazil, who rejected the DMCA requirement and
+others.</p></strong></del></span> <span
class="inserted"><ins><em>fields.</p></em></ins></span>
<p>
<span class="removed"><del><strong>Since then, the</strong></del></span>
@@ -270,34 +327,44 @@
and <span class="removed"><del><strong>Mexico</strong></del></span> <span
class="inserted"><ins><em>South Korea</em></ins></span> through bilateral <span
class="removed"><del><strong>“free trade”</strong></del></span>
agreements, and on countries such as
Costa Rica through another treaty, CAFTA. <span
class="removed"><del><strong>Ecuador's President Correa refused to sign a
“free trade” agreement</strong></del></span> <span
class="inserted"><ins><em>Obama has escalated the
-campaign with two new proposed treaties, the TPP and the TTIP. The
-TPP would impose the DMCA, along</em></ins></span> with <span
class="inserted"><ins><em>many other wrongs, on 12
-countries on</em></ins></span> the <span class="removed"><del><strong>US, but
I've heard Ecuador
-had adopted something like</strong></del></span> <span
class="inserted"><ins><em>Pacific Ocean. The TTIP would impose similar
+campaign</em></ins></span> with <span class="inserted"><ins><em>two new
proposed treaties,</em></ins></span> the <span class="removed"><del><strong>US,
but I've heard Ecuador
+had adopted something like</strong></del></span> <span
class="inserted"><ins><em>TPP and</em></ins></span> the <span
class="removed"><del><strong>DMCA</strong></del></span> <span
class="inserted"><ins><em>TTIP. The
+TPP would impose the DMCA, along with many other wrongs, on 12
+countries on the Pacific Ocean. The TTIP would impose similar
strictures on Europe. All these treaties must be defeated, or
abolished.</p>
<p>
-Even</em></ins></span> the <span
class="removed"><del><strong>DMCA</strong></del></span> <span
class="inserted"><ins><em>World Wide Web Consortium has fallen under the shadow
of the
+Even the World Wide Web Consortium has fallen under the shadow of the
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which lead to the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
+<p class="inline-block">
With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span
class="removed"><del><strong>2003.</p></strong></del></span> <span
class="inserted"><ins><em>a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
downgrades. It can also order all machines running Vista to refuse to
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
-10 is no better</p></em></ins></span>
+10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns"></em></ins></span>
<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the <span
class="removed"><del><strong><abbr>FBI</abbr></strong></del></span>
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep
the
@@ -330,22 +397,27 @@
Vista's many restrictions</strong></del></span> is <span
class="inserted"><ins><em>likely</em></ins></span> to <span
class="removed"><del><strong>impose DRM (Digital Restrictions
Management)</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> that <span
class="removed"><del><strong>users can't overcome. The
threat</strong></del></span>
<span class="inserted"><ins><em>control on behalf</em></ins></span> of <span
class="removed"><del><strong>DRM is why we
-have established</strong></del></span> the <span
class="removed"><del><strong><a href="http://DefectiveByDesign.org">
-Defective by Design</a> campaign.</p></strong></del></span> <span
class="inserted"><ins><em>FBI when asked: it
-already <a href="/proprietary/malware-microsoft.html">shows
-the NSA security bugs in Windows</a> to exploit.</p>
+have established</strong></del></span> the <span class="inserted"><ins><em>FBI
when asked: it
+already</em></ins></span> <a <span
class="removed"><del><strong>href="http://DefectiveByDesign.org">
+Defective by Design</a> campaign.</p></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">shows
+the NSA security bugs in Windows</a> to
exploit.</p></em></ins></span>
<p>
-Secure boot can be implemented in a way that permits the user to
+<span class="removed"><del><strong>When</strong></del></span>
+<span class="inserted"><ins><em>Secure boot can be implemented in a way that
permits the user to
specify the signature key and decide what software to sign. In
practice, PCs designed for Windows 10 carry only Microsoft's key, and
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
-boot</em>.</p></em></ins></span>
+boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
-<span class="removed"><del><strong>When</strong></del></span>
-<span class="inserted"><ins><em>In 1997, when</em></ins></span> this story was
first <span class="removed"><del><strong>written,</strong></del></span> <span
class="inserted"><ins><em>published,</em></ins></span> the SPA was
+In 1997, when</em></ins></span> this story was first <span
class="removed"><del><strong>written,</strong></del></span> <span
class="inserted"><ins><em>published,</em></ins></span> the SPA was
threatening small Internet service providers, demanding they permit
the SPA to monitor all users. Most ISPs surrendered when
threatened, because they <span
class="removed"><del><strong>cannot</strong></del></span> <span
class="inserted"><ins><em>could not</em></ins></span> afford to fight back in
court. One
@@ -361,8 +433,13 @@
reminiscent of the erstwhile Soviet Union, it invites people to inform
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p></em></ins></span>
+software would be <span
class="removed"><del><strong>raped.</p></strong></del></span> <span
class="inserted"><ins><em>raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width"></em></ins></span>
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -384,12 +461,15 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
-<span class="inserted"><ins><em></li>
+<span class="inserted"><ins><em></div>
+</li>
</ul>
+<div class="column-limit"></div>
</div></em></ins></span>
<h3 id="BadNews">Bad News</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
The battle for the right to read is <span class="removed"><del><strong>already
in progress,</strong></del></span> <span class="inserted"><ins><em>going
against us so far.</em></ins></span>
The enemy is organized, <span
class="removed"><del><strong>while</strong></del></span> <span
class="inserted"><ins><em>and</em></ins></span> we are <span
class="removed"><del><strong>not, so it is going against us.
@@ -422,14 +502,14 @@
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon</em></ins></span> can
+<li><p class="inline-block">It has a back door with which
Amazon</em></ins></span> can
<span class="removed"><del><strong>revoke at will.</li>
<li><a
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151">Electronic
Publishing:</a> An article about distribution</strong></del></span>
<span class="inserted"><ins><em>remotely erase any book.
In 2009, it erased thousands</em></ins></span> of <span
class="removed"><del><strong>books in
electronic form,</strong></del></span> <span
class="inserted"><ins><em>copies of 1984, by George Orwell.</p></li>
-<li><p>In case all that isn't Orwellian enough, there is a
universal
+<li><p class="inline-block">In case all that isn't Orwellian
enough, there is a universal
back door with which Amazon can remotely change the
software,</em></ins></span> and <span class="removed"><del><strong>copyright
issues affecting</strong></del></span>
<span class="inserted"><ins><em>introduce any other form of
nastiness.</p></li>
</ul>
@@ -456,6 +536,7 @@
our work more generally. There is also a <a href="/help/help.html">list
of ways
to participate in</em></ins></span> our <span
class="removed"><del><strong>work.</strong></del></span> <span
class="inserted"><ins><em>work</a>.</em></ins></span>
</p>
+<span class="inserted"><ins><em></div></em></ins></span>
<h3 id="References">References</h3>
@@ -481,23 +562,32 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
+<span class="inserted"><ins><em><h4>Other Texts to Read</h4>
+
+<ul>
+ <li><a href="/philosophy/philosophy.html">Philosophy of the
+ GNU Project</a></li>
+ <li><a
href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html"
+ id="copy-protection">Copy Protection: Just Say No</a>,
+ published in Computer World.</li>
+</ul>
+</div></em></ins></span>
+
+<hr <span class="inserted"><ins><em>class="thin"</em></ins></span> />
<blockquote id="fsfs"><p class="big">This essay is published
in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
Software, Free Society: The Selected Essays of Richard
M. Stallman</cite></a>.</p></blockquote>
-<h5>Other Texts to Read</h5>
+<span class="removed"><del><strong><h5>Other Texts to Read</h5>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
GNU Project</a></li>
- <li><a <span
class="removed"><del><strong>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"
- id="COPYPROCTECTION">Copy</strong></del></span> <span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html"
- id="copy-protection">Copy</em></ins></span> Protection: Just
Say No</a>,
- <span
class="removed"><del><strong>Published</strong></del></span>
- <span class="inserted"><ins><em>published</em></ins></span> in
Computer World.</li>
-</ul>
+ <li><a
href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"
+ id="COPYPROCTECTION">Copy Protection: Just Say No</a>,
+ Published in Computer World.</li>
+</ul></strong></del></span>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -557,7 +647,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.pt-br.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.pt-br.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- po/right-to-read.pt-br.po 18 Oct 2016 16:29:50 -0000 1.28
+++ po/right-to-read.pt-br.po 6 Nov 2016 21:28:15 -0000 1.29
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2013-05-26 23:00-0300\n"
"Last-Translator: Hudson Flávio Meneses Lacerda <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -47,7 +47,7 @@
"<em>Este artigo foi publicado na edição de fevereiro de 1997 de "
"<strong>Communications of the ACM</strong> (Volume 40, Number 2).</em>"
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -55,7 +55,7 @@
"de \"The Road to Tycho\", uma coleção de artigos sobre os antecedentes da "
"Revolução Lunar, publicado em Luna City, em 2096."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -68,7 +68,7 @@
"projeto bimestral. Não havia ninguém a quem ela ousasse pedir isso, exceto "
"Dan."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -84,7 +84,7 @@
"primário que emprestar livros era algo terrÃvel e errado — algo que
só "
"piratas fariam."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -105,7 +105,7 @@
"saber. Ele, como dono do computador, receberia a mais dura punição, por
não "
"ter feito os sacrifÃcios necessários para evitar o crime."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -128,7 +128,7 @@
"tinha esperanças de que seus próprios artigos de pesquisa, caso citados "
"frequentemente, rendessem o suficiente para pagar seu financiamento)."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -145,7 +145,7 @@
"institucionais, começaram a cobrar pelo acesso. Em 2047, bibliotecas com "
"acesso público gratuito a artigos acadêmicos eram uma lembrança distante."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -163,7 +163,7 @@
"(estudantes afundados em dÃvidas eram facilmente tentados a trair). Em 2047,
"
"Frank estava preso, não por leitura pirata, mas por possuir um depurador."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -181,7 +181,7 @@
"ilegais. Os desenvolvedores de ferramentas de depuração foram mandados para
"
"a prisão."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -195,7 +195,7 @@
"<cite>firewall</cite> especial, de forma que podia ser usado somente para os "
"exercÃcios da aula."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "It was also possible to bypass the copyright monitors by installing a "
@@ -224,7 +224,7 @@
"sem saber a senha do administrador do seu computador. E nem o FBI nem o "
"Suporte da Microsoft lhe diriam qual ela é."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -236,7 +236,7 @@
"falar com ela o deixava em êxtase. E já que ela o havia escolhido para
ajudá-"
"la, isso poderia significar que ela o amava também."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -250,7 +250,7 @@
"ainda era um crime, mas a SPA não ficaria sabendo automaticamente sobre ele.
"
"Eles só saberiam se Lissa o entregasse."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -271,7 +271,7 @@
"Eles assumiam que você estava fazendo alguma outra coisa que era proibida, e
"
"não precisavam saber o que era."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -281,7 +281,7 @@
"Eles eram banidos do sistema de computadores da faculdade, e assim, "
"inevitavelmente, acabariam reprovados em todas as disciplinas."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -295,7 +295,7 @@
"diferente para a disciplina; eles puniam atividades que eram danosas, não "
"aquelas que meramente levantavam suspeitas."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -316,7 +316,7 @@
"o direito universal à leitura rapidamente se tornou um de seus objetivos "
"centrais."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing "
@@ -328,13 +328,13 @@
"<a href=\"http://defectivebydesign.org/ebooks.html\">Junte-se à nossa lista "
"de discussão sobre os perigos dos livros eletrônicos (eBooks)</a>."
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
#, fuzzy
#| msgid "Author's Note"
msgid "Author's Notes"
msgstr "Nota do autor"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -344,7 +344,7 @@
"philosophy/words-to-avoid.html#Piracy\">“Piracy”</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -353,13 +353,13 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "[This note has been updated several times since the first publication of "
@@ -370,7 +370,7 @@
msgstr ""
"Esta nota foi atualizada várias vezes desde a primeira publicação da
estória."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The right to read is a battle being fought today. Although it may take "
@@ -406,7 +406,7 @@
"de uma cópia do DeCSS, um programa livre para decodificar vÃdeo em um DVD,
é "
"considerada crime."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -417,7 +417,7 @@
"these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -428,14 +428,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -444,7 +444,7 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -471,7 +471,7 @@
"DRM é o motivo pelo qual iniciamos a campanha <a href=\"http://www."
"defectivebydesign.org/\"><em>Defective by Design</em></a>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "One of the ideas in the story was not proposed in reality until 2002. "
@@ -486,14 +486,14 @@
"de que o FBI e a Microsoft teriam a senha de administrador (<cite>root</"
"cite>) dos computadores pessoais e não permitiriam que você a tivesse."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
"into use, it is called “secure boot”."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -519,7 +519,7 @@
"<cite>web site</cite> que coopere com ela) tenha o controle final sobre o "
"que o usuário possa fazer com o seu computador."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -528,7 +528,7 @@
"control. We call this <em>restricted boot</em>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "When this story was first written, the SPA was threatening small Internet "
@@ -554,7 +554,7 @@
"exigência e foi processado. Mais tarde, o SPA desistiu desse processo, mas "
"conseguiu o DMCA, que lhes deu o poder que buscavam."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The SPA, which actually stands for Software Publishers Association, has "
@@ -582,7 +582,7 @@
"ameaças levemente veladas de que as pessoas que compartilhassem software "
"poderiam ser violentadas."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -592,7 +592,7 @@
"imaginárias. Por exemplo, um computador numa universidade na área de
Chigago "
"mostra a seguinte mensagem quando você efetua o <cite>login</cite>:"
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -617,7 +617,7 @@
"a administração poderá fornecer a evidência de tais atividades para "
"autoridades da Universidade e/ou oficiais da lei."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -626,11 +626,11 @@
"EUA]: pressionar quase todas as pessoas a concordarem, antecipadamente, a "
"abdicar de seus direitos sob a mesma."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "Más notÃcias"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The battle for the right to read is already in progress, The enemy is "
@@ -646,7 +646,7 @@
"artigos sobre as coisas ruins que vêm acontecendo desde a publicação "
"original deste artigo:"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -657,31 +657,31 @@
"for rejecting the product completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -693,7 +693,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "If we want to stop the bad news and create some good news, we need to "
@@ -716,11 +716,11 @@
"href=\"http://www.fsf.org/associate\">junte-se à FSF</a> para ajudar a "
"financiar nosso trabalho."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Referências"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -732,7 +732,7 @@
"a>] and the National Information Infrastructure: The Report of the Working "
"Group on Intellectual Property [sic] Rights (1995)."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -742,7 +742,7 @@
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
"Wired, Jan. 1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -750,7 +750,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -760,7 +760,7 @@
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
"Private Data</a>, Washington Post, 4 Nov 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.public-domain.org/\">Union for the Public Domain</"
@@ -775,26 +775,16 @@
"Uma nova organização que pretende resistir e reverter a extensão exagerada
"
"dos poderes dos direitos autorais e patentes."
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Este artigo foi publicado em <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "Outros textos para ler"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">Filosofia do Projeto GNU</a>"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.computerworld.com/s/article/49358/"
@@ -809,6 +799,16 @@
"Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\"> Proteção Contra
Cópia: "
"Apenas Diga Não</a>, publicado na revista Computer World."
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Este artigo foi publicado em <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/right-to-read.ru-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ru-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- po/right-to-read.ru-en.html 18 Oct 2016 16:29:50 -0000 1.34
+++ po/right-to-read.ru-en.html 6 Nov 2016 21:28:15 -0000 1.35
@@ -3,30 +3,60 @@
<title>The Right to Read
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+ margin: 0;
+}
+#AuthorsNote li p {
+ margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block {
+ margin-top: 0;
+ }
+ #AuthorsNote .columns p.emph-box {
+ margin: .5em 6%;
+ }
+}
--></style>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<h2 class="center">The Right to Read</h2>
-<p>
+<p class="byline center">
by <a href="http://www.stallman.org/"><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
<em>This article appeared in the February 1997 issue
of <cite>Communications of the ACM</cite> (Volume 40, Number
2).</em></p>
-<hr />
+<hr class="thin" />
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<div class="columns">
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -62,7 +92,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -106,7 +139,10 @@
knowing your computer's root password. And neither
the FBI nor
Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -143,7 +179,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
+<div class="columns">
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -153,6 +192,7 @@
to Luna, where they found others who had likewise gravitated away from
the long arm of the SPA. When the Tycho Uprising began in 2062, the
universal right to read soon became one of its central aims.</p>
+</div>
<div class="announcement">
<blockquote>
@@ -163,35 +203,46 @@
<div id="AuthorsNote">
<h3>Author's Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the unjust forces that use “pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it forwards into something more visibly
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+</p>
+</div>
+<div class="column-limit"></div>
</li>
<li>
+<div class="reduced-width">
<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
<p>The Electronic Frontier Foundation, a separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div>
</li>
+</ul>
-<li>
+<blockquote class="info center">
<p>The following note has been updated several times since the first
publication of the story.</p>
+</blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns">
<p>
The battle for the right to read is already being fought. Although it
may take 50 years for our past freedoms to fade into obscurity, most
@@ -228,15 +279,20 @@
Even the World Wide Web Consortium has fallen under the shadow of the
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which lead to the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
+<p class="inline-block">
With Windows Vista, Microsoft admitted it had built in a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
@@ -244,7 +300,12 @@
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the FBI and Microsoft will keep the
@@ -274,7 +335,12 @@
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns">
<p>
In 1997, when this story was first published, the SPA was
threatening small Internet service providers, demanding they permit
@@ -293,7 +359,12 @@
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width">
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -315,12 +386,15 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
+</div>
</li>
</ul>
+<div class="column-limit"></div>
</div>
<h3 id="BadNews">Bad News</h3>
+<div class="columns">
<p>
The battle for the right to read is going against us so far.
The enemy is organized, and we are not.
@@ -344,10 +418,10 @@
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon can remotely erase any book.
+<li><p class="inline-block">It has a back door with which Amazon can remotely
erase any book.
In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
-<li><p>In case all that isn't Orwellian enough, there is a universal
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is
a universal
back door with which Amazon can remotely change the software, and
introduce any other form of nastiness.</p></li>
</ul>
@@ -369,6 +443,7 @@
our work more generally. There is also a <a href="/help/help.html">list of
ways
to participate in our work</a>.
</p>
+</div>
<h3 id="References">References</h3>
@@ -394,13 +469,7 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
-<blockquote id="fsfs"><p class="big">This essay is published
-in <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Other Texts to Read</h5>
+<h4>Other Texts to Read</h4>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -409,6 +478,13 @@
id="copy-protection">Copy Protection: Just Say No</a>,
published in Computer World.</li>
</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -467,7 +543,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ru.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- po/right-to-read.ru.po 18 Oct 2016 16:29:50 -0000 1.63
+++ po/right-to-read.ru.po 6 Nov 2016 21:28:15 -0000 1.64
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-09-02 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -40,7 +40,7 @@
"<em>ÐÑа ÑÑаÑÑÑ Ð¿Ð¾ÑвилаÑÑ Ð² ÑевÑалÑÑком
(1997 года) вÑпÑÑке "
"<cite>Communications of the ACM</cite> (Ñом 40, Ð½Ð¾Ð¼ÐµÑ 2).</em>"
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -48,7 +48,7 @@
"Ðз <cite>ÐоÑоги к ТиÑ
о</cite>, ÑбоÑника ÑÑаÑей о
ÑобÑÑиÑÑ
, пÑедÑеÑÑвовавÑиÑ
"
"ÐÑнной ÑеволÑÑии, опÑбликованного в
ÐÑна-СиÑи в 2096 годÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -60,7 +60,7 @@
"еÑли Ð±Ñ Ð¾Ð½Ð° не Ñмогла найÑи дÑÑгой, она
завалила Ð±Ñ ÑÐ²Ð¾Ñ ÐºÑÑÑовÑÑ ÑабоÑÑ. "
"Ðна не оÑмеливалаÑÑ Ð¿ÑоÑиÑÑ Ð½Ð¸ÐºÐ¾Ð³Ð¾, кÑоме
Ðана."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -76,7 +76,7 @@
"пÑиводила его в ÑжаÑ. Ðго, как и вÑеÑ
, Ñ
наÑалÑной ÑÐºÐ¾Ð»Ñ ÑÑили, ÑÑо "
"обмениваÑÑÑÑ ÐºÐ½Ð¸Ð³Ð°Ð¼Ð¸ гадко и
пÑоÑивно — Ñак делаÑÑ ÑолÑко пиÑаÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -97,7 +97,7 @@
"Ð²Ð»Ð°Ð´ÐµÐ»ÐµÑ ÐºÐ¾Ð¼Ð¿ÑÑÑеÑа полÑÑил Ð±Ñ Ñамое
ÑÑÑогое наказание — за Ñо, "
"ÑÑо не побеÑпокоилÑÑ Ð¿ÑедоÑвÑаÑиÑÑ
пÑеÑÑÑпление."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -120,7 +120,7 @@
"наÑÑнÑе ÑÑаÑÑи, еÑли на ниÑ
бÑдÑÑ ÑаÑÑо
ÑÑÑлаÑÑÑÑ, пÑинеÑÑÑ Ð´Ð¾ÑÑаÑоÑно "
"денег, ÑÑÐ¾Ð±Ñ Ð²ÐµÑнÑÑÑ Ð´Ð¾Ð»Ð³.)"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -137,7 +137,7 @@
"доÑÑÑп. Ð 2047 Ð³Ð¾Ð´Ñ Ð¿ÑблиÑнÑе библиоÑеки
Ñо ÑвободнÑм доÑÑÑпом к "
"наÑÑной лиÑеÑаÑÑÑе ÑÑали ÑмÑÑнÑм
воÑпоминанием."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -156,7 +156,7 @@
"Ð 2047 Ð³Ð¾Ð´Ñ Ð¤Ñенк Ñидел в ÑÑÑÑме — не
за пиÑаÑÑкое ÑÑение, а "
"за Ñо, ÑÑо Ñ Ð½ÐµÐ³Ð¾ бÑл оÑладÑик."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -172,7 +172,7 @@
"ÑÑо ÑÑало иÑ
оÑновнÑм пÑименением в
ÑеалÑной пÑакÑике. ÐÑо знаÑило, ÑÑо они "
"незаконнÑ; ÑеÑ
, кÑо ÑазÑабаÑÑвал
оÑладÑики, оÑпÑавили в ÑÑÑÑмÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -186,7 +186,7 @@
"пÑогÑаммиÑованиÑ, деÑжали в ÑпеÑиалÑном
окÑÑжении, Ñак ÑÑо им можно бÑло "
"полÑзоваÑÑÑÑ ÑолÑко Ð´Ð»Ñ ÑÑебнÑÑ
ÑпÑажнений."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It was also possible to bypass the copyright monitors by installing a "
"modified system kernel. Dan would eventually find out about the free "
@@ -204,7 +204,7 @@
"Ð´Ð»Ñ Ñвоего компÑÑÑеÑа. Рего ÑÑ Ð½Ðµ Ñзнал бÑ
ни Ð¾Ñ Ð¤ÐÐ , ни Ð¾Ñ ÑлÑÐ¶Ð±Ñ "
"поддеÑжки Microsoft."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -216,7 +216,7 @@
"Ñаз, когда он говоÑил Ñ Ð½ÐµÐ¹, он
пеÑеполнÑлÑÑ Ð²Ð¾ÑÑоÑгом. Ð Ñаз она
попÑоÑила "
"о помоÑи именно его, ÑÑо могло ознаÑаÑÑ,
ÑÑо и она его лÑбиÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -230,7 +230,7 @@
"бÑло пÑеÑÑÑплением, но SPA не Ñзнал Ð±Ñ Ð¾Ð±
ÑÑом авÑомаÑиÑеÑки. Ðни Ñзнали бÑ, "
"ÑолÑко еÑли Ð±Ñ ÐелиÑÑа донеÑла на него."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -250,7 +250,7 @@
"поведениÑ. Ðни ÑÑиÑали ÑÑо пÑизнаком Ñого,
ÑÑо ÑÑ ÑовеÑÑал какие-Ñо дÑÑгие "
"запÑеÑеннÑе дейÑÑвиÑ, и иÑ
не оÑенÑ
инÑеÑеÑовало, какие именно."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -260,7 +260,7 @@
"бÑквалÑно за ÑÑо. ÐмеÑÑо ÑÑого им
закÑÑвали доÑÑÑп к вÑÑиÑлиÑелÑнÑм
ÑиÑÑемам "
"ÑÑилиÑа, а без ÑÑого бÑло ÑовеÑÑенно
невозможно пÑодолжаÑÑ Ð»ÑбÑе занÑÑиÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -274,7 +274,7 @@
"ÑÑÑденÑов по-дÑÑгомÑ: они наказÑвали за
Ñо, ÑÑо бÑло вÑедно, а не за Ñо, ÑÑо "
"пÑоÑÑо вÑзÑвало подозÑениÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -294,7 +294,7 @@
"доÑÑаÑÑ. Ðогда в 2062 Ð³Ð¾Ð´Ñ Ð½Ð°ÑалоÑÑ
воÑÑÑание в ТиÑ
о, вÑеобÑее пÑаво "
"пÑоÑеÑÑÑ Ð±ÑÑÑÑо ÑÑало одной из его
оÑновнÑÑ
Ñелей."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list "
"about the dangers of e-books</a>."
@@ -302,11 +302,11 @@
"<a
href=\"http://defectivebydesign.org/ebooks.html\">ÐÑиÑоединÑйÑеÑÑ
к "
"наÑÐµÐ¼Ñ ÑпиÑÐºÑ ÑаÑÑÑлки об опаÑноÑÑÑÑ
ÑлекÑÑоннÑÑ
книг</a>."
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr "ÐÑимеÑÐ°Ð½Ð¸Ñ Ð°Ð²ÑоÑа"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -322,7 +322,7 @@
"попÑÑалÑÑ ÑазвиÑÑ Ð¼ÑÑлÑ, ÑÑÐ¾Ð±Ñ ÑÑо
вÑглÑдело еÑе более жеÑÑко. См. “<a "
"href=\"/philosophy/words-to-avoid.html#Piracy\">пиÑаÑÑÑво</a>”."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -337,7 +337,7 @@
"пÑогÑаммного обеÑпеÑÐµÐ½Ð¸Ñ Ð¾Ñганизовал
ÐºÐ°Ð¼Ð¿Ð°Ð½Ð¸Ñ <a href=\"http://"
"DefectiveByDesign.org\">ÐеÑÐµÐºÑ Ð³Ð°ÑанÑиÑован</a>. ÐÑ
пÑоÑим Ð²Ð°Ñ Ð¾ поддеÑжке."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
@@ -346,7 +346,7 @@
"Ñвободного пÑогÑаммного обеÑпеÑениÑ,
Ñакже вÑÑÑÑÐ¿Ð°ÐµÑ Ð¿ÑоÑив ÑиÑÑового "
"ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The following note has been updated several times since the first "
"publication of the story."
@@ -354,7 +354,7 @@
"СледÑÑÑее пÑимеÑание Ñо вÑемени пеÑвой
пÑбликаÑии ÑаÑÑказа неÑколÑко Ñаз "
"обновлÑлоÑÑ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The battle for the right to read is already being fought. Although it may "
"take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -376,7 +376,7 @@
"ÐвÑопейÑкий ÑоÑз наложил ÑÑ
однÑе
огÑаниÑÐµÐ½Ð¸Ñ Ð² диÑекÑиве 2001 года об "
"авÑоÑÑком пÑаве, но далеко не в Ñакой
жеÑÑкой ÑоÑме."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -396,7 +396,7 @@
"одно из неÑпÑаведливÑÑ
пÑавил, коÑоÑÑе
ÑÑи договоÑÑ Ð½Ð°Ð²ÑзÑваÑÑ Ð²Ð¾ многиÑ
"
"ÑÑеÑаÑ
деÑÑелÑноÑÑи."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -414,7 +414,7 @@
"навÑзал Ð±Ñ Ð¿Ð¾Ð´Ð¾Ð±Ð½Ñе же пÑÑÑ ÐвÑопе. ÐÑе
ÑÑи договоÑÑ Ð½Ñжно пÑедоÑвÑаÑиÑÑ Ð¸Ð»Ð¸ "
"оÑмениÑÑ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
@@ -424,7 +424,7 @@
"он движеÑÑÑ Ðº одобÑÐµÐ½Ð¸Ñ ÑиÑÑÐµÐ¼Ñ ÑиÑÑового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми как "
"оÑиÑиалÑной ÑаÑÑи ÑпеÑиÑикаÑий ÐÑемиÑной
паÑÑинÑ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -438,7 +438,7 @@
"\">неÑвободной пÑогÑамме никогда нелÑзÑ
довеÑÑÑÑ</a>. ÐÑ Ð½Ð°ÑÑаиваем "
"иÑклÑÑиÑелÑно на ÑвободнÑÑ
пÑогÑаммаÑ
и
оÑвеÑгаем неÑвободнÑе."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"With Windows Vista, Microsoft admitted it had built in a back door: "
"Microsoft can use it to forcibly install software “upgrades,” "
@@ -456,7 +456,7 @@
"ÑиÑÑовое ÑпÑавление огÑаниÑениÑми, Ñ
коÑоÑÑм полÑзоваÑели не ÑмогÑÑ "
"ÑпÑавиÑÑÑÑ. Windows 10, конеÑно, не лÑÑÑе."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"One of the ideas in the story was not proposed in reality until 2002. This "
"is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -467,7 +467,7 @@
"админиÑÑÑаÑоÑа ваÑиÑ
пеÑÑоналÑнÑÑ
компÑÑÑеÑов и не допÑÑÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¾Ð½Ð¸ бÑли "
"Ñ Ð²Ð°Ñ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
@@ -478,7 +478,7 @@
"ÑÑеÑе ÑÑали пÑименÑÑÑ Ð½Ð° пÑакÑике,
назÑваеÑÑÑ “безопаÑной "
"загÑÑзкой”."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"What Microsoft keeps is not exactly a password in the traditional sense; no "
"person ever types it on a terminal. Rather, it is a signature and "
@@ -500,7 +500,7 @@
"\">показÑÐ²Ð°ÐµÑ ÐÐРнедоÑеÑÑ Ð² заÑиÑе Windows</a>,
ÑÑÐ¾Ð±Ñ Ð°Ð³ÐµÐ½ÑÑÑво иÑ
"
"ÑкÑплÑаÑиÑовало."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -515,7 +515,7 @@
"дÑÑгÑÑ Ð¾Ð¿ÐµÑаÑионнÑÑ ÑиÑÑÐµÐ¼Ñ (ÑакÑÑ ÐºÐ°Ðº
GNU/Linux), опÑеделÑÐµÑ Microsoft. ÐÑ "
"назÑваем ÑÑо <em>огÑаниÑенной загÑÑзкой</em>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"In 1997, when this story was first published, the SPA was threatening small "
"Internet service providers, demanding they permit the SPA to monitor all "
@@ -533,7 +533,7 @@
"ÐпоÑледÑÑвии SPA оÑказалаÑÑ Ð¾Ñ
пÑеÑледованиÑ, но DMCA дал ей влаÑÑÑ, коÑоÑой "
"она добивалаÑÑ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The SPA, which actually stands for Software Publishers Association, has been "
"replaced in its police-like role by the Business Software Alliance. The BSA "
@@ -553,7 +553,7 @@
"годÑ, вÑдвигалиÑÑ Ñлегка пÑикÑÑÑÑе ÑгÑозÑ
наÑÐ¸Ð»Ð¸Ñ Ð² ÑÑÑÑме над лÑдÑми, "
"обменивавÑимиÑÑ Ð¿ÑогÑаммами."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -563,7 +563,7 @@
"ÐапÑимеÑ, компÑÑÑÐµÑ Ð¾Ð´Ð½Ð¾Ð³Ð¾ из
ÑнивеÑÑиÑеÑов в Ñайоне Чикаго
демонÑÑÑиÑовал "
"пÑи вÑ
оде в ÑиÑÑÐµÐ¼Ñ Ñакое ÑообÑение:"
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -590,7 +590,7 @@
"ÑÑководÑÑÐ²Ñ Ð£Ð½Ð¸Ð²ÐµÑÑиÑеÑа и/или
должноÑÑнÑм лиÑам, в обÑзанноÑÑи коÑоÑÑÑ
"
"вÑ
Ð¾Ð´Ð¸Ñ Ð¾Ñ
Ñана пÑавопоÑÑдка."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -599,11 +599,11 @@
"давление, ÑÑÐ¾Ð±Ñ Ð¾Ð½Ð¸ заÑанее ÑоглаÑалиÑÑ
оÑказаÑÑÑÑ Ð¾Ñ ÑвоиÑ
пÑав, "
"пÑедоÑÑавлÑемÑÑ
ÑÑой попÑавкой."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "ÐлоÑ
ие новоÑÑи"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The battle for the right to read is going against us so far. The enemy is "
"organized, and we are not."
@@ -611,7 +611,7 @@
"ÐиÑÐ²Ñ Ð·Ð° пÑаво пÑоÑеÑÑÑ Ð¼Ñ Ð¿Ð¾ÐºÐ°
пÑоигÑÑваем. ÐÑаг оÑганизован, а Ð¼Ñ "
"— неÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -631,7 +631,7 @@
"html\">оÑÑÑлловÑкиÑ
ÑеÑÑ</a>. ÐÑбой из ниÑ
доÑÑаÑоÑно, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»Ð½Ð¾ÑÑÑÑ "
"оÑказаÑÑÑÑ Ð¾Ñ ÑÑого пÑодÑкÑа:"
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
@@ -641,13 +641,13 @@
"и какÑÑ ÑÑÑаниÑÑ ÑиÑÐ°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелÑ,
докладÑваеÑ, когда полÑзоваÑÐµÐ»Ñ "
"подÑеÑÐºÐ¸Ð²Ð°ÐµÑ ÑекÑÑ Ð¸ обо вÑеÑ
замеÑкаÑ
,
коÑоÑÑе Ð²Ð²Ð¾Ð´Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелÑ."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
"Рнем еÑÑÑ ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми, пÑедназнаÑенное Ð´Ð»Ñ Ñого, "
"ÑÑÐ¾Ð±Ñ Ð½Ðµ даÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑм обмениваÑÑÑÑ
копиÑми."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
@@ -656,7 +656,7 @@
"ÑеÑи. Ð 2009 Ð³Ð¾Ð´Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑÑеÑла
ÑÑÑÑÑи копий <cite>1984</cite> "
"ÐжоÑджа ÐÑÑÑлла."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
@@ -666,7 +666,7 @@
"Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÐºÐ¾ÑоÑой Amazon Ð¼Ð¾Ð¶ÐµÑ Ð¸Ð·Ð¼ÐµÐ½ÑÑÑ
пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾ ÑеÑи, Ð²Ð²Ð¾Ð´Ñ ÐºÐ°ÐºÐ¾Ð³Ð¾ "
"Ñгодно Ñода гадоÑÑи."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -687,7 +687,7 @@
"Таким обÑазом, Ñ Ð¾ÑказÑваÑÑÑ Ð¸Ð´Ñи на Ñакие
конÑÑакÑÑ — в "
"оÑноÑении пÑогÑамм, ÑлекÑÑоннÑÑ
книг,
мÑзÑки или Ñего Ð±Ñ Ñо ни бÑло еÑе."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we want to stop the bad news and create some good news, we need to "
"organize and fight. Subscribe to the FSF's <a href=\"http://"
@@ -702,11 +702,11 @@
"a>”, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð¼Ð¾ÑÑ. ÐÑÑÑ Ñакже <a
href=\"/help/help.html\">ÑпиÑок "
"ÑпоÑобов пÑинÑÑÑ ÑÑаÑÑие в наÑей
ÑабоÑе</a>."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "СÑÑлки"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -719,7 +719,7 @@
"РабоÑей гÑÑÐ¿Ð¿Ñ Ð¿Ð¾ пÑавам
инÑеллекÑÑалÑной ÑобÑÑвенноÑÑи [Ñак]
(1995 "
"год)."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -729,7 +729,7 @@
"\">ÐоÑÑнение к Ðелой книге: ÐлеÑнÑ
авÑоÑÑкого пÑава</a>. Ðамела СамÑÑлÑÑон, "
"“УайеÑед”, ÑнваÑÑ 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -737,7 +737,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Ð
аÑпÑодано</a>. "
"ÐÐ¶ÐµÐ¹Ð¼Ñ ÐойлÑ, “ÐÑÑ-ÐоÑк Ñаймє
31 маÑÑа 1996 года."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -748,7 +748,7 @@
"даннÑе и лиÑнÑе даннÑе</a>. “ÐаÑингÑон
поÑÑ”, 4 ноÑбÑÑ "
"1996 года."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"https://web.archive.org/web/20151113122141/http://public-domain."
"org/\">Union for the Public Domain</a>—an organization which aims to "
@@ -759,27 +759,17 @@
"коÑоÑой ÑвлÑеÑÑÑ Ð¿ÑедоÑвÑаÑение и оÑмена
ÑÑезмеÑного ÑÑÐ¸Ð»ÐµÐ½Ð¸Ñ Ð°Ð²ÑоÑÑкого "
"пÑава и паÑенÑов."
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"ÐÑÐ¾Ñ Ð¾ÑеÑк пÑбликÑеÑÑÑ Ð² ÑбоÑнике <a
href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>СвободнÑе пÑогÑаммÑ,
Ñвободное обÑеÑÑво: "
-"избÑаннÑе оÑеÑки РиÑаÑда Ð.
СÑолмена</cite></a>"
-
# type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "ÐÑÑгие ÑекÑÑÑ Ð¿Ð¾ Ñеме"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">ФилоÑоÑиÑ
пÑоекÑа GNU</a>"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.computerworld.com/article/2596679/networking/copy-"
"protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -790,6 +780,16 @@
"пÑоÑÑо ÑкажиÑе “неє</a>,
опÑбликовано в “ÐомпÑÑÑÐµÑ "
"ÑоÑлд”."
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"ÐÑÐ¾Ñ Ð¾ÑеÑк пÑбликÑеÑÑÑ Ð² ÑбоÑнике <a
href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>СвободнÑе пÑогÑаммÑ,
Ñвободное обÑеÑÑво: "
+"избÑаннÑе оÑеÑки РиÑаÑда Ð.
СÑолмена</cite></a>"
+
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
Index: po/right-to-read.sr.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.sr.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- po/right-to-read.sr.po 18 Oct 2016 16:29:50 -0000 1.47
+++ po/right-to-read.sr.po 6 Nov 2016 21:28:15 -0000 1.48
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2009-10-17 19:01+0200\n"
"Last-Translator: Nikola Smolenski <address@hidden>\n"
"Language-Team: <address@hidden>\n"
@@ -50,7 +50,7 @@
"издаÑÑ Ð¾Ð´ ÑебÑÑаÑа 1997. (Ñом 40, бÑÐ¾Ñ 2).</em>"
# type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -59,7 +59,7 @@
"ÑеволÑÑиÑе, обÑавÑене Ñ ÐÑна СиÑиÑÑ 2096."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -72,7 +72,7 @@
"кога би Ñе ÑÑÑдила да пиÑа, оÑим Ðана."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -89,7 +89,7 @@
"— неÑÑо ÑÑо би Ñамо пиÑаÑи Ñадили."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -110,7 +110,7 @@
"добио наÑÑÐµÐ¶Ñ ÐºÐ°Ð·Ð½Ñ — због
непÑедÑзимаÑа ниÑега да ÑпÑеÑи злоÑин."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -132,7 +132,7 @@
"ÑеÑÑо бÑÐ´Ñ Ð½Ð°Ð²Ð¾Ñени, донеÑи довоÑно да би
могао да оÑплаÑи Ð¾Ð²Ð°Ñ Ð´Ñг.)"
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -149,7 +149,7 @@
"наÑÑÐ½Ð¾Ñ Ð»Ð¸ÑеÑаÑÑÑи ÑÑ Ð±Ð¸Ð»Ðµ Ñамо бледа
ÑÑпомена."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -169,7 +169,7 @@
"ÑиÑаÑа, Ð²ÐµÑ Ð·Ð±Ð¾Ð³ поÑедоваÑа дебагеÑа."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -187,7 +187,7 @@
"били поÑлаÑи Ñ Ð·Ð°ÑвоÑ."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -201,7 +201,7 @@
"Ñако да Ñе могао коÑиÑÑиÑи Ñамо за
ÑÑÑденÑÑке вежбе."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "It was also possible to bypass the copyright monitors by installing a "
@@ -230,7 +230,7 @@
"ÐаÑкÑоÑоÑÑова подÑÑка Ñи не би Ñекли Ñако
неÑÑо."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -243,7 +243,7 @@
"могло знаÑиÑи да Ñе и она волела Ñега."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -258,7 +258,7 @@
"Ñега. Ðедини наÑин да ÑазнаÑÑ Ð±Ð¸Ð¾ би да га
Ðиза пÑиÑави."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -278,7 +278,7 @@
"забÑаÑено, и ниÑÑ Ð¼Ð¾Ñали да знаÑÑ ÑÑа."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -289,7 +289,7 @@
"и неизбежно би пали иÑпиÑе из ÑвиÑ
ÑвоÑиÑ
пÑедмеÑа."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -303,7 +303,7 @@
"акÑивноÑÑи коÑе ÑÑ Ð±Ð¸Ð»Ðµ ÑÑеÑне, не оне
коÑе ÑÑ Ð±Ð¸Ð»Ðµ Ñамо ÑÑмÑиве."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -323,20 +323,20 @@
"поÑео 2062, ÑнивеÑзално пÑаво на ÑиÑаÑе
поÑÑало Ñе Ñедан од ÑеговиÑ
оÑновниÑ
"
"ÑиÑева."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list "
"about the dangers of e-books</a>."
msgstr ""
# type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
#, fuzzy
#| msgid "Author's Note"
msgid "Author's Notes"
msgstr "ÐÑÑоÑова белеÑка"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -346,7 +346,7 @@
"philosophy/words-to-avoid.html#Piracy\">“Piracy”</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -355,14 +355,14 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid "This note was updated in 2007."
msgid ""
@@ -371,7 +371,7 @@
msgstr "[Ðва белеÑка Ñе оÑвежена 2007.]"
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The right to read is a battle being fought today. Although it may take "
@@ -408,7 +408,7 @@
"СÑбиÑи и ЦÑÐ½Ð¾Ñ ÐоÑи, ово Ñе обезбеÑено
Ñлановима 180 и 187 Ðакона о "
"аÑÑоÑÑком и ÑÑодним пÑавима из 2004. —
пÑев.]"
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -419,7 +419,7 @@
"these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -430,14 +430,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -447,7 +447,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -470,7 +470,7 @@
"заобиÑÑ."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "One of the ideas in the story was not proposed in reality until 2002. "
@@ -485,7 +485,7 @@
"идеÑа да Ñе ФÐРи ÐаÑкÑоÑоÑÑ ÑÑваÑи
оÑновне [<em>root</em>] лозинке за Ð²Ð°Ñ "
"лиÑни ÑаÑÑнаÑ, и неÑе вам дозволиÑи да иÑ
имаÑе."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
@@ -493,7 +493,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -519,7 +519,7 @@
"ÐаÑкÑоÑоÑÑом, конаÑÐ½Ñ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ оним
ÑÑо коÑиÑник може да Ñади на Ñвом "
"ÑаÑÑнаÑÑ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -529,7 +529,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "When this story was first written, the SPA was threatening small Internet "
@@ -556,7 +556,7 @@
"ÑÑо им Ñе дало Ð¼Ð¾Ñ ÐºÐ¾Ñи ÑÑ ÑÑажили."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The SPA, which actually stands for Software Publishers Association, has "
@@ -584,7 +584,7 @@
"Ñиловани."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The university security policies described above are not imaginary. For "
@@ -600,7 +600,7 @@
"поÑÑÐºÑ ÐºÐ°Ð´Ð° Ð¼Ñ Ð¿ÑиÑÑÑпиÑе (наводниÑи ÑÑ Ñ
оÑигиналÑ):"
# type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -625,7 +625,7 @@
"полиÑиÑи."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -633,11 +633,11 @@
"Ðво Ñе веома занимÑив пÑиÑÑÑп ЧеÑвÑÑом
Ð°Ð¼Ð°Ð½Ð´Ð¼Ð°Ð½Ñ Ð£ÑÑава СÐÐ: ÑеÑаÑи ÑкоÑо "
"Ñваког да пÑиÑÑане, ÑнапÑед, да Ñе одÑекне
ÑвоÑиÑ
пÑава коÑа им он даÑе."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The <a href=\"#AuthorsNote\">author's note</a> talks about the battle for "
@@ -653,7 +653,7 @@
"ÑланÑима о ÑеÑ
нологиÑама коÑе Ñе ÑпÑаво
ÑазвиÑаÑÑ Ð´Ð° би вам ÑÑкÑаÑиле пÑаво "
"на ÑиÑаÑе."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -664,31 +664,31 @@
"for rejecting the product completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -700,7 +700,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we want to stop the bad news and create some good news, we need to "
"organize and fight. Subscribe to the FSF's <a href=\"http://"
@@ -711,12 +711,12 @@
msgstr ""
# type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "РеÑеÑенÑе"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "The administration's “White Paper”: Information "
@@ -734,7 +734,7 @@
"em>: извеÑÑÐ°Ñ Ð Ð°Ð´Ð½Ðµ гÑÑпе за пÑава на
инÑелекÑÑÐ°Ð»Ð½Ñ ÑвоÑÐ¸Ð½Ñ (1995)."
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -745,7 +745,7 @@
"СамÑÑелÑон, ÐаÑÑд, Ñан. 1996."
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -753,7 +753,7 @@
"<em><a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a></"
"em>, ÐеÑÐ¼Ñ ÐоÑл, ÐÑÑоÑк ÑаÑмÑ, 31. маÑÑ 1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -764,7 +764,7 @@
"\">Public Data or Private Data</a></em>, ÐаÑингÑон поÑÑ, 4.
Ð½Ð¾Ð²ÐµÐ¼Ð±Ð°Ñ 1996."
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.public-domain.org/\">Union for the Public Domain</"
@@ -779,30 +779,19 @@
"a></em> â оÑганизаÑиÑа ÑиÑи Ñе ÑÐ¸Ñ Ð¾ÑÐ¿Ð¾Ñ Ð¸
пÑеокÑеÑаÑе пÑекомеÑног пÑоÑиÑеÑа "
"аÑÑоÑÑкиÑ
пÑава и паÑенÑниÑ
моÑи."
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"ÐÐ²Ð°Ñ ÐµÑÐµÑ Ñе обÑавÑен Ñ Ð·Ð±Ð¸ÑÑи â<a
href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Слободан ÑоÑÑвеÑ,
Ñлободно дÑÑÑÑво: изабÑани "
-"еÑеÑи РиÑаÑда Ð. СÑолмана</cite></a>â."
-
# type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "ÐÑÑали ÑекÑÑови за ÑиÑаÑе"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">ФилозоÑиÑа
пÑоÑекÑа ÐÐУ</a>"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.computerworld.com/s/article/49358/"
@@ -817,6 +806,17 @@
"Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">Copy Protection: Just "
"Say No</a></em>, ÐбÑавÑено Ñ ÐомпÑÑÑÐµÑ Ð²Ð¾ÑлдÑ."
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"ÐÐ²Ð°Ñ ÐµÑÐµÑ Ñе обÑавÑен Ñ Ð·Ð±Ð¸ÑÑи â<a
href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Слободан ÑоÑÑвеÑ,
Ñлободно дÑÑÑÑво: изабÑани "
+"еÑеÑи РиÑаÑда Ð. СÑолмана</cite></a>â."
+
# type: Content of: <div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
Index: po/right-to-read.sv.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.sv.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/right-to-read.sv.po 18 Oct 2016 16:29:51 -0000 1.13
+++ po/right-to-read.sv.po 6 Nov 2016 21:28:15 -0000 1.14
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: web-translators <address@hidden>\n"
@@ -43,7 +43,7 @@
"<em>Denna artikel fanns i februari numret 1997 av <strong>âCommunications
of "
"the ACMâ</strong> (Ã¥rgÃ¥ng 40, Nummer 2).</em>"
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -51,7 +51,7 @@
"(frÃ¥n âVägen till Tychoâ, en kollektion av artiklar om föregÃ¥ngarna
till den "
"Lunariska revolutionen, publicerad i Luna City år 2096)"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -63,7 +63,7 @@
"låna en annan, så skulle hon inte klara sitt skolprojekt. Det fanns ingen "
"hon vågade fråga, förutom Danne."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -79,7 +79,7 @@
"sig sen barnsben att dela med sig av böcker var fel - någonting bara
pirater "
"gör."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -100,7 +100,7 @@
"datorägare, skulle få ett hårt straff för att inte ha vidtagit åtgärder
för "
"att förhindra brott."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -123,7 +123,7 @@
"framtida forskning skulle generera rapporter nog för att betala tillbaks "
"studielånen)."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -139,7 +139,7 @@
"ideella förläggare börjat ta betalt för access. Vid 2047 så var fri
access "
"för elever bara blott ett minne."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -158,7 +158,7 @@
"lätt till angiveri). Ã
r 2047 satt Frasse i fängelse, inte för
piratläsning, "
"utan för innehav av en debugger."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -175,7 +175,7 @@
"praktiken det vanliga användningsområdet. Av detta följde att de var "
"olagliga, senare skickades utvecklare av sådana verktyg i fängelse."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -187,7 +187,7 @@
"kontraktsbundna programmerare. Den debugger Danne använde på
datavetenskapen "
"hölls bakom en brandvägg så att den bara kunde användas för
skoluppgifter."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "It was also possible to bypass the copyright monitors by installing a "
@@ -214,7 +214,7 @@
"man kan inte ens installera ett om man hade ett, utan att veta om datorns "
"hÃ¥rdvaru-lösenord, vilket varken SÃPO eller Microsofts support talar om."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -227,7 +227,7 @@
"frågade just honom om hjälp, kunde ju betyda att det kanske var ömsesidig "
"kärlek."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -241,7 +241,7 @@
"han som läste och inte hon. Det var fortfarande ett brott, men MSM skulle "
"inte automatiskt få reda på det. Detta om inte Lisa angav honom."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -260,7 +260,7 @@
"för administrationen att övervaka. Det förutsattes att man gjorde
någonting "
"förbjudet och de behövde inte veta exakt vad."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -270,7 +270,7 @@
"blev de utestängda från skolans datorer och datorsystem, och skulle "
"ofrånkomligen kugga på alla ämnen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -283,7 +283,7 @@
"hade skolorna ett annat förhållningssätt till disciplin; de bestraffade "
"skadliga aktiviteter, inte de som bara väckte misstanke."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -302,19 +302,19 @@
"flyttat ifrån MSMs långa arm. När senare Tycho-upproret började 2062, så
var "
"allas rätt att läsa en av dess centrala mål."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list "
"about the dangers of e-books</a>."
msgstr ""
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
#, fuzzy
#| msgid "Author's Note"
msgid "Author's Notes"
msgstr "Författarens noteringar"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -324,7 +324,7 @@
"philosophy/words-to-avoid.html#Piracy\">“Piracy”</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -333,13 +333,13 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid "This note was updated in 2002."
msgid ""
@@ -347,7 +347,7 @@
"publication of the story."
msgstr "Dessa noteringar uppdaterades 2002."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The right to read is a battle being fought today. Although it may take "
@@ -377,7 +377,7 @@
"data). Den europeiska unionen införde liknande begränsningar 2001 i ett "
"upphovsrättsdirektiv."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -388,7 +388,7 @@
"these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -399,14 +399,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -415,7 +415,7 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"With Windows Vista, Microsoft admitted it had built in a back door: "
"Microsoft can use it to forcibly install software “upgrades,” "
@@ -425,7 +425,7 @@
"overcome. Of course, Windows 10 is no better"
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The idea that the FBI and Microsoft will keep the root passwords for "
@@ -440,14 +440,14 @@
"inte lÃ¥ta ägaren ha det, detta föreslogs dock 2002. Det kallas âtrusted "
"computingâ eller âPalladiumâ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
"into use, it is called “secure boot”."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"What Microsoft keeps is not exactly a password in the traditional sense; no "
"person ever types it on a terminal. Rather, it is a signature and "
@@ -459,7 +459,7 @@
"NSA security bugs in Windows</a> to exploit."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -468,7 +468,7 @@
"control. We call this <em>restricted boot</em>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "When this story was written, the SPA was threatening small Internet "
@@ -495,7 +495,7 @@
"senare tillbaks stämningen, men fick senare lagstiftningen DMCA som ger dem "
"makten de ville ha."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The SPA, which actually stands for Software Publisher's Association, has "
@@ -522,7 +522,7 @@
"BSA i Argentina under 2001 framkom hot om våldäckt i fängelser mot folk
som "
"delade med sig av mjukvara."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The university security policies described above are not imaginary. For "
@@ -537,7 +537,7 @@
"exempel, en dator i ett universitetsnätverk i Chicago området skriver ut "
"följande meddelande när man loggar in:"
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -561,7 +561,7 @@
"system personnel may provide the evidence of such monitoring to University "
"authorities and/or law enforcement officials."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -569,11 +569,11 @@
"Detta är en intressant tolkning av USAs âFourth Amendmentâ: tvinga folk
att "
"hålla med, i förväg, för att sedan hävda sin rätt eferåt."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The <a href=\"/philosophy/right-to-read.html#AuthorsNote\">author's note</"
@@ -590,7 +590,7 @@
"börjat; här följer två länkar till artiklar om teknologier som utvecklas
för "
"att neka dig din rätt att läsa."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -601,31 +601,31 @@
"for rejecting the product completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -637,7 +637,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we want to stop the bad news and create some good news, we need to "
"organize and fight. Subscribe to the FSF's <a href=\"http://"
@@ -647,11 +647,11 @@
"of ways to participate in our work</a>."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Referenser"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -663,7 +663,7 @@
"National Information Infrastructure: The Report of the Working Group on "
"Intellectual Property [sic] Rights (1995)."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -673,7 +673,7 @@
"förklaring av detta âWhite Paperâ: The Copyright Grab</a>, Pamela
Samuelson, "
"Wired, Jan. 1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -681,7 +681,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -691,7 +691,7 @@
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
"Private Data</a>, Washington Post, 4 Nov 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.public-domain.org/\">Union for the Public Domain</"
@@ -706,27 +706,17 @@
"en organisation med syfte att motsätta sig och försöka reversera
uttökningen "
"av upphovsrätten och patentlagstiftningen."
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Denna essä är publicerad i <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "Andra texter att läsa"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.computerworld.com/s/article/49358/"
@@ -741,6 +731,16 @@
"Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">Copy Protection: Just "
"Say No</a>, Published in Computer World."
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Denna essä är publicerad i <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/right-to-read.tr.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.tr.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- po/right-to-read.tr.po 18 Oct 2016 16:29:51 -0000 1.45
+++ po/right-to-read.tr.po 6 Nov 2016 21:28:15 -0000 1.46
@@ -12,7 +12,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2010-01-25 16:11+0100\n"
"Last-Translator: Tahir Emre Kalaycı <address@hidden>\n"
"Language-Team: Turkish <address@hidden>\n"
@@ -54,7 +54,7 @@
"1997 yayınında yer almıÅtır."
# type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -63,7 +63,7 @@
"yazıların derlemesi olan âTychoâya Giden Yolâdan alınmıÅtır."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -76,7 +76,7 @@
"bilgisayarını isteyebileceÄi biri yoktu."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -93,7 +93,7 @@
"öÄretilmiÅti, bunu yalnızca korsanlar yapardı."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -114,7 +114,7 @@
"sahibi olarak, o, suçu önlemediÄi için ciddi bir ceza alabilirdi. "
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -137,7 +137,7 @@
"yapılırsa, bunların yeterli ücreti saÄlayacaÄını ummaktaydı.)"
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -154,7 +154,7 @@
"kütüphaneler geçmiÅte kalmıÅtı."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -174,7 +174,7 @@
"bunun nedeni yasak okuma yapması deÄil, hata ayıklayıcıyı
bulundurmasıydı."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -193,7 +193,7 @@
"hapse gönderildi."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -208,7 +208,7 @@
"alıÅtırmaları için kullanılabilmekteydi."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "It was also possible to bypass the copyright monitors by installing a "
@@ -237,7 +237,7 @@
"abbr> ya da Microsoft Destek size Åifreyi söylemezdi."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -250,7 +250,7 @@
"seçmiÅ olması da Lissaânın da Danâı sevdiÄi anlamına gelebilirdi. "
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -265,7 +265,7 @@
"bildirirse bulabilirlerdi."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -285,7 +285,7 @@
"yasak Åeyin ne olduÄunu bilmeleri gerekmezdi."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -297,7 +297,7 @@
"neden olmaktaydı."
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -312,7 +312,7 @@
"etkinlikleri cezalandırmaktaydı. "
# type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -332,20 +332,20 @@
"insanları tanıdılar. 2062 yılında, Tycho Ä°syanı baÅladıÄında,
evrensel okuma "
"hakkı, ana amaçlarından biri haline geldi."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing list "
"about the dangers of e-books</a>."
msgstr ""
# type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
#, fuzzy
#| msgid "Author's Note"
msgid "Author's Notes"
msgstr "Yazarın Notu"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -355,7 +355,7 @@
"philosophy/words-to-avoid.html#Piracy\">“Piracy”</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -364,13 +364,13 @@
"Design</a> campaign. We ask for your support."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid "This note was updated in 2007."
msgid ""
@@ -379,7 +379,7 @@
msgstr "Bu not 2007 yılında güncellenmiÅtir."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The right to read is a battle being fought today. Although it may take "
@@ -414,7 +414,7 @@
"kabul edilen DADVSI yasasıyla DeCSS'nin, DVD'deki videoları çözmek için "
"program, bir kopyasına sadece sahip olmak bile suç sayılmaktadır."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -425,7 +425,7 @@
"these treaties impose across a wide range of fields."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US has imposed DMCA requirements on Australia, Panama, Colombia and "
"South Korea through bilateral agreements, and on countries such as Costa "
@@ -436,14 +436,14 @@
"be defeated, or abolished."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
"official part of the web specifications."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
"many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -453,7 +453,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -480,7 +480,7 @@
"kampanyasını oluÅturduk."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "One of the ideas in the story was not proposed in reality until 2002. "
@@ -495,7 +495,7 @@
"<abbr>FBI</abbr>âın ve Microsoftâun kiÅisel bilgisayarlar için kök
Åifreleri "
"tutması ve onlara sahip olmanıza izin vermemesi fikridir."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
@@ -503,7 +503,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -528,7 +528,7 @@
"Microsoft ile iÅbirliÄi yapan herhangi bir web sitesinin, kullanıcının "
"bilgisayarıyla yapabilecekleri üzerinde tam bir denetim saÄlamasına
elverir."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -538,7 +538,7 @@
msgstr ""
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "When this story was first written, the SPA was threatening small Internet "
@@ -566,7 +566,7 @@
"Åeyi elde etti. "
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The SPA, which actually stands for Software Publishers Association, has "
@@ -595,7 +595,7 @@
"bulunmuÅtur."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -606,7 +606,7 @@
"bilgisayarda aÅaÄıdaki mesajı görürsünüz:"
# type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -631,7 +631,7 @@
"veya kanun yürütme birimlerine bildirir."
# type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -639,11 +639,11 @@
"Bu, Dördüncü DeÄiÅikliÄe iliÅkin ilginç bir yaklaÅımdır: herkese
ikna olması "
"için baskı uygulayın, böylece haklarından vazgeçsinler."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The <a href=\"#AuthorsNote\">author's note</a> talks about the battle for "
@@ -659,7 +659,7 @@
"aÅaÄıda okuma hakkınızı engellemek üzere geliÅtirilmiÅ teknolojiler "
"hakkındaki iki yazının baÄlantısını bulabilirsiniz."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
"\"> abolish readers' traditional freedoms</a>. Amazon's e-book reader "
@@ -670,31 +670,31 @@
"for rejecting the product completely:"
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
"any notes the user enters."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
"of nastiness."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Amazon's e-book distribution is oppressive, too. It identifies the user and "
"records what books the user obtains. It also requires users to agree to an "
@@ -706,7 +706,7 @@
"else."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we want to stop the bad news and create some good news, we need to "
"organize and fight. Subscribe to the FSF's <a href=\"http://"
@@ -717,12 +717,12 @@
msgstr ""
# type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "Kaynakça"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "The administration's “White Paper”: Information "
@@ -741,7 +741,7 @@
"Rights (1995)."
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -752,7 +752,7 @@
"Wired, Jan. 1996"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -760,7 +760,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -771,7 +771,7 @@
"Private Data</a>, Washington Post, 4 Nov 1996."
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.public-domain.org/\">Union for the Public Domain</"
@@ -786,30 +786,19 @@
"(Kamusal Alan için Birlik)</a>—Telif hakları ve patent güçlerinin "
"geniÅlemesine karÅı durmayı ve tersine çevirmeyi hedefleyen bir
organizasyon"
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Bu yazı <a href=\"http://shop.fsf.org/product/free-software-free-society/"
-"\"><cite>Ãzgür Yazılım, Ãzgür Toplum: Richard M. Stallman'ın Seçme "
-"Yazıları</cite></a> kitabında yayınlanmıÅtır."
-
# type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "Okunabilecek diÄer metinler"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">GNU Projesinin Felsefesi</a>"
# type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.computerworld.com/s/article/49358/"
@@ -825,6 +814,17 @@
"Say No (Kopya Koruma: Sadece Hayır Deyin)</a>, Computer World'te "
"yayınlanmıÅtır."
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Bu yazı <a href=\"http://shop.fsf.org/product/free-software-free-society/"
+"\"><cite>Ãzgür Yazılım, Ãzgür Toplum: Richard M. Stallman'ın Seçme "
+"Yazıları</cite></a> kitabında yayınlanmıÅtır."
+
# type: Content of: <div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
Index: po/right-to-read.uk-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.uk-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/right-to-read.uk-diff.html 31 Oct 2016 22:57:29 -0000 1.1
+++ po/right-to-read.uk-diff.html 6 Nov 2016 21:28:15 -0000 1.2
@@ -15,30 +15,70 @@
<title>The Right to Read
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+<span class="removed"><del><strong>hr</strong></del></span>
+<span class="inserted"><ins><em>.info {
+ margin: 0 0 1.5em;
+}
+.announcement {
+ text-align: center;
+ margin: 2em 3%;
+ background: #f5f5f5;
+ border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li</em></ins></span> {
+ margin: <span class="removed"><del><strong>1.2em</strong></del></span> 0;
+}
+<span class="removed"><del><strong>#content ul</strong></del></span>
+<span class="inserted"><ins><em>#AuthorsNote</em></ins></span> li p {
+ margin-top: 1em;
+}
+#AuthorsNote <span class="removed"><del><strong>ul</strong></del></span> li
<span class="inserted"><ins><em>p.emph-box {
+ margin: .5em 3%;
+ background: #f7f7f7;
+ border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+ .announcement {
+ width: 75%;
+ margin: 2em auto;
+ }
+ #AuthorsNote .columns > p:first-child,
+ #AuthorsNote li p.inline-block</em></ins></span> {
+ margin-top: <span
class="removed"><del><strong>1.3em;</strong></del></span> <span
class="inserted"><ins><em>0;</em></ins></span>
+ }
+<span class="removed"><del><strong>#content
div.announcement</strong></del></span>
+ <span class="inserted"><ins><em>#AuthorsNote .columns
p.emph-box</em></ins></span> { <span
class="removed"><del><strong>margin-bottom: 2em;</strong></del></span>
+ <span class="inserted"><ins><em>margin: .5em 6%;
+ }</em></ins></span>
+}
--></style>
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<span class="removed"><del><strong><h2>The</strong></del></span>
+<span class="inserted"><ins><em><h2 class="center">The</em></ins></span>
Right to Read</h2>
-<p>
+<span class="removed"><del><strong><p></strong></del></span>
+
+<span class="inserted"><ins><em><p class="byline
center"></em></ins></span>
by <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
-<p>
+<span class="removed"><del><strong><p></strong></del></span>
+<span class="inserted"><ins><em><p class="center"></em></ins></span>
<em>This article appeared in the February 1997 issue
of <cite>Communications of the ACM</cite> (Volume 40, Number
2).</em></p>
-<hr />
+<hr <span class="inserted"><ins><em>class="thin"</em></ins></span> />
-<blockquote><p>
+<span
class="removed"><del><strong><blockquote><p></strong></del></span>
+
+<span class="inserted"><ins><em><div class="article">
+<blockquote class="info center"><p></em></ins></span>
From <cite>The Road To Tycho</cite>, a collection of
articles about the antecedents of the Lunarian
Revolution, published in Luna City in 2096.
</p></blockquote>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
For Dan Halbert, the road to Tycho began in college—when Lissa
Lenz asked to borrow his computer. Hers had broken down, and unless
@@ -74,7 +114,10 @@
fees went to the researchers who wrote the papers; since Dan aimed for
an academic career, he could hope that his own research papers, if
frequently referenced, would bring in enough to repay this loan.)</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
@@ -118,7 +161,10 @@
knowing your computer's root password. And neither
the FBI nor
Microsoft Support would tell you that.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Dan concluded that he couldn't simply lend Lissa his computer. But he
couldn't refuse to help her, because he loved her. Every chance to
@@ -155,7 +201,10 @@
using computers. Previously, universities maintained a different
approach to student discipline; they punished activities that were
harmful, not those that merely raised suspicion.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="columns"></em></ins></span>
<p>
Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been
@@ -165,6 +214,7 @@
to Luna, where they found others who had likewise gravitated away from
the long arm of the SPA. When the Tycho Uprising began in 2062, the
universal right to read soon became one of its central aims.</p>
+<span class="inserted"><ins><em></div></em></ins></span>
<div class="announcement">
<blockquote>
@@ -175,35 +225,51 @@
<div id="AuthorsNote">
<h3>Author's Notes</h3>
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<span class="removed"><del><strong><ul>
+<li>This</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This</em></ins></span> story is supposedly a historical article that
will be written in
the future by someone else, describing Dan Halbert's youth under a
repressive society shaped by the unjust forces that use “pirate” as
propaganda. So it uses the terminology of that society.
I have tried to project it forwards into something more visibly
oppressive. See <a
href="/philosophy/words-to-avoid.html#Piracy">“Piracy”</a>.
+<span class="inserted"><ins><em></p>
+</div>
+<div class="column-limit"></div></em></ins></span>
</li>
<li>
+<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
<p>Computer-enforced restrictions on lending or reading books (and other
kinds of published works) are known as DRM, short for
“Digital Restrictions Management”. To
eliminate DRM, the Free Software Foundation has
established the <a href="http://DefectiveByDesign.org">Defective by
Design</a> campaign. We ask for your support.</p>
-</li>
-<li>
-<p>The <span class="inserted"><ins><em>Electronic Frontier Foundation, a
separate organization not
+<span class="inserted"><ins><em><p>The Electronic Frontier Foundation, a
separate organization not
related to the Free Software Foundation, also campaigns against
DRM.</p>
+</div>
+<div class="column-limit"></div></em></ins></span>
</li>
-<li>
-<p>The</em></ins></span> following note has been updated several times
since the first
+<span class="removed"><del><strong><li></strong></del></span>
+<span class="inserted"><ins><em></ul>
+
+<blockquote class="info center"></em></ins></span>
+<p>The following note has been updated several times since the first
publication of the story.</p>
+<span class="inserted"><ins><em></blockquote>
+<ul class="no-bullet">
+<li>
+<div class="columns"></em></ins></span>
<p>
The battle for the right to read is already being fought. Although it
may take 50 years for our past freedoms to fade into obscurity, most
@@ -251,23 +317,35 @@
copyright industry; it is on the verge of approving a DRM system as an
official part of the web specifications.</p>
-<p>
+<span class="removed"><del><strong><p></strong></del></span>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+</li>
+
+<li>
+<div class="columns">
+<p class="emph-box"></em></ins></span>
Nonfree software tends to have <a href="/proprietary/">abusive
features of many kinds</a>, which <span
class="removed"><del><strong>support</strong></del></span> <span
class="inserted"><ins><em>lead to</em></ins></span> the conclusion that
<a href="/philosophy/free-software-even-more-important.html">you can
never trust a nonfree program</a>. We must insist on free (libre)
software only, and reject nonfree programs.</p>
-<p>
-<span class="inserted"><ins><em>With Windows Vista, Microsoft admitted it had
built in a back door:
+<span class="inserted"><ins><em><p class="inline-block">
+With Windows Vista, Microsoft admitted it had built in a back door:
Microsoft can use it to forcibly install software
“upgrades,” even if users consider them rather to be
downgrades. It can also order all machines running Vista to refuse to
run a certain device driver. The main purpose of Vista's clampdown on
users was to impose DRM that users can't overcome. Of course, Windows
10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
-<p></em></ins></span>
+<li>
+<div class="columns"></em></ins></span>
+<p>
One of the ideas in the story was not proposed in reality until 2002.
This is the idea that the FBI and Microsoft will keep the
root passwords for your personal computers, and not let you have
@@ -296,7 +374,12 @@
whether the machine's owner can install any other system (such as
GNU/Linux) is under Microsoft's control. We call this <em>restricted
boot</em>.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="columns"></em></ins></span>
<p>
In 1997, when this story was first published, the SPA was
threatening small Internet service providers, demanding they permit
@@ -315,7 +398,12 @@
on their coworkers and friends. A BSA terror campaign in
Argentina in 2001 made slightly veiled threats that people sharing
software would be raped in prison.</p>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+</li>
+<li>
+<div class="reduced-width"></em></ins></span>
<p>
The university security policies described above are not imaginary.
For example, a computer at one Chicago-area university displayed this
@@ -337,12 +425,15 @@
<p>
This is an interesting approach to the Fourth Amendment: pressure most
everyone to agree, in advance, to waive their rights under it.</p>
+<span class="inserted"><ins><em></div></em></ins></span>
</li>
</ul>
+<span class="inserted"><ins><em><div
class="column-limit"></div></em></ins></span>
</div>
<h3 id="BadNews">Bad News</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>
The battle for the right to read is <span class="removed"><del><strong>already
in progress,</strong></del></span> <span class="inserted"><ins><em>going
against us so far.</em></ins></span>
The enemy is organized, <span
class="removed"><del><strong>while</strong></del></span> <span
class="inserted"><ins><em>and</em></ins></span> we are <span
class="removed"><del><strong>not, so it is going against
us.</strong></del></span> <span class="inserted"><ins><em>not.</em></ins></span>
@@ -367,10 +458,14 @@
<li><p>It has DRM, which is intended to block users from
sharing copies.</p></li>
-<li><p>It has a back door with which Amazon can remotely erase any
book.
+<span class="removed"><del><strong><li><p>It</strong></del></span>
+
+<span class="inserted"><ins><em><li><p
class="inline-block">It</em></ins></span> has a back door with which Amazon
can remotely erase any book.
In 2009, it erased thousands of copies of 1984, by George
Orwell.</p></li>
-<li><p>In case all that isn't Orwellian enough, there is a
universal
+<span class="removed"><del><strong><li><p>In</strong></del></span>
+
+<span class="inserted"><ins><em><li><p
class="inline-block">In</em></ins></span> case all that isn't Orwellian
enough, there is a universal
back door with which Amazon can remotely change the software, and
introduce any other form of nastiness.</p></li>
</ul>
@@ -389,10 +484,11 @@
FSF's <a href="http://defectivebydesign.org"> Defective by
Design</a>
campaign <span class="removed"><del><strong>has made a start; subscribe to the
campaign's mailing
list</strong></del></span> to lend a hand. <span
class="removed"><del><strong>And</strong></del></span> <span
class="inserted"><ins><em>You
-can</em></ins></span> <a href="http://www.fsf.org/associate">join the
FSF</a> to <span class="removed"><del><strong>help
fund</strong></del></span> <span class="inserted"><ins><em>support
-our work more generally. There is also a <a href="/help/help.html">list
of ways
-to participate in</em></ins></span> our <span
class="removed"><del><strong>work.</strong></del></span> <span
class="inserted"><ins><em>work</a>.</em></ins></span>
+can</em></ins></span> <a href="http://www.fsf.org/associate">join the
FSF</a> to <span class="removed"><del><strong>help
fund</strong></del></span> <span
class="inserted"><ins><em>support</em></ins></span>
+our <span class="removed"><del><strong>work.</strong></del></span> <span
class="inserted"><ins><em>work more generally. There is also a <a
href="/help/help.html">list of ways
+to participate in our work</a>.</em></ins></span>
</p>
+<span class="inserted"><ins><em></div></em></ins></span>
<h3 id="References">References</h3>
@@ -418,13 +514,15 @@
reverse the overextension of copyright and patent powers.</li>
</ul>
-<hr />
+<span class="removed"><del><strong><hr />
<blockquote id="fsfs"><p class="big">This essay is published
in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
Software, Free Society: The Selected Essays of Richard
M. Stallman</cite></a>.</p></blockquote>
-<h5>Other Texts to Read</h5>
+<h5>Other</strong></del></span>
+
+<span class="inserted"><ins><em><h4>Other</em></ins></span> Texts to
<span class="removed"><del><strong>Read</h5></strong></del></span> <span
class="inserted"><ins><em>Read</h4></em></ins></span>
<ul>
<li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -433,6 +531,13 @@
id="copy-protection">Copy Protection: Just Say No</a>,
published in Computer World.</li>
</ul>
+<span class="inserted"><ins><em></div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M.
Stallman</cite></a>.</p></blockquote></em></ins></span>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -491,7 +596,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/31 22:57:29 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/right-to-read.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.uk.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- po/right-to-read.uk.po 18 Oct 2016 16:29:51 -0000 1.41
+++ po/right-to-read.uk.po 6 Nov 2016 21:28:15 -0000 1.42
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-08-04 07:51+0200\n"
"Last-Translator: Andriy Bandura <address@hidden>\n"
"Language-Team: Ukrainian <>\n"
@@ -41,7 +41,7 @@
"<em>Ð¦Ñ ÑÑаÑÑÑ Ð¿Ð¾ÑвилаÑÑ Ð² лÑÑÐ½ÐµÐ²Ð¾Ð¼Ñ Ð²Ð¸Ð¿ÑÑкÑ
за 1997 ÑÑк <cite>Communications "
"of the ACM</cite> (Ñом 40, â 2).</em>"
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"From <cite>The Road To Tycho</cite>, a collection of articles about the "
"antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -49,7 +49,7 @@
"Ð <cite>ÐоÑоги до ТиÑ
о</cite>, збÑÑки ÑÑаÑей пÑо
подÑÑ, Ñо пеÑедÑвали "
"ÐÑÑÑÑнÑй ÑеволÑÑÑÑ, опÑблÑкованÑй в
ÐÑна-СÑÑÑ Ð² 2096 ÑоÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For Dan Halbert, the road to Tycho began in college—when Lissa Lenz "
"asked to borrow his computer. Hers had broken down, and unless she could "
@@ -61,7 +61,7 @@
"вона не змогла знайÑи ÑнÑий, вона завалила
б ÑÐ²Ð¾Ñ ÐºÑÑÑÐ¾Ð²Ñ ÑобоÑÑ. Ðона не "
"наважÑвалаÑÑ Ð¿ÑоÑиÑи нÑкого, кÑÑм Ðана. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This put Dan in a dilemma. He had to help her—but if he lent her his "
"computer, she might read his books. Aside from the fact that you could go "
@@ -77,7 +77,7 @@
"ÑпеÑÑÑ ÑокÑвала його. Як Ñ ÑÑÑ ÑнÑÑ, з
поÑаÑÐºÐ¾Ð²Ð¾Ñ Ñколи вÑн бÑв пÑивÑений, "
"Ñо обмÑнÑваÑиÑÑ ÐºÐ½Ð¸Ð³Ð°Ð¼Ð¸ огидно Ñ
непÑавилÑно - Ñак ÑинÑÑÑ Ð»Ð¸Ñе пÑÑаÑи. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"And there wasn't much chance that the SPA—the Software Protection "
"Authority—would fail to catch him. In his software class, Dan had "
@@ -98,7 +98,7 @@
"оÑÑимав би найÑÑвоÑÑÑе покаÑаннÑ
за Ñе, Ñо не поÑÑÑбÑвавÑÑ "
"запобÑгÑи злоÑинÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, Lissa did not necessarily intend to read his books. She might "
"want the computer only to write her midterm. But Dan knew she came from a "
@@ -121,7 +121,7 @@
"ÑкÑо на ниÑ
бÑдÑÑÑ ÑаÑÑо поÑилаÑиÑÑ,
пÑинеÑÑÑÑ Ð´Ð¾ÑÑаÑнÑо гÑоÑей, Ñоб "
"повеÑнÑÑи боÑг.) "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later on, Dan would learn there was a time when anyone could go to the "
"library and read journal articles, and even books, without having to pay. "
@@ -138,7 +138,7 @@
"2047 ÑоÑÑ Ð¿ÑблÑÑÐ½Ñ Ð±ÑблÑоÑеки з вÑлÑним
доÑÑÑпом до наÑÐºÐ¾Ð²Ð¾Ñ Ð»ÑÑеÑаÑÑÑи "
"ÑÑали невиÑазним Ñпогадом. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"There were ways, of course, to get around the SPA and Central Licensing. "
"They were themselves illegal. Dan had had a classmate in software, Frank "
@@ -157,7 +157,7 @@
"У 2047 ÑоÑÑ Ð¤Ñенк ÑидÑв Ñ Ð²'ÑзниÑÑ —
не ÑеÑез пÑÑаÑÑÑке "
"ÑиÑаннÑ, а ÑеÑез володÑÐ½Ð½Ñ Ð·Ð½ÐµÐ²Ð°Ð´Ð½Ð¸ÐºÐ¾Ð¼."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan would later learn that there was a time when anyone could have debugging "
"tools. There were even free debugging tools available on CD or downloadable "
@@ -173,7 +173,7 @@
"Ñе ÑÑало ÑÑ
нÑм оÑновним заÑÑоÑÑваннÑм Ñ
ÑеалÑнÑй пÑакÑиÑÑ. Це ознаÑало, Ñо "
"вони незаконнÑ; ÑÑÑÑ
, Ñ
Ñо ÑозÑоблÑв
зневадники, вÑдпÑавили Ñ Ð²'ÑзниÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Programmers still needed debugging tools, of course, but debugger vendors in "
"2047 distributed numbered copies only, and only to officially licensed and "
@@ -187,7 +187,7 @@
"ÑпеÑÑалÑÐ½Ð¾Ð¼Ñ ÑеÑедовиÑÑ, ÑÐ¾Ð¼Ñ Ð½Ð¸Ð¼ можна
бÑлокоÑиÑÑÑваÑиÑÑ ÑÑлÑки Ð´Ð»Ñ "
"навÑалÑниÑ
впÑав."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It was also possible to bypass the copyright monitors by installing a "
"modified system kernel. Dan would eventually find out about the free "
@@ -205,7 +205,7 @@
"комп'ÑÑеÑа. Рйого Ñи не дÑзнавÑÑ Ð± Ð½Ñ Ð²Ñд
ФÐÐ , Ð½Ñ Ð²Ñд ÑлÑжби "
"пÑдÑÑимкиMicrosoft."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan concluded that he couldn't simply lend Lissa his computer. But he "
"couldn't refuse to help her, because he loved her. Every chance to speak "
@@ -217,7 +217,7 @@
"коли вÑн говоÑив з неÑ, вÑн пеÑеповнÑвавÑÑ
поÑÑÑÑÑми. РпозаÑк вона "
"попÑоÑила пÑо Ð´Ð¾Ð¿Ð¾Ð¼Ð¾Ð³Ñ Ñаме його, Ñе могло
ознаÑаÑи, Ñо й вона його лÑбиÑÑ. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Dan resolved the dilemma by doing something even more unthinkable—he "
"lent her the computer, and told her his password. This way, if Lissa read "
@@ -231,7 +231,7 @@
"не дÑзнавÑÑ Ð± пÑо Ñе авÑомаÑиÑно. Ðони
довÑдалиÑÑ Ð± ÑÑлÑки Ñ Ð²Ð¸Ð¿Ð°Ð´ÐºÑ Ð´Ð¾Ð½Ð¾ÑÑ "
"ÐÑзи на нÑого."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Of course, if the school ever found out that he had given Lissa his own "
"password, it would be curtains for both of them as students, regardless of "
@@ -251,7 +251,7 @@
"пеÑевÑÑÐºÑ ÑвоÑÑ Ð¿Ð¾Ð²ÐµÐ´Ñнки. Ðони вважали
Ñе Ð¾Ð·Ð½Ð°ÐºÐ¾Ñ Ñого, Ñо Ñи Ñобив ÑкÑÑÑ "
"ÑнÑÑ Ð·Ð°Ð±Ð¾ÑÐ¾Ð½ÐµÐ½Ñ Ð´ÑÑ, Ñ ÑÑ
не дÑже ÑÑкавило,
ÑÐºÑ Ñаме. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Students were not usually expelled for this—not directly. Instead "
"they were banned from the school computer systems, and would inevitably fail "
@@ -261,7 +261,7 @@
"за Ñе. ÐамÑÑÑÑ ÑÑого Ñм закÑивали доÑÑÑп
до обÑиÑлÑвалÑниÑ
ÑиÑÑем ÑÑилиÑа, а "
"без ÑÑого бÑло неможливо пÑодовжÑваÑи
бÑдÑ-ÑÐºÑ Ð·Ð°Ð½ÑÑÑÑ. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Later, Dan would learn that this kind of university policy started only in "
"the 1980s, when university students in large numbers began using computers. "
@@ -275,7 +275,7 @@
"диÑÑиплÑни ÑÑÑденÑÑв по-ÑнÑомÑ: вони
каÑали за Ñе, Ñо бÑло ÑкÑдливо, а не за "
"Ñе, Ñо пÑоÑÑо викликало пÑдозÑи. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Lissa did not report Dan to the SPA. His decision to help her led to their "
"marriage, and also led them to question what they had been taught about "
@@ -295,7 +295,7 @@
"2062 ÑоÑÑ Ð¿Ð¾ÑалоÑÑ Ð¿Ð¾Ð²ÑÑÐ°Ð½Ð½Ñ Ð² ТиÑ
о,
вÑезагалÑне пÑаво ÑиÑаÑи Ñвидко "
"ÑÑало однÑÑÑ Ð· його оÑновниÑ
ÑÑлей."
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "<a href=\"http://defectivebydesign.org/ebooks.html\">Join our mailing "
@@ -307,11 +307,11 @@
"<a href=\"http://defectivebydesign.org/ebooks.html\">ÐÑиÑднÑйÑеÑÑ
до наÑого "
"ÑпиÑÐºÑ ÑозÑилки пÑо небезпеки елекÑÑонниÑ
книг</a>."
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
msgid "Author's Notes"
msgstr "ÐаÑÐ²Ð°Ð¶ÐµÐ½Ð½Ñ Ð°Ð²ÑоÑа"
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This story is supposedly a historical article that will be written in the "
"future by someone else, describing Dan Halbert's youth under a repressive "
@@ -327,7 +327,7 @@
"ÑозвинÑÑи дÑмкÑ, Ñоб Ñе виглÑдало Ñе
жоÑÑÑкÑÑе. Ðив. “<a href=\"/"
"philosophy/words-to-avoid.html#Piracy\">пÑÑаÑÑÑво</a>”."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Computer-enforced restrictions on lending or reading books (and other kinds "
"of published works) are known as DRM, short for “Digital Restrictions "
@@ -342,20 +342,20 @@
"забезпеÑÐµÐ½Ð½Ñ Ð¾ÑганÑзÑвав кампанÑÑ <a
href=\"http://DefectiveByDesign.org"
"\">ÐеÑÐµÐºÑ Ð³Ð°ÑанÑований</a>. Ðи пÑоÑимо ваÑ
пÑо пÑдÑÑимкÑ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The Electronic Frontier Foundation, a separate organization not related to "
"the Free Software Foundation, also campaigns against DRM."
msgstr ""
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The following note has been updated several times since the first "
"publication of the story."
msgstr ""
"Ð¦Ñ Ð¿ÑимÑÑка оновлÑвалаÑÑ ÐºÑлÑка ÑазÑв з
ÑаÑÑ Ð¿ÐµÑÑÐ¾Ñ Ð¿ÑблÑкаÑÑÑ Ð¾Ð¿Ð¾Ð²ÑданнÑ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The battle for the right to read is already being fought. Although it may "
"take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -377,7 +377,7 @@
"Ñакож ÑнÑиÑ
ÑобÑÑ). ÐвÑопейÑÑкий ÑоÑз
наклав подÑÐ±Ð½Ñ Ð¾Ð±Ð¼ÐµÐ¶ÐµÐ½Ð½Ñ Ð² диÑекÑÐ¸Ð²Ñ "
"2001 ÑÐ¾ÐºÑ Ð¿Ñо авÑоÑÑÑке пÑаво."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The US campaigns to impose such rules on the rest of the world through so-"
"called “free trade” treaties. <a href=\"https://stallman.org/"
@@ -396,7 +396,7 @@
"злоÑиннÑ, пÑедÑÑавлÑÑ ÑÑлÑки одне з
неÑпÑаведливиÑ
пÑавил, ÑÐºÑ ÑÑ Ð´Ð¾Ð³Ð¾Ð²Ð¾Ñи "
"нав'ÑзÑÑÑÑ Ñ Ð±Ð°Ð³Ð°ÑÑоÑ
ÑÑеÑаÑ
дÑÑлÑноÑÑÑ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
@@ -427,7 +427,7 @@
"пÑоводиÑÑÑÑ Ð½Ð°Ð¾ÑÑанок Ñими, Ñ
Ñо не
пÑойÑов на наÑÑÑпний ÑеÑмÑн пÑÑÐ»Ñ Ð²Ð¸Ð±Ð¾ÑÑв "
"2016 ÑокÑ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Even the World Wide Web Consortium has fallen under the shadow of the "
"copyright industry; it is on the verge of approving a DRM system as an "
@@ -437,7 +437,7 @@
"авÑоÑÑÑкого пÑава; вÑн ÑÑÑ
аÑÑÑÑÑ Ð´Ð¾ ÑÑ
Ð²Ð°Ð»ÐµÐ½Ð½Ñ ÑиÑÑеми ÑиÑÑового кеÑÑÐ²Ð°Ð½Ð½Ñ "
"обмеженнÑми Ñк оÑÑÑÑÐ¹Ð½Ð¾Ñ ÑаÑÑини
ÑпеÑиÑÑкаÑÑй ÐÑеÑвÑÑнÑÐ¾Ñ Ð¿Ð°Ð²ÑÑини."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "Nonfree software tends to have <a href=\"/proprietary/\">abusive features "
@@ -458,7 +458,7 @@
"нÑколи не можна довÑÑÑÑи</a>. Ðи
наполÑгаÑмо виклÑÑно на вÑлÑниÑ
пÑогÑамаÑ
Ñ "
"вÑдкидаÑмо невÑлÑнÑ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
#, fuzzy
#| msgid ""
#| "With Windows Vista, Microsoft admitted it had built in a back door: "
@@ -483,7 +483,7 @@
"заÑиÑкала коÑиÑÑÑваÑÑв головним Ñином
Ð´Ð»Ñ Ñого, Ñоб нав'ÑзаÑи ÑиÑÑове "
"кеÑÑÐ²Ð°Ð½Ð½Ñ Ð¾Ð±Ð¼ÐµÐ¶ÐµÐ½Ð½Ñми, з Ñкими
коÑиÑÑÑваÑÑ Ð½Ðµ зможÑÑÑ Ð²Ð¿Ð¾ÑаÑиÑÑ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"One of the ideas in the story was not proposed in reality until 2002. This "
"is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -493,7 +493,7 @@
"пÑо Ñе, Ñо ФÐÐ Ñ Microsoft бÑдÑÑÑ Ð·Ð±ÐµÑÑгаÑи
паÑÐ¾Ð»Ñ ÑиÑÑемного адмÑнÑÑÑÑаÑоÑа "
"ваÑиÑ
пеÑÑоналÑниÑ
комп'ÑÑеÑÑв Ñ Ð½Ðµ
допÑÑÑÑÑÑ, Ñоб вони бÑли Ñ Ð²Ð°Ñ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The proponents of this scheme gave early versions names such as “"
"trusted computing” and “Palladium”, but as ultimately put "
@@ -504,7 +504,7 @@
"ÑÑали заÑÑоÑовÑваÑи на пÑакÑиÑÑ,
називаÑÑÑÑÑ “безпеÑним "
"заванÑаженнÑм”."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"What Microsoft keeps is not exactly a password in the traditional sense; no "
"person ever types it on a terminal. Rather, it is a signature and "
@@ -525,7 +525,7 @@
"пÑоÑÑÑÑ: вона вже <a
href=\"/proprietary/malware-microsoft.html\">показÑÑ "
"ÐÐРнедолÑки в заÑ
иÑÑÑ Windows</a>, Ñоб
агенÑÑÑво ÑÑ
екÑплÑаÑÑвало."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"Secure boot can be implemented in a way that permits the user to specify the "
"signature key and decide what software to sign. In practice, PCs designed "
@@ -540,7 +540,7 @@
"опеÑаÑÑÐ¹Ð½Ñ ÑиÑÑÐµÐ¼Ñ (ÑÐ°ÐºÑ Ñк GNU/Linux),
визнаÑÐ°Ñ Microsoft. Ðи називаÑмо Ñе "
"<em>обмеженим заванÑаженнÑм</em>."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"In 1997, when this story was first published, the SPA was threatening small "
"Internet service providers, demanding they permit the SPA to monitor all "
@@ -557,7 +557,7 @@
"вÑдмовивÑÑ Ð²Ð¸ÐºÐ¾Ð½Ð°Ñи вимогÑ, Ñ Ð½Ð° нÑого
подали в ÑÑд. Ðгодом SPA вÑдмовилаÑÑ "
"вÑд пеÑеÑлÑдÑваннÑ, але оÑÑимала DMCA, Ñкий
надав Ð±Ð°Ð¶Ð°Ð½Ñ Ð´Ð»Ñ Ð½Ð¸Ñ
владÑ."
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The SPA, which actually stands for Software Publishers Association, has been "
"replaced in its police-like role by the Business Software Alliance. The BSA "
@@ -576,7 +576,7 @@
"ÑоÑÑ, виÑÑвалиÑÑ Ð·Ð»ÐµÐ³ÐºÐ° пÑикÑиÑÑ Ð·Ð°Ð³Ñози
наÑилÑÑÑва над лÑдÑми, ÑÐºÑ "
"обмÑнÑвалиÑÑ Ð¿ÑогÑамами. "
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"The university security policies described above are not imaginary. For "
"example, a computer at one Chicago-area university displayed this message "
@@ -586,7 +586,7 @@
"комп'ÑÑÐµÑ Ð¾Ð´Ð½Ð¾Ð³Ð¾ з ÑнÑвеÑÑиÑеÑÑв в ÑайонÑ
Чикаго демонÑÑÑÑвав пÑи вÑ
Ð¾Ð´Ñ Ð² "
"ÑиÑÑÐµÐ¼Ñ Ñаке повÑдомленнÑ: "
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
msgid ""
"This system is for the use of authorized users only. Individuals using this "
"computer system without authority or in the excess of their authority are "
@@ -612,7 +612,7 @@
"ÑпоÑÑеÑÐµÐ¶ÐµÐ½Ð½Ñ Ñк ÑвÑдÑÐµÐ½Ð½Ñ ÐºÐµÑÑвниÑÑвÑ
УнÑвеÑÑиÑеÑÑ Ñа/або поÑадовим оÑобам, "
"в обов'Ñзки ÑкиÑ
вÑ
одиÑÑ Ð¾Ñ
оÑона
пÑавопоÑÑдкÑ. "
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
msgid ""
"This is an interesting approach to the Fourth Amendment: pressure most "
"everyone to agree, in advance, to waive their rights under it."
@@ -621,11 +621,11 @@
"вони заздалегÑÐ´Ñ Ð¿Ð¾Ð³Ð¾Ð´Ð¶ÑвалиÑÑ
вÑдмовиÑиÑÑ Ð²Ñд ÑвоÑÑ
пÑав, ÑÐºÑ Ð½Ð°Ð´Ð°ÑÑÑÑÑ "
"ÑÑÑÑ Ð¿Ð¾Ð¿ÑавкоÑ. "
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Bad News"
msgstr "ÐÐ¾Ð³Ð°Ð½Ñ Ð½Ð¾Ð²Ð¸Ð½Ð¸"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The battle for the right to read is already in progress, The enemy is "
@@ -637,7 +637,7 @@
"ÐиÑва за пÑаво пÑоÑиÑаÑи вже ÑÑиваÑ. ÐоÑог
оÑганÑзований, а ми "
"нÑ, ÑÐ¾Ð¼Ñ Ð² ÑÑÐ¾Ð¼Ñ Ð¼Ð¸ ÑлабÑÑ. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "Today's commercial ebooks <a href=\"/philosophy/the-danger-of-ebooks.html"
@@ -665,7 +665,7 @@
"href=\"/proprietary/malware-kindle-swindle.html\">оÑвелÑвÑÑкиÑ
ÑиÑ</a>. "
"ÐÐ¾Ð¶Ð½Ð¾Ñ Ð· ниÑ
доÑиÑÑ, Ñоби повнÑÑÑÑ
вÑдмовиÑиÑÑ Ð²Ñд ÑÑого пÑодÑкÑÑ:"
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It spies on everything the user does: it reports which book the user is "
"reading, and which page, and it reports when the user highlights text, and "
@@ -675,13 +675,13 @@
"ÑÑоÑÑÐ½ÐºÑ ÑиÑÐ°Ñ ÐºÐ¾ÑиÑÑÑваÑ, доповÑдаÑ,
коли коÑиÑÑÑÐ²Ð°Ñ Ð¿ÑдкÑеÑлÑÑ ÑекÑÑ Ñ "
"повÑдомлÑÑ Ð²ÑÑ Ð½Ð¾ÑаÑки, ÑÐºÑ Ð²Ð²Ð¾Ð´Ð¸ÑÑ
коÑиÑÑÑваÑ."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid "It has DRM, which is intended to block users from sharing copies."
msgstr ""
"У нÑÐ¾Ð¼Ñ Ñ ÑиÑÑове кеÑÑÐ²Ð°Ð½Ð½Ñ Ð¾Ð±Ð¼ÐµÐ¶ÐµÐ½Ð½Ñми,
пÑизнаÑене Ð´Ð»Ñ Ñого, Ñоб не даÑи "
"коÑиÑÑÑваÑам обмÑнÑваÑиÑÑ ÐºÐ¾Ð¿ÑÑми."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"It has a back door with which Amazon can remotely erase any book. In 2009, "
"it erased thousands of copies of 1984, by George Orwell."
@@ -690,7 +690,7 @@
"меÑежÑ. У 2009 ÑоÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½ÑÑ ÑÑеÑла
ÑиÑÑÑÑ ÐºÐ¾Ð¿Ñй <cite>1984</cite> "
"ÐжоÑджа ÐÑвела."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"In case all that isn't Orwellian enough, there is a universal back door with "
"which Amazon can remotely change the software, and introduce any other form "
@@ -700,7 +700,7 @@
"Ð´Ð¾Ð¿Ð¾Ð¼Ð¾Ð³Ð¾Ñ ÑÐºÐ¾Ñ Amazon може змÑнÑваÑи
пÑогÑами по меÑежÑ, вводÑÑи ÑÐºÑ "
"завгодно гидоÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "Amazon's e-book distribution is oppressive, too. It identifies the user "
@@ -727,7 +727,7 @@
"обмÑнÑваÑиÑÑ ÐºÐ¾Ð¿ÑÑми; однак Ñоб бÑÑи
ÑÑлком ÑиÑÑими, нам наÑампеÑед не ÑлÑд "
"погоджÑваÑиÑÑ Ð½Ð° Ñаке."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "If we want to stop the bad news and create some good news, we need to "
@@ -750,11 +750,11 @@
"Ð <a href=\"http://www.fsf.org/associate\">пÑиÑднÑйÑеÑÑ Ð´Ð¾
ФÐÐÐ</a>, Ñоб "
"допомогÑи наÑÑй ÑобоÑÑ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "References"
msgstr "ÐоÑиланнÑ"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"The administration's “White Paper”: Information Infrastructure "
"Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -766,7 +766,7 @@
"\">Ñак</a>] Ñ Ð½Ð°ÑÑоналÑна ÑнÑоÑмаÑÑйна
ÑнÑÑаÑÑÑÑкÑÑÑа: звÑÑ Ð Ð¾Ð±Ð¾ÑÐ¾Ñ Ð³ÑÑпи з "
"пÑав ÑнÑелекÑÑалÑÐ½Ð¾Ñ Ð²Ð»Ð°ÑноÑÑÑ [Ñак]
(1995 ÑÑк)."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\">An "
"explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -776,7 +776,7 @@
"\">ÐоÑÑÐ½ÐµÐ½Ð½Ñ Ð´Ð¾ ÐÑÐ»Ð¾Ñ ÐºÐ½Ð¸Ð³Ð¸: ÐлеÑнÑ
авÑоÑÑÑкого пÑава</a>. Ðамела "
"СамÑелÑÑон, “УайеÑед”, ÑÑÑÐµÐ½Ñ 1996."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Sold Out</a>, "
"James Boyle, New York Times, 31 March 1996"
@@ -784,7 +784,7 @@
"<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\">Ð
озпÑодано</a>."
"ÐÐ¶ÐµÐ¹Ð¼Ñ ÐойлÑ, “ÐÑÑ-ÐоÑк Ñаймє
31 беÑÐµÐ·Ð½Ñ 1996 ÑокÑ."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-"
"people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -795,7 +795,7 @@
"Ñа оÑобиÑÑÑ Ð´Ð°Ð½Ñ</a>. “ÐаÑингÑон
поÑÑ”, 4 лиÑÑопада "
"1996 ÑокÑ."
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
#, fuzzy
#| msgid ""
#| "<a href=\"http://www.public-domain.org/\">Union for the Public Domain</"
@@ -810,26 +810,16 @@
"— оÑганÑзаÑÑÑ, меÑÐ¾Ñ ÑÐºÐ¾Ñ Ñ Ð·Ð°Ð¿Ð¾Ð±ÑганнÑ
Ñа ÑкаÑÑваннÑнадмÑÑного "
"поÑÐ¸Ð»ÐµÐ½Ð½Ñ Ð°Ð²ÑоÑÑÑкого пÑава Ñ Ð¿Ð°ÑенÑÑв."
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Цей наÑÐ¸Ñ Ð¾Ð¿ÑблÑкований Ñ Ð·Ð±ÑÑÐ½Ð¸ÐºÑ <a
href=\"http://shop.fsf.org/product/"
-"free-software-free-society/\"><cite>ÐÑлÑÐ½Ñ Ð¿ÑогÑами,
вÑлÑне ÑÑÑпÑлÑÑÑво: "
-"вибÑÐ°Ð½Ñ Ð½Ð°ÑиÑи Ð ÑÑаÑда Ð. СÑолмена</cite></a>"
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
msgid "Other Texts to Read"
msgstr "ÐнÑÑ ÑекÑÑи по ÑемÑ"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
msgstr "<a href=\"/philosophy/philosophy.html\">ФÑлоÑоÑÑÑ
пÑоекÑÑ GNU</a>"
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
msgid ""
"<a href=\"http://www.computerworld.com/article/2596679/networking/copy-"
"protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -840,6 +830,16 @@
"пÑоÑÑо ÑкажÑÑÑ “нє</a>, опÑблÑковано
в “Computer "
"World”."
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-"
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Цей наÑÐ¸Ñ Ð¾Ð¿ÑблÑкований Ñ Ð·Ð±ÑÑÐ½Ð¸ÐºÑ <a
href=\"http://shop.fsf.org/product/"
+"free-software-free-society/\"><cite>ÐÑлÑÐ½Ñ Ð¿ÑогÑами,
вÑлÑне ÑÑÑпÑлÑÑÑво: "
+"вибÑÐ°Ð½Ñ Ð½Ð°ÑиÑи Ð ÑÑаÑда Ð. СÑолмена</cite></a>"
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/surveillance-vs-democracy.es-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.es-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- po/surveillance-vs-democracy.es-en.html 2 Nov 2016 12:57:37 -0000
1.28
+++ po/surveillance-vs-democracy.es-en.html 6 Nov 2016 21:28:15 -0000
1.29
@@ -2,19 +2,31 @@
<!-- Parent-Version: 1.77 -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+--></style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
-<p>by <a href="http://www.stallman.org/">Richard Stallman</a></p>
+<p class="byline center">by <a href="http://www.stallman.org/">Richard
Stallman</a></p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>A version of this article was first published in Wired
+<blockquote class="center"><p>A version of this article was first published in
Wired
in October 2013.</p></blockquote>
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the
three ads that popped up on his computer screen..." /></a>
<p>“How did they find out I'm a dog?”</p>
@@ -30,7 +42,8 @@
is not exceeded? It is the level beyond which surveillance starts to
interfere with the functioning of democracy, in that whistleblowers
(such as Snowden) are likely to be caught.</p>
-
+</div>
+<div class="columns" style="clear:both">
<p>Faced with government secrecy, we the people depend on
whistleblowers
to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
@@ -60,9 +73,11 @@
suffice to protect whistleblowers if “catching the
whistleblower” is grounds for access sufficient to identify him
or her. We need to go further.</p>
+</div>
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a
Democracy</h3>
+<div class="columns">
<p>If whistleblowers don't dare reveal crimes and lies, we lose the
last shred of effective control over our government and institutions.
That's why surveillance that enables the state to find out who has
@@ -91,9 +106,11 @@
that there might be terrorists among them. The point at which
surveillance is too much is the point at which the state can find who
spoke to a known journalist or a known dissident.</p>
+</div>
-<h3>Information, Once Collected, Will Be Misused</h3>
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
+<div class="columns">
<p>When people recognize that the level of general surveillance is too
high, the first response is to propose limits on access to the
accumulated data. That sounds nice, but it won't fix the problem, not
@@ -140,9 +157,11 @@
launch a massive fishing expedition against any person. To make
journalism and democracy safe, we must limit the accumulation of data
that is easily accessible to the state.</p>
+</div>
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
+<div class="columns">
<p>The Electronic Frontier Foundation and other organizations propose
a set of legal principles designed to <a
href="https://en.necessaryandproportionate.org/text">prevent the
@@ -170,9 +189,11 @@
regime would have to implement surveillance afresh, and it would only
collect data starting at that date. As for suspending or momentarily
ignoring this law, the idea would hardly make sense.</p>
+</div>
-<h3>First, Don't Be Foolish</h3>
+<h3 class="subheader">First, Don't Be Foolish</h3>
+<div class="columns">
<p>To have privacy, you must not throw it away: the first one who has
to protect your privacy is you. Avoid identifying yourself to web
sites, contact them with Tor, and use browsers that block the schemes
@@ -213,9 +234,11 @@
movements, but not all of them. Clearly, the better solution is to
make all these systems stop surveilling people other than legitimate
suspects.</p>
+</div>
-<h3>We Must Design Every System for Privacy</h3>
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
+<div class="columns">
<p>If we don't want a total surveillance society, we must consider
surveillance a kind of social pollution, and limit the surveillance
impact of each new digital system just as we limit the environmental
@@ -233,9 +256,11 @@
period. The same benefit, with no surveillance!</p>
<p>We need to design such privacy into all our digital systems.</p>
+</div>
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
+<div class="columns">
<p>One way to make monitoring safe for privacy is
to <a name="dispersal">keep the data dispersed and inconvenient to
access</a>. Old-fashioned security cameras were no threat to privacy(<a
href="#privatespace">*</a>).
@@ -267,9 +292,11 @@
camera points at the inside of a store, or at the street. Any camera
pointed at someone's private space by someone else violates privacy,
but that is another issue.</p>
+</div>
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce
Surveillance</h3>
+<div class="columns">
<p>Most data collection comes from people's own digital activities.
Usually the data is collected first by companies. But when it comes
to the threat to privacy and democracy, it makes no difference whether
@@ -325,9 +352,11 @@
customers' credit card details. An anonymous payment system would end
this danger: a security hole in the site can't hurt you if the site
knows nothing about you.</p>
+</div>
-<h3>Remedy for Travel Surveillance</h3>
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
+<div class="columns">
<p>We must convert digital toll collection to anonymous payment (using
digital cash, for instance). License-plate recognition systems
recognize all license plates, and
@@ -382,9 +411,11 @@
remains “out” for too long, the station where it was
borrowed can inform headquarters; in that case, it could send the
borrower's identity immediately.</p>
+</div>
-<h3>Remedy for Communications Dossiers</h3>
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
+<div class="columns">
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
@@ -422,9 +453,11 @@
some user of my email service, and my email service would know only
that I received mail from some user of your email service, but it
would be hard to determine that you had sent mail to me.</p>
+</div>
-<h3>But Some Surveillance Is Necessary</h3>
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
+<div class="columns">
<p>For the state to find criminals, it needs to be able to investigate
specific crimes, or specific suspected planned crimes, under a court
order. With the Internet, the power to tap phone conversations would
@@ -458,9 +491,10 @@
<p>However, journalism must be protected from surveillance even when
it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
-<hr />
-
+<div class="reduced-width">
<p>Digital technology has brought about a tremendous increase in the
level of surveillance of our movements, actions, and communications.
It is far more than we experienced in the 1990s, and <a
@@ -480,6 +514,8 @@
a grave surveillance deficit, and ought to be surveilled more than the
Soviet Union and East Germany were, we must reverse this increase.
That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -538,7 +574,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/11/02 12:57:37 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/surveillance-vs-democracy.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.es.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- po/surveillance-vs-democracy.es.po 2 Nov 2016 12:53:40 -0000 1.65
+++ po/surveillance-vs-democracy.es.po 6 Nov 2016 21:28:15 -0000 1.66
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-11-02 13:48+0100\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-11-02 13:12+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -41,11 +41,11 @@
"Una versión de este artÃculo se publicó por primera vez en octubre de
2013, "
"en Wired."
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
msgid "<a href=\"/graphics/dog.html\">"
msgstr "<a href=\"/graphics/dog.html\">"
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
msgid ""
"Cartoon of a dog, wondering at the three ads that popped up on his computer "
"screen..."
@@ -54,15 +54,15 @@
"pantalla de su ordenador..."
# type: Content of: <div><p>
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
msgid "</a>"
msgstr "</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
msgid "“How did they find out I'm a dog?”"
msgstr "«¿Cómo habrán descubierto que soy un perro?»"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Thanks to Edward Snowden's disclosures, we know that the current level of "
"general surveillance in society is incompatible with human rights. The "
@@ -84,7 +84,7 @@
"interferir con el funcionamiento de la democracia, cuando existe la "
"posibilidad de que los denunciantes (como Snowden) sean atrapados."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Faced with government secrecy, we the people depend on whistleblowers to <a "
"href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">tell us what "
@@ -101,7 +101,7 @@
"debemos reducir la vigilancia hasta el punto en que los denunciantes sepan "
"que no corren peligro."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -131,7 +131,7 @@
"\"http://www.wired.com/opinion/2013/10/149481/\">eso no protegerá nuestra "
"privacidad una vez que pongamos los pies en Internet</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
@@ -149,11 +149,11 @@
"al denunciante» es una justificación para acceder a los datos necesarios "
"para identificarlo. Tenemos que ir más allá."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "The Upper Limit on Surveillance in a Democracy"
msgstr "El lÃmite máximo de la vigilancia en una democracia"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
"of effective control over our government and institutions. That's why "
@@ -166,7 +166,7 @@
"quién se ha comunicado con un reportero es demasiada vigilancia, una "
"vigilancia que la democracia no puede soportar."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
@@ -197,7 +197,7 @@
"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
"verizon-2013-06-07\">otras empresas</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
@@ -217,12 +217,12 @@
"que la vigilancia es excesiva se alcanza cuando el Estado puede averiguar "
"quién se comunicó con un periodista o un disidente conocidos."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Information, Once Collected, Will Be Misused"
msgstr ""
"Una vez que se haya obtenido la información, será usada incorrectamente"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
@@ -246,7 +246,7 @@
"que el denunciante haya sido acusado de «espionaje», la búsqueda del
«espÃa» "
"servirá de excusa para obtener el acceso al material recopilado."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
@@ -278,7 +278,7 @@
"aumentado con los <a href=\"https://theyarewatching.org/issues/risks-"
"increase-once-data-shared\">nuevos sistemas digitales</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -297,7 +297,7 @@
"wikipedia.org/wiki/Campos_de_concentración_en_los_Estados_Unidos\">Estados "
"Unidos de América</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Personal data collected by the state is also likely to be obtained by "
"outside crackers that break the security of the servers, even by <a href="
@@ -311,7 +311,7 @@
"articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first."
"shtml\">informáticos al servicio de paÃses enemigos</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Governments can easily use massive surveillance capability to <a href="
"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
@@ -322,7 +322,7 @@
"government-is-blamed-for-wiretapping-scandal.html\">subvertir directamente "
"la democracia</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Total surveillance accessible to the state enables the state to launch a "
"massive fishing expedition against any person. To make journalism and "
@@ -335,11 +335,11 @@
"democracia, debemos limitar la acumulación de datos que son de fácil acceso
"
"para el Estado."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Robust Protection for Privacy Must Be Technical"
msgstr "Para que la protección de la privacidad sea robusta, debe ser
técnica"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The Electronic Frontier Foundation and other organizations propose a set of "
"legal principles designed to <a href=\"https://en.necessaryandproportionate."
@@ -357,7 +357,7 @@
"siempre y cuando se adopten completamente y se apliquen sin excepción para "
"siempre."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -368,7 +368,7 @@
"Enmiendas de la FISA), suspendidas o <a href=\"http://www.nytimes."
"com/2009/04/16/us/16nsa.html\">ignoradas</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Meanwhile, demagogues will cite the usual excuses as grounds for total "
"surveillance; any terrorist attack, even one that kills just a handful of "
@@ -379,7 +379,7 @@
"no mate más que a un puñado de personas, puede magnificarse para servir de "
"justificación."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If limits on access to the data are set aside, it will be as if they had "
"never existed: years worth of dossiers would suddenly become available for "
@@ -402,11 +402,11 @@
"los datos solo a partir de esa fecha. En cuanto a suspender o ignorar "
"momentáneamente esta ley, la idea apenas tendrÃa sentido."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "First, Don't Be Foolish"
msgstr "En primer lugar, no sea incauto"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"To have privacy, you must not throw it away: the first one who has to "
"protect your privacy is you. Avoid identifying yourself to web sites, "
@@ -421,7 +421,7 @@
"Privacy Guard</cite> para cifrar los correos electrónicos. Pague con dinero "
"en efectivo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Keep your own data; don't store your data in a company's “"
"convenient” server. It's safe, however, to entrust a data backup to a "
@@ -435,7 +435,7 @@
"enviarla al servidor usted cifre todos los datos, incluyendo el nombre de "
"los archivos, en su propio ordenador y utilizando software libre."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy's sake, you must avoid nonfree software since, as a consequence "
"of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -454,7 +454,7 @@
"informáticas, pues esto supone el envÃo de todos los datos pertinentes al "
"servidor."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -478,7 +478,7 @@
"incluso si a usted no le importarÃa revelar el suyo, pues tales sistemas "
"presionan a las personas para que renuncien a su privacidad."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Self-protection is essential, but even the most rigorous self-protection is "
"insufficient to protect your privacy on or from systems that don't belong to "
@@ -498,11 +498,11 @@
"que todos estos sistemas dejen de vigilar a las personas que no sean "
"legÃtimamente sospechosas."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "We Must Design Every System for Privacy"
msgstr "Debemos diseñar todos los sistemas de modo que respeten la privacidad"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we don't want a total surveillance society, we must consider surveillance "
"a kind of social pollution, and limit the surveillance impact of each new "
@@ -514,7 +514,7 @@
"cada nuevo sistema digital podrÃa tener sobre la vigilancia, de la misma "
"forma en que limitamos el impacto ambiental de las construcciones fÃsicas."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For example: “smart” meters for electricity are touted for "
"sending the power company moment-by-moment data about each customer's "
@@ -539,17 +539,17 @@
"cualquier perÃodo de tiempo con el promedio del consumo en ese periodo. La "
"misma utilidad, ¡sin vigilancia!"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid "We need to design such privacy into all our digital systems."
msgstr ""
"Debemos incorporar la privacidad en el diseño de todos nuestros sistemas "
"digitales."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Collecting Data: Leaving It Dispersed"
msgstr "Remedio para la recolección de datos: dejarlos dispersos"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
"the data dispersed and inconvenient to access</a>. Old-fashioned security "
@@ -570,7 +570,7 @@
"denunciara algún delito. No serÃa factible recolectar fÃsicamente millones
"
"de cintas cada dÃa y verlas o copiarlas."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Nowadays, security cameras have become surveillance cameras: they are "
"connected to the Internet so recordings can be collected in a data center "
@@ -587,7 +587,7 @@
"todo el tiempo en la calle a los periodistas sospechosos para ver con "
"quiénes hablan."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet-connected cameras often have lousy digital security themselves, "
"which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-"
@@ -611,7 +611,7 @@
"ocasionalmente, pero se debe limitar la acumulación sistemática de tales "
"datos en Internet."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
"points at the inside of a store, or at the street. Any camera pointed at "
@@ -623,11 +623,11 @@
"Toda cámara dirigida por alguien hacia el espacio privado de otra persona "
"constituye una violación de la privacidad, pero esa es otra cuestión."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Internet Commerce Surveillance"
msgstr "Remedio para la vigilancia del comercio en Internet"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Most data collection comes from people's own digital activities. Usually "
"the data is collected first by companies. But when it comes to the threat "
@@ -642,7 +642,7 @@
"ello se encarga una empresa, porque el Estado puede acceder sistemáticamente
"
"a los datos recolectados por las empresas."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -674,7 +674,7 @@
"compañÃas hacen ellas mismas un uso inapropiado de esos datos o se lo "
"facilitan a corredores de datos."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The goal of making journalism and democracy safe therefore requires that we "
"reduce the data collected about people by any organization, not just by the "
@@ -691,7 +691,7 @@
"más tiempo del que sea necesario para tratar alguna situación relacionada "
"con nosotros."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One of the motives for the current level of surveillance of the Internet is "
"that sites are financed through advertising based on tracking users' "
@@ -710,7 +710,7 @@
"Todos somos conscientes de que las «polÃticas de privacidad» son más
excusas "
"para violar la privacidad que compromisos para defenderla."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
@@ -734,7 +734,7 @@
"taler.net/\">GNU Taler</a>. Ahora solo necesitamos acuerdos comerciales "
"adecuados y que el Estado no los obstruya."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"A further threat from sites' collection of personal data is that security "
"breakers might get in, take it, and misuse it. This includes customers' "
@@ -748,11 +748,11 @@
"una falla de seguridad en el sitio no puede hacer daño si el sitio no sabe "
"nada de nosotros."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Travel Surveillance"
msgstr "Remedio para la vigilancia en los viajes"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We must convert digital toll collection to anonymous payment (using digital "
"cash, for instance). License-plate recognition systems recognize all "
@@ -775,7 +775,7 @@
"datos a disposición en Internet; el acceso a los datos debe limitarse a la "
"búsqueda de una lista de números de placa por orden judicial."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The U.S. “no-fly” list must be abolished because it is <a href="
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
@@ -786,7 +786,7 @@
"technology-and-liberty-racial-justice/victory-federal-court-recognizes"
"\">imposición de una pena sin juicio previo</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It is acceptable to have a list of people whose person and luggage will be "
"searched with extra care, and anonymous passengers on domestic flights could "
@@ -802,7 +802,7 @@
"vuelos a aquellos ciudadanos extranjeros que no tengan permiso para ingresar "
"al paÃs. Esto deberÃa bastar para cualquier propósito legÃtimo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Many mass transit systems use some kind of smart cards or RFIDs for "
"payment. These systems accumulate personal data: if you once make the "
@@ -820,7 +820,7 @@
"dos cosas unidas contribuyen a la vigilancia masiva. La recolección de datos
"
"debe ser reducida."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Navigation services do surveillance: the user's computer tells the map "
"service the user's location and where the user wants to go; then the server "
@@ -844,7 +844,7 @@
"la ruta y mostrarla, sin que el usuario tenga que comunicar a nadie en "
"ningún momento el lugar donde se encuentra o a donde desea dirigirse."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Systems for borrowing bicycles, etc., can be designed so that the borrower's "
"identity is known only inside the station where the item was borrowed. "
@@ -877,11 +877,11 @@
"informar a la oficina principal, y en ese caso podrÃa también enviar "
"inmediatamente los datos del prestatario."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Communications Dossiers"
msgstr "Remedio para los expedientes de comunicaciones"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
@@ -909,7 +909,7 @@
"sounds-nsa-tracking-your-location\">la NSA recoge los datos sobre la "
"ubicación de los celulares</a> en masa."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unmonitored communication is impossible where systems create such dossiers. "
"So it should be illegal to create or keep them. ISPs and phone companies "
@@ -922,7 +922,7 @@
"información por mucho tiempo, a menos que exista una orden judicial para "
"vigilar a una cierta persona."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
@@ -945,7 +945,7 @@
"retomara este tipo de vigilancia, no conseguirÃa los datos sobre todas las "
"llamadas telefónicas anteriores a esa fecha."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy about who you exchange email with, a simple partial solution is "
"for you and others to use email services in a country that would never "
@@ -971,11 +971,11 @@
"servicio, pero serÃa difÃcil determinar que usted es el remitente y yo el "
"destinatario."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "But Some Surveillance Is Necessary"
msgstr "Pero algo de vigilancia es necesaria"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For the state to find criminals, it needs to be able to investigate specific "
"crimes, or specific suspected planned crimes, under a court order. With the "
@@ -995,7 +995,7 @@
"impedimos que los sistemas digitales acumulen información masiva <i>a "
"priori</i>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1020,7 +1020,7 @@
"\">el uso de la fuerza disminuyó en un 60%</a>. La Unión Estadounidense por
"
"las Libertades Civiles está a favor de esto."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1044,7 +1044,7 @@
"accidente nuclear de Fukushima y la crisis fiscal de 2008) supera en mucho "
"el del terrorismo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, journalism must be protected from surveillance even when it is "
"carried out as part of a business."
@@ -1052,7 +1052,7 @@
"De todos modos, el periodismo debe ser protegido de la vigilancia incluso "
"cuando se lleva a cabo como parte de una actividad empresarial."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Digital technology has brought about a tremendous increase in the level of "
"surveillance of our movements, actions, and communications. It is far more "
@@ -1070,7 +1070,7 @@
"el uso de los datos acumulados por parte del Estado no modificarán la "
"situación. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Companies are designing even more intrusive surveillance. Some project that "
"pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1087,7 +1087,7 @@
"imprevisibles, pero el peligro para la democracia está fuera de discusión. "
"Existe y es tangible hoy."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unless we believe that our free countries previously suffered from a grave "
"surveillance deficit, and ought to be surveilled more than the Soviet Union "
Index: po/surveillance-vs-democracy.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.fr-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/surveillance-vs-democracy.fr-en.html 22 Oct 2016 19:28:26 -0000
1.31
+++ po/surveillance-vs-democracy.fr-en.html 6 Nov 2016 21:28:15 -0000
1.32
@@ -2,19 +2,31 @@
<!-- Parent-Version: 1.77 -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+--></style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
-<p>by <a href="http://www.stallman.org/">Richard Stallman</a></p>
+<p class="byline center">by <a href="http://www.stallman.org/">Richard
Stallman</a></p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>A version of this article was first published in Wired
+<blockquote class="center"><p>A version of this article was first published in
Wired
in October 2013.</p></blockquote>
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the
three ads that popped up on his computer screen..." /></a>
<p>“How did they find out I'm a dog?”</p>
@@ -30,7 +42,8 @@
is not exceeded? It is the level beyond which surveillance starts to
interfere with the functioning of democracy, in that whistleblowers
(such as Snowden) are likely to be caught.</p>
-
+</div>
+<div class="columns" style="clear:both">
<p>Faced with government secrecy, we the people depend on
whistleblowers
to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
@@ -60,9 +73,11 @@
suffice to protect whistleblowers if “catching the
whistleblower” is grounds for access sufficient to identify him
or her. We need to go further.</p>
+</div>
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a
Democracy</h3>
+<div class="columns">
<p>If whistleblowers don't dare reveal crimes and lies, we lose the
last shred of effective control over our government and institutions.
That's why surveillance that enables the state to find out who has
@@ -91,9 +106,11 @@
that there might be terrorists among them. The point at which
surveillance is too much is the point at which the state can find who
spoke to a known journalist or a known dissident.</p>
+</div>
-<h3>Information, Once Collected, Will Be Misused</h3>
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
+<div class="columns">
<p>When people recognize that the level of general surveillance is too
high, the first response is to propose limits on access to the
accumulated data. That sounds nice, but it won't fix the problem, not
@@ -140,9 +157,11 @@
launch a massive fishing expedition against any person. To make
journalism and democracy safe, we must limit the accumulation of data
that is easily accessible to the state.</p>
+</div>
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
+<div class="columns">
<p>The Electronic Frontier Foundation and other organizations propose
a set of legal principles designed to <a
href="https://en.necessaryandproportionate.org/text">prevent the
@@ -170,9 +189,11 @@
regime would have to implement surveillance afresh, and it would only
collect data starting at that date. As for suspending or momentarily
ignoring this law, the idea would hardly make sense.</p>
+</div>
-<h3>First, Don't Be Foolish</h3>
+<h3 class="subheader">First, Don't Be Foolish</h3>
+<div class="columns">
<p>To have privacy, you must not throw it away: the first one who has
to protect your privacy is you. Avoid identifying yourself to web
sites, contact them with Tor, and use browsers that block the schemes
@@ -213,9 +234,11 @@
movements, but not all of them. Clearly, the better solution is to
make all these systems stop surveilling people other than legitimate
suspects.</p>
+</div>
-<h3>We Must Design Every System for Privacy</h3>
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
+<div class="columns">
<p>If we don't want a total surveillance society, we must consider
surveillance a kind of social pollution, and limit the surveillance
impact of each new digital system just as we limit the environmental
@@ -233,9 +256,11 @@
period. The same benefit, with no surveillance!</p>
<p>We need to design such privacy into all our digital systems.</p>
+</div>
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
+<div class="columns">
<p>One way to make monitoring safe for privacy is
to <a name="dispersal">keep the data dispersed and inconvenient to
access</a>. Old-fashioned security cameras were no threat to privacy(<a
href="#privatespace">*</a>).
@@ -267,9 +292,11 @@
camera points at the inside of a store, or at the street. Any camera
pointed at someone's private space by someone else violates privacy,
but that is another issue.</p>
+</div>
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce
Surveillance</h3>
+<div class="columns">
<p>Most data collection comes from people's own digital activities.
Usually the data is collected first by companies. But when it comes
to the threat to privacy and democracy, it makes no difference whether
@@ -325,9 +352,11 @@
customers' credit card details. An anonymous payment system would end
this danger: a security hole in the site can't hurt you if the site
knows nothing about you.</p>
+</div>
-<h3>Remedy for Travel Surveillance</h3>
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
+<div class="columns">
<p>We must convert digital toll collection to anonymous payment (using
digital cash, for instance). License-plate recognition systems
recognize all license plates, and
@@ -382,9 +411,11 @@
remains “out” for too long, the station where it was
borrowed can inform headquarters; in that case, it could send the
borrower's identity immediately.</p>
+</div>
-<h3>Remedy for Communications Dossiers</h3>
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
+<div class="columns">
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
@@ -422,9 +453,11 @@
some user of my email service, and my email service would know only
that I received mail from some user of your email service, but it
would be hard to determine that you had sent mail to me.</p>
+</div>
-<h3>But Some Surveillance Is Necessary</h3>
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
+<div class="columns">
<p>For the state to find criminals, it needs to be able to investigate
specific crimes, or specific suspected planned crimes, under a court
order. With the Internet, the power to tap phone conversations would
@@ -458,9 +491,10 @@
<p>However, journalism must be protected from surveillance even when
it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
-<hr />
-
+<div class="reduced-width">
<p>Digital technology has brought about a tremendous increase in the
level of surveillance of our movements, actions, and communications.
It is far more than we experienced in the 1990s, and <a
@@ -480,6 +514,8 @@
a grave surveillance deficit, and ought to be surveilled more than the
Soviet Union and East Germany were, we must reverse this increase.
That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -538,7 +574,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/22 19:28:26 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/surveillance-vs-democracy.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.fr.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- po/surveillance-vs-democracy.fr.po 22 Oct 2016 18:56:02 -0000 1.80
+++ po/surveillance-vs-democracy.fr.po 6 Nov 2016 21:28:15 -0000 1.81
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-10-22 20:54+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -40,11 +40,11 @@
"Une version de cet article a été initialement publiée dans Wired en
octobre "
"2013."
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
msgid "<a href=\"/graphics/dog.html\">"
msgstr "<a href=\"/graphics/dog.html\">"
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
msgid ""
"Cartoon of a dog, wondering at the three ads that popped up on his computer "
"screen..."
@@ -52,15 +52,15 @@
"Dessin d'un chien que trois pop-ups publicitaires sur son écran d'ordinateur
"
"rendent perplexe..."
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
msgid "</a>"
msgstr "</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
msgid "“How did they find out I'm a dog?”"
msgstr "« Comment ont-ils découvert que je suis un chien ? »"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Thanks to Edward Snowden's disclosures, we know that the current level of "
"general surveillance in society is incompatible with human rights. The "
@@ -83,7 +83,7 @@
"la démocratie : lorsque des lanceurs d'alerte comme Snowden sont "
"susceptibles d'être arrêtés."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Faced with government secrecy, we the people depend on whistleblowers to <a "
"href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">tell us what "
@@ -101,7 +101,7 @@
"démocratique sur l'Ãtat, nous devons réduire la surveillance jusqu'à un "
"point où les lanceurs d'alerte se sentent en sécurité."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -130,7 +130,7 @@
"href=\"http://www.wired.com/opinion/2013/10/149481/\">cela ne protège pas "
"notre vie privée dès l'instant où nous mettons les pieds sur Internet</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
@@ -149,11 +149,11 @@
"un motif valable pour accéder à des données permettant de l'identifier.
Nous "
"devons aller plus loin encore."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "The Upper Limit on Surveillance in a Democracy"
msgstr "Le niveau de surveillance à ne pas dépasser dans une démocratie"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
"of effective control over our government and institutions. That's why "
@@ -166,7 +166,7 @@
"permet à l'Ãtat de savoir qui a parlé à un journaliste va trop loin â
au "
"delà de ce que peut supporter la démocratie."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
@@ -197,7 +197,7 @@
"verizon-2013-06-07\">aux autres opérateurs</a>, pour tous les relevés "
"téléphoniques de chaque résident."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
@@ -217,11 +217,11 @@
"devient trop importante quand l'Ãtat peut trouver qui a parlé à une
personne "
"connue comme journaliste ou comme opposant."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Information, Once Collected, Will Be Misused"
msgstr "L'information, une fois collectée, sera utilisée à de mauvaises
fins"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
@@ -247,7 +247,7 @@
"« espion » fournira une excuse pour avoir accès à l'ensemble des "
"informations."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
@@ -279,7 +279,7 @@
"s'est amplifiée avec les <a href=\"https://theyarewatching.org/issues/risks-"
"increase-once-data-shared\"> nouveaux systèmes numériques</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -297,7 +297,7 @@
"citizens/\">en Europe</a> et <a href=\"https://fr.wikipedia.org/wiki/"
"Internement_des_Nippo-Am%C3%A9ricains\"> aux Ãtats-Unis</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Personal data collected by the state is also likely to be obtained by "
"outside crackers that break the security of the servers, even by <a href="
@@ -311,7 +311,7 @@
"\"https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-"
"revealed-even-worse-than-first.shtml\"> au service d'Ãtats hostiles</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Governments can easily use massive surveillance capability to <a href="
"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
@@ -322,7 +322,7 @@
"macedonia-government-is-blamed-for-wiretapping-scandal.html\"> corrompre la "
"démocratie directement</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Total surveillance accessible to the state enables the state to launch a "
"massive fishing expedition against any person. To make journalism and "
@@ -335,11 +335,11 @@
"devons limiter l'accumulation des données qui sont facilement accessibles Ã
"
"l'Ãtat."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Robust Protection for Privacy Must Be Technical"
msgstr "Une protection solide de la vie privée doit être technique"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The Electronic Frontier Foundation and other organizations propose a set of "
"legal principles designed to <a href=\"https://en.necessaryandproportionate."
@@ -359,7 +359,7 @@
"intégralité et qu'on les faisait respecter sans la moindre exception, Ã
tout "
"jamais."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -370,7 +370,7 @@
"dite <cite>FISA Amendments Act</cite>), suspendus ou <a href=\"http://www."
"nytimes.com/2009/04/16/us/16nsa.html\">ignorés</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Meanwhile, demagogues will cite the usual excuses as grounds for total "
"surveillance; any terrorist attack, even one that kills just a handful of "
@@ -381,7 +381,7 @@
"attaque faisant un nombre réduit de victimes, peut être montée en épingle
"
"pour leur en donner l'opportunité."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If limits on access to the data are set aside, it will be as if they had "
"never existed: years worth of dossiers would suddenly become available for "
@@ -404,11 +404,11 @@
"données à partir de ce moment-là seulement. Quant à suspendre cette loi
ou "
"ne pas l'appliquer momentanément, cela n'aurait presque aucun sens."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "First, Don't Be Foolish"
msgstr "En premier lieu, ne soyez pas imprudent"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"To have privacy, you must not throw it away: the first one who has to "
"protect your privacy is you. Avoid identifying yourself to web sites, "
@@ -424,7 +424,7 @@
"abbr> (le gardien de la vie privée) pour chiffrer le contenu de vos "
"courriels. Payez en liquide."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Keep your own data; don't store your data in a company's “"
"convenient” server. It's safe, however, to entrust a data backup to a "
@@ -438,7 +438,7 @@
"envoyer au serveur vous les chiffriez avec un logiciel libre sur votre "
"propre ordinateur (y compris les noms de fichiers)."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy's sake, you must avoid nonfree software since, as a consequence "
"of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -455,7 +455,7 @@
"a> : outre que cela donne à d'autres la maîtrise de votre informatique,
cela "
"vous oblige à fournir toutes les données pertinentes au serveur."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -479,7 +479,7 @@
"vôtre, car cela pousserait d'autres personnes à abandonner leurs droits à "
"une vie privée."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Self-protection is essential, but even the most rigorous self-protection is "
"insufficient to protect your privacy on or from systems that don't belong to "
@@ -499,11 +499,11 @@
"meilleure solution est d'obliger ces systèmes à cesser de surveiller les "
"gens qui sont pas légitimement suspects."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "We Must Design Every System for Privacy"
msgstr "Nous devons intégrer à chaque système le respect de la vie privée"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we don't want a total surveillance society, we must consider surveillance "
"a kind of social pollution, and limit the surveillance impact of each new "
@@ -516,7 +516,7 @@
"la même manière que nous limitons l'impact des objets manufacturés sur "
"l'environnement."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For example: “smart” meters for electricity are touted for "
"sending the power company moment-by-moment data about each customer's "
@@ -540,17 +540,17 @@
"consommation moyenne de ses voisins au cours de la période de son choix. "
"Mêmes avantages, sans la surveillance !"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid "We need to design such privacy into all our digital systems."
msgstr ""
"Il nous faut intégrer le respect de la vie privée à tous nos systèmes "
"numériques, dès leur conception."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Collecting Data: Leaving It Dispersed"
msgstr "Remède à la collecte de données : les garder dispersées"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
"the data dispersed and inconvenient to access</a>. Old-fashioned security "
@@ -572,7 +572,7 @@
"aurait été impossible de rassembler physiquement des millions de bandes par
"
"jour, puis de les visionner ou de les copier."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Nowadays, security cameras have become surveillance cameras: they are "
"connected to the Internet so recordings can be collected in a data center "
@@ -589,7 +589,7 @@
"être pas loin où les journalistes « suspects » pourront être pistés
sans "
"interruption dans la rue afin de surveiller qui sont leurs interlocuteurs."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet-connected cameras often have lousy digital security themselves, "
"which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-"
@@ -613,7 +613,7 @@
"photos et des enregistrements vidéo une fois de temps en temps, mais on doit
"
"limiter l'accumulation systématique de ces données."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
"points at the inside of a store, or at the street. Any camera pointed at "
@@ -625,11 +625,11 @@
"caméra pointée par quelqu'un vers l'espace privé de quelqu'un d'autre
viole "
"sa vie privée, mais c'est une autre question."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Internet Commerce Surveillance"
msgstr "Remède à la surveillance du commerce sur Internet"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Most data collection comes from people's own digital activities. Usually "
"the data is collected first by companies. But when it comes to the threat "
@@ -645,7 +645,7 @@
"rassemblées par les entreprises sont systématiquement mises à la
disposition "
"de l'Ãtat."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -677,7 +677,7 @@
"plus, beaucoup de ces entreprises en font elle-mêmes mauvais usage, ou bien "
"les fournissent à des courtiers en données."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The goal of making journalism and democracy safe therefore requires that we "
"reduce the data collected about people by any organization, not just by the "
@@ -695,7 +695,7 @@
"garder que pour une période dépassant de peu le strict minimum nécessaire
au "
"traitement de ces transactions."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One of the motives for the current level of surveillance of the Internet is "
"that sites are financed through advertising based on tracking users' "
@@ -715,7 +715,7 @@
"« politiques relatives à la vie privée » sont davantage un prétexte
pour "
"violer celle-ci qu'un engagement à la respecter."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
@@ -740,7 +740,7 @@
"Taler</a>. Tout ce dont nous avons besoin maintenant, ce sont d'accords "
"commerciaux adaptés et que l'Ãtat n'y fasse pas obstruction."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"A further threat from sites' collection of personal data is that security "
"breakers might get in, take it, and misuse it. This includes customers' "
@@ -754,11 +754,11 @@
"faille de sécurité du site ne peut pas vous nuire si le site ne sait rien
de "
"vous."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Travel Surveillance"
msgstr "Remède à la surveillance des déplacements"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We must convert digital toll collection to anonymous payment (using digital "
"cash, for instance). License-plate recognition systems recognize all "
@@ -782,7 +782,7 @@
"Internet ; l'accès aux données doit être limité à la recherche d'une
série "
"de plaques minéralogiques faisant l'objet d'une décision de justice."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The U.S. “no-fly” list must be abolished because it is <a href="
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
@@ -792,7 +792,7 @@
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
"justice/victory-federal-court-recognizes\">punishment without trial</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It is acceptable to have a list of people whose person and luggage will be "
"searched with extra care, and anonymous passengers on domestic flights could "
@@ -809,7 +809,7 @@
"des Ãtats-Unis si elles n'ont pas la permission d'y rentrer. Cela devrait "
"suffire à toutes les fins légitimes."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Many mass transit systems use some kind of smart cards or RFIDs for "
"payment. These systems accumulate personal data: if you once make the "
@@ -826,7 +826,7 @@
"L'un dans l'autre, cela équivaut à un système de surveillance à grande "
"échelle. Il faut diminuer cette collecte de données."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Navigation services do surveillance: the user's computer tells the map "
"service the user's location and where the user wants to go; then the server "
@@ -850,7 +850,7 @@
"calculer l'itinéraire et l'afficher, sans jamais dire à qui que ce soit "
"l'endroit où l'utilisateur veut aller."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Systems for borrowing bicycles, etc., can be designed so that the borrower's "
"identity is known only inside the station where the item was borrowed. "
@@ -881,11 +881,11 @@
"informer le siège social et, dans ce cas, lui envoyer immédiatement "
"l'identité du client."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Communications Dossiers"
msgstr "Remède aux dossiers sur les communications"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
@@ -913,7 +913,7 @@
"sounds-nsa-tracking-your-location\">la NSA collecte les coordonnées "
"géographiques des téléphones mobiles</a>, en masse."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unmonitored communication is impossible where systems create such dossiers. "
"So it should be illegal to create or keep them. ISPs and phone companies "
@@ -927,7 +927,7 @@
"longtemps, sauf décision judiciaire leur enjoignant de surveiller une "
"personne ou un groupe en particulier."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
@@ -950,7 +950,7 @@
"effectivement à faire cette sorte de surveillance, il n'obtiendrait pas les "
"données sur les appels téléphoniques passés avant cette date."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy about who you exchange email with, a simple partial solution is "
"for you and others to use email services in a country that would never "
@@ -975,11 +975,11 @@
"de courriel, mais il serait difficile de déterminer que c'était moi le "
"destinataire."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "But Some Surveillance Is Necessary"
msgstr "Mais un minimum de surveillance est nécessaire."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For the state to find criminals, it needs to be able to investigate specific "
"crimes, or specific suspected planned crimes, under a court order. With the "
@@ -999,7 +999,7 @@
"après les faits, si (comme je le recommande) nous empêchons les systèmes "
"numériques d'accumuler d'énormes dossiers avant les faits."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1026,7 +1026,7 @@
"kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">l'usage de la "
"force diminuer de près de 60 %</a>. L'ACLU y est favorable."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1050,7 +1050,7 @@
"nucléaires de Fukushima ou à la crise financière de 2008) dépasse de loin
"
"celui du terrorisme."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, journalism must be protected from surveillance even when it is "
"carried out as part of a business."
@@ -1058,7 +1058,7 @@
"Cependant, le journalisme doit être protégé contre la surveillance, même "
"s'il est réalisé dans un cadre commercial."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Digital technology has brought about a tremendous increase in the level of "
"surveillance of our movements, actions, and communications. It is far more "
@@ -1076,7 +1076,7 @@
"l'utilisation par l'Ãtat des données accumulées, telles qu'elles sont "
"proposées, qui y changeraient quoi que ce soit."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Companies are designing even more intrusive surveillance. Some project that "
"pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1094,7 +1094,7 @@
"n'est pas du domaine de la spéculation. Il existe bien et il est visible "
"aujourd'hui."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unless we believe that our free countries previously suffered from a grave "
"surveillance deficit, and ought to be surveilled more than the Soviet Union "
Index: po/surveillance-vs-democracy.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/surveillance-vs-democracy.it-en.html 27 Oct 2016 20:58:40 -0000
1.24
+++ po/surveillance-vs-democracy.it-en.html 6 Nov 2016 21:28:15 -0000
1.25
@@ -2,19 +2,31 @@
<!-- Parent-Version: 1.77 -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+--></style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
-<p>by <a href="http://www.stallman.org/">Richard Stallman</a></p>
+<p class="byline center">by <a href="http://www.stallman.org/">Richard
Stallman</a></p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>A version of this article was first published in Wired
+<blockquote class="center"><p>A version of this article was first published in
Wired
in October 2013.</p></blockquote>
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the
three ads that popped up on his computer screen..." /></a>
<p>“How did they find out I'm a dog?”</p>
@@ -30,7 +42,8 @@
is not exceeded? It is the level beyond which surveillance starts to
interfere with the functioning of democracy, in that whistleblowers
(such as Snowden) are likely to be caught.</p>
-
+</div>
+<div class="columns" style="clear:both">
<p>Faced with government secrecy, we the people depend on
whistleblowers
to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
@@ -60,9 +73,11 @@
suffice to protect whistleblowers if “catching the
whistleblower” is grounds for access sufficient to identify him
or her. We need to go further.</p>
+</div>
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a
Democracy</h3>
+<div class="columns">
<p>If whistleblowers don't dare reveal crimes and lies, we lose the
last shred of effective control over our government and institutions.
That's why surveillance that enables the state to find out who has
@@ -91,9 +106,11 @@
that there might be terrorists among them. The point at which
surveillance is too much is the point at which the state can find who
spoke to a known journalist or a known dissident.</p>
+</div>
-<h3>Information, Once Collected, Will Be Misused</h3>
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
+<div class="columns">
<p>When people recognize that the level of general surveillance is too
high, the first response is to propose limits on access to the
accumulated data. That sounds nice, but it won't fix the problem, not
@@ -140,9 +157,11 @@
launch a massive fishing expedition against any person. To make
journalism and democracy safe, we must limit the accumulation of data
that is easily accessible to the state.</p>
+</div>
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
+<div class="columns">
<p>The Electronic Frontier Foundation and other organizations propose
a set of legal principles designed to <a
href="https://en.necessaryandproportionate.org/text">prevent the
@@ -170,9 +189,11 @@
regime would have to implement surveillance afresh, and it would only
collect data starting at that date. As for suspending or momentarily
ignoring this law, the idea would hardly make sense.</p>
+</div>
-<h3>First, Don't Be Foolish</h3>
+<h3 class="subheader">First, Don't Be Foolish</h3>
+<div class="columns">
<p>To have privacy, you must not throw it away: the first one who has
to protect your privacy is you. Avoid identifying yourself to web
sites, contact them with Tor, and use browsers that block the schemes
@@ -213,9 +234,11 @@
movements, but not all of them. Clearly, the better solution is to
make all these systems stop surveilling people other than legitimate
suspects.</p>
+</div>
-<h3>We Must Design Every System for Privacy</h3>
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
+<div class="columns">
<p>If we don't want a total surveillance society, we must consider
surveillance a kind of social pollution, and limit the surveillance
impact of each new digital system just as we limit the environmental
@@ -233,9 +256,11 @@
period. The same benefit, with no surveillance!</p>
<p>We need to design such privacy into all our digital systems.</p>
+</div>
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
+<div class="columns">
<p>One way to make monitoring safe for privacy is
to <a name="dispersal">keep the data dispersed and inconvenient to
access</a>. Old-fashioned security cameras were no threat to privacy(<a
href="#privatespace">*</a>).
@@ -267,9 +292,11 @@
camera points at the inside of a store, or at the street. Any camera
pointed at someone's private space by someone else violates privacy,
but that is another issue.</p>
+</div>
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce
Surveillance</h3>
+<div class="columns">
<p>Most data collection comes from people's own digital activities.
Usually the data is collected first by companies. But when it comes
to the threat to privacy and democracy, it makes no difference whether
@@ -325,9 +352,11 @@
customers' credit card details. An anonymous payment system would end
this danger: a security hole in the site can't hurt you if the site
knows nothing about you.</p>
+</div>
-<h3>Remedy for Travel Surveillance</h3>
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
+<div class="columns">
<p>We must convert digital toll collection to anonymous payment (using
digital cash, for instance). License-plate recognition systems
recognize all license plates, and
@@ -382,9 +411,11 @@
remains “out” for too long, the station where it was
borrowed can inform headquarters; in that case, it could send the
borrower's identity immediately.</p>
+</div>
-<h3>Remedy for Communications Dossiers</h3>
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
+<div class="columns">
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
@@ -422,9 +453,11 @@
some user of my email service, and my email service would know only
that I received mail from some user of your email service, but it
would be hard to determine that you had sent mail to me.</p>
+</div>
-<h3>But Some Surveillance Is Necessary</h3>
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
+<div class="columns">
<p>For the state to find criminals, it needs to be able to investigate
specific crimes, or specific suspected planned crimes, under a court
order. With the Internet, the power to tap phone conversations would
@@ -458,9 +491,10 @@
<p>However, journalism must be protected from surveillance even when
it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
-<hr />
-
+<div class="reduced-width">
<p>Digital technology has brought about a tremendous increase in the
level of surveillance of our movements, actions, and communications.
It is far more than we experienced in the 1990s, and <a
@@ -480,6 +514,8 @@
a grave surveillance deficit, and ought to be surveilled more than the
Soviet Union and East Germany were, we must reverse this increase.
That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -538,7 +574,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/27 20:58:40 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/surveillance-vs-democracy.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- po/surveillance-vs-democracy.it.po 27 Oct 2016 20:58:40 -0000 1.80
+++ po/surveillance-vs-democracy.it.po 6 Nov 2016 21:28:15 -0000 1.81
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-10-27 22:24+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian\n"
@@ -39,11 +39,11 @@
"La prima versione di questo articolo è stata pubblicata su Wired nel mese di
"
"ottobre 2013."
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
msgid "<a href=\"/graphics/dog.html\">"
msgstr "<a href=\"/graphics/dog.html\">"
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
msgid ""
"Cartoon of a dog, wondering at the three ads that popped up on his computer "
"screen..."
@@ -52,15 +52,15 @@
"pubblicitari sul suo monitor..."
# type: Content of: <table><tr><td>
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
msgid "</a>"
msgstr "</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
msgid "“How did they find out I'm a dog?”"
msgstr "“Come fanno a sapere che sono un cane?”"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Thanks to Edward Snowden's disclosures, we know that the current level of "
"general surveillance in society is incompatible with human rights. The "
@@ -81,7 +81,7 @@
"accade quando la sorveglianza interferisce con il funzionamento della "
"democrazia: quando gli informatori (come Snowden) possono essere scoperti."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Faced with government secrecy, we the people depend on whistleblowers to <a "
"href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">tell us what "
@@ -97,7 +97,7 @@
"democratico sullo stato, dobbiamo ridurre la sorveglianza fino a un punto in "
"cui tutti gli informatori sappiano che non possono essere scoperti."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -125,7 +125,7 @@
"opinion/2013/10/149481/\">non è in grado di proteggere la nostra privacy</a>
"
"quando mettiamo piede su Internet."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
@@ -142,11 +142,11 @@
"nostri dossier virtuali. Ciò non basterà a proteggere gli informatori se "
"âbeccarliâ è motivo sufficiente a identificarli. Dobbiamo spingerci
oltre."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "The Upper Limit on Surveillance in a Democracy"
msgstr "Il limite massimo di sorveglianza in una democrazia"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
"of effective control over our government and institutions. That's why "
@@ -159,7 +159,7 @@
"scoprire chi ha parlato con un giornalista è eccessiva; più di quanto sia "
"ammissibile in democrazia."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
@@ -188,7 +188,7 @@
"\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
"verizon-2013-06-07\"> agli altri gestori</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
@@ -206,11 +206,11 @@
"cui la sorveglianza diventa eccessiva è quello in cui lo stato può scoprire
"
"chi ha parlato con un certo giornalista o dissidente noto."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Information, Once Collected, Will Be Misused"
msgstr "Una volta raccolte, le informazioni saranno usate in modi impropri"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
@@ -232,7 +232,7 @@
"lâaccesso ai dati, per cui se un informatore viene accusato di
âspionaggioâ, "
"localizzare la âspiaâ fornirà la scusa per accedere ai materiali
accumulati."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
@@ -263,7 +263,7 @@
"più comune con <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">i nuovi sistemi digitali</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -281,7 +281,7 @@
"\"https://en.wikipedia.org/wiki/Japanese_American_internment\"> negli Stati "
"Uniti</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Personal data collected by the state is also likely to be obtained by "
"outside crackers that break the security of the servers, even by <a href="
@@ -294,7 +294,7 @@
"\"https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-"
"revealed-even-worse-than-first.shtml\">lavorano per potenze nemiche</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Governments can easily use massive surveillance capability to <a href="
"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
@@ -304,7 +304,7 @@
"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">sovvertire la democrazia</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Total surveillance accessible to the state enables the state to launch a "
"massive fishing expedition against any person. To make journalism and "
@@ -316,11 +316,11 @@
"il giornalismo e la democrazia, dobbiamo limitare lâaccumulazione di dati "
"facilmente accessibili allo stato."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Robust Protection for Privacy Must Be Technical"
msgstr "Una forte tutela della privacy devâessere tecnica"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The Electronic Frontier Foundation and other organizations propose a set of "
"legal principles designed to <a href=\"https://en.necessaryandproportionate."
@@ -337,7 +337,7 @@
"difenderebbero adeguatamente le libertà democratiche, se venissero adottati "
"completamente e fatti rispettare senza eccezioni per sempre."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -348,7 +348,7 @@
"sospese o <a href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\"> "
"ignorate</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Meanwhile, demagogues will cite the usual excuses as grounds for total "
"surveillance; any terrorist attack, even one that kills just a handful of "
@@ -358,7 +358,7 @@
"sorveglianza totale; qualsiasi attacco terroristico, persino se uccide solo "
"poche persone, può essere strumentalizzato a questo fine."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If limits on access to the data are set aside, it will be as if they had "
"never existed: years worth of dossiers would suddenly become available for "
@@ -380,11 +380,11 @@
"da quel momento. Quanto a sospendere o ignorare temporaneamente questa "
"legge, lâidea sarebbe priva di senso."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "First, Don't Be Foolish"
msgstr "Primo, non essere sciocchi"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"To have privacy, you must not throw it away: the first one who has to "
"protect your privacy is you. Avoid identifying yourself to web sites, "
@@ -399,7 +399,7 @@
"Inoltre è bene usare GNU Privacy Guard per cifrare il contenuto dei propri "
"messaggi e pagare sempre in contanti."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Keep your own data; don't store your data in a company's “"
"convenient” server. It's safe, however, to entrust a data backup to a "
@@ -413,7 +413,7 @@
"archivio, nomi di file compresi, sia criptato con software libero sul vostro "
"computer prima dell'upload."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy's sake, you must avoid nonfree software since, as a consequence "
"of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -430,7 +430,7 @@
"a>; oltre a dare il controllo delle vostre operazioni informatiche ad altri, "
"vi costringe a consegnare ad un server tutti i relativi dati."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -453,7 +453,7 @@
"anche se questo non costituisce un problema per l'individuo in sè, mette "
"pressione agli altri affinché cedano la propria privacy."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Self-protection is essential, but even the most rigorous self-protection is "
"insufficient to protect your privacy on or from systems that don't belong to "
@@ -471,11 +471,11 @@
"la migliore soluzione sarebbe che tutti questi sistemi smettessero di "
"sorvegliare persone non sospette."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "We Must Design Every System for Privacy"
msgstr "Dobbiamo progettare tutti i sistemi tenendo a mente la privacy"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we don't want a total surveillance society, we must consider surveillance "
"a kind of social pollution, and limit the surveillance impact of each new "
@@ -487,7 +487,7 @@
"ogni nuovo sistema digitale proprio come limitiamo lâimpatto ambientale "
"delle costruzioni fisiche."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For example: “smart” meters for electricity are touted for "
"sending the power company moment-by-moment data about each customer's "
@@ -511,17 +511,17 @@
"lâandamento medio dei consumi di quel periodo. Stessi vantaggi, nessuna "
"sorveglianza!"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid "We need to design such privacy into all our digital systems."
msgstr ""
"Dobbiamo incorporare la privacy in questo modo in tutti i nostri sistemi "
"digitali."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Collecting Data: Leaving It Dispersed"
msgstr "Un rimedio alla raccolta dei dati: lasciarli dispersi"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
"the data dispersed and inconvenient to access</a>. Old-fashioned security "
@@ -542,7 +542,7 @@
"fattibile raccogliere fisicamente milioni di nastri ogni giorno e guardarli "
"o copiarli tutti."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Nowadays, security cameras have become surveillance cameras: they are "
"connected to the Internet so recordings can be collected in a data center "
@@ -559,7 +559,7 @@
"sospetti vengano seguiti per le strade costantemente per scoprire con chi "
"parlano."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet-connected cameras often have lousy digital security themselves, "
"which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-"
@@ -581,7 +581,7 @@
"liberi di pubblicare foto e video ogni tanto, ma lâaccumulazione
sistematica "
"di tali dati su Internet devâessere limitata."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
"points at the inside of a store, or at the street. Any camera pointed at "
@@ -593,11 +593,11 @@
"verso la strada. Qualsiasi telecamera puntata da qualcuno verso lo spazio "
"privato di qualcun altro viola la privacy, ma questa è un'altra questione."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Internet Commerce Surveillance"
msgstr "Un rimedio alla sorveglianza dellâe-commerce"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Most data collection comes from people's own digital activities. Usually "
"the data is collected first by companies. But when it comes to the threat "
@@ -612,7 +612,7 @@
"unâimpresa, perché i dati raccolti dalle società sono sistematicamente a "
"disposizione dello stato."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -642,7 +642,7 @@
"Tra l'altro, molte di quelle aziende fanno cattivo uso dei dati, "
"direttamente o tramite trafficanti di dati."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The goal of making journalism and democracy safe therefore requires that we "
"reduce the data collected about people by any organization, not just by the "
@@ -658,7 +658,7 @@
"nostre transazioni, non devono poterle conservare più del breve tempo "
"strettamente necessario a interagire con noi."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One of the motives for the current level of surveillance of the Internet is "
"that sites are financed through advertising based on tracking users' "
@@ -677,7 +677,7 @@
"le âpolitiche sulla privacyâ sono più una scusa per violare la privacy
che "
"un impegno a rispettarla."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
@@ -701,7 +701,7 @@
"si chiama <a href=\"http://taler.net/\">GNU Taler</a>. Ora ci occorrono solo "
"dei modelli di business adatti, che non vengano intralciati dallo stato."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"A further threat from sites' collection of personal data is that security "
"breakers might get in, take it, and misuse it. This includes customers' "
@@ -714,11 +714,11 @@
"di pagamenti anonimi porrebbe fine a questo rischio: una falla di sicurezza "
"in un sito non può danneggiarvi se il sito non sa niente di voi."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Travel Surveillance"
msgstr "Un rimedio alla sorveglianza dei trasporti"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We must convert digital toll collection to anonymous payment (using digital "
"cash, for instance). License-plate recognition systems recognize all "
@@ -742,7 +742,7 @@
"andrebbe limitato alle ricerche di numeri di targa soggetti a ordini del "
"tribunale."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The U.S. “no-fly” list must be abolished because it is <a href="
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
@@ -752,7 +752,7 @@
"href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-"
"racial-justice/victory-federal-court-recognizes\"> pena senza processo</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It is acceptable to have a list of people whose person and luggage will be "
"searched with extra care, and anonymous passengers on domestic flights could "
@@ -768,7 +768,7 @@
"paese, dâimbarcarsi sui voli che hanno il paese come destinazione. Questo "
"dovrebbe essere sufficiente per tutti gli scopi legittimi."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Many mass transit systems use some kind of smart cards or RFIDs for "
"payment. These systems accumulate personal data: if you once make the "
@@ -784,7 +784,7 @@
"associati a ogni carta. Tutto ciò si somma fino a costituire una "
"sorveglianza imponente. Questa raccolta di dati devâessere ridotta."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Navigation services do surveillance: the user's computer tells the map "
"service the user's location and where the user wants to go; then the server "
@@ -807,7 +807,7 @@
"precedenza), calcolare il percorso e visualizzarlo, senza mai dire a nessuno "
"dove si trova lâutente e dove vuole andare."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Systems for borrowing bicycles, etc., can be designed so that the borrower's "
"identity is known only inside the station where the item was borrowed. "
@@ -839,11 +839,11 @@
"prestito può informare la sede centrale; in quel caso potrebbe inviare "
"immediatamente lâidentità dellâutente."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Communications Dossiers"
msgstr "Un rimedio ai dossier sulle comunicazioni"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
@@ -870,7 +870,7 @@
"nsa-tracking-your-location\">raccolga in massa i dati</a> di localizzazione "
"dei telefoni cellulari."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unmonitored communication is impossible where systems create such dossiers. "
"So it should be illegal to create or keep them. ISPs and phone companies "
@@ -883,7 +883,7 @@
"concesso mantenere queste informazioni per lunghi periodi, in assenza di un "
"mandato del tribunale a sorvegliare un dato soggetto."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
@@ -906,7 +906,7 @@
"genere di sorveglianza, non raccoglierebbe dati su tutte le conversazioni "
"telefoniche anteriori a quel periodo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy about who you exchange email with, a simple partial solution is "
"for you and others to use email services in a country that would never "
@@ -929,11 +929,11 @@
"B, ma sarebbe difficile per chi intercetta capire che le persone A e B si "
"sono scambiate messaggi."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "But Some Surveillance Is Necessary"
msgstr "Ma una certa dose di sorveglianza è necessaria"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For the state to find criminals, it needs to be able to investigate specific "
"crimes, or specific suspected planned crimes, under a court order. With the "
@@ -952,7 +952,7 @@
"informatori dopo il fatto, se (come consigliamo) evitiamo che i sistemi "
"digitali accumulino immensi dossier prima del fatto."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -977,7 +977,7 @@
"com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">diminuito "
"del 60%</a>). LâACLU è favorevole a questo provvedimento."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -999,7 +999,7 @@
"pensi al disastro di British Petroleum, allâincidente di Fukushima e alla "
"crisi fiscale del 2008) è infinitamente maggiore di quello del terrorismo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, journalism must be protected from surveillance even when it is "
"carried out as part of a business."
@@ -1007,7 +1007,7 @@
"Il giornalismo, però, devâessere protetto dalla sorveglianza anche quando
è "
"condotto nellâambito di unâimpresa."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Digital technology has brought about a tremendous increase in the level of "
"surveillance of our movements, actions, and communications. It is far more "
@@ -1024,7 +1024,7 @@
"Ferro</a> negli anni Ottanta, e le suggerite limitazioni legali allâuso dei
"
"dati accumulati da parte dello stato non cambierebbero la situazione."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Companies are designing even more intrusive surveillance. Some project that "
"pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1041,7 +1041,7 @@
"ma la minaccia alla democrazia non è speculazione: esiste ed è visibile giÃ
"
"oggi."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unless we believe that our free countries previously suffered from a grave "
"surveillance deficit, and ought to be surveilled more than the Soviet Union "
Index: po/surveillance-vs-democracy.ja-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ja-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/surveillance-vs-democracy.ja-en.html 31 Oct 2016 04:28:15 -0000
1.9
+++ po/surveillance-vs-democracy.ja-en.html 6 Nov 2016 21:28:15 -0000
1.10
@@ -2,19 +2,31 @@
<!-- Parent-Version: 1.77 -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+--></style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
-<p>by <a href="http://www.stallman.org/">Richard Stallman</a></p>
+<p class="byline center">by <a href="http://www.stallman.org/">Richard
Stallman</a></p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>A version of this article was first published in Wired
+<blockquote class="center"><p>A version of this article was first published in
Wired
in October 2013.</p></blockquote>
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the
three ads that popped up on his computer screen..." /></a>
<p>“How did they find out I'm a dog?”</p>
@@ -30,7 +42,8 @@
is not exceeded? It is the level beyond which surveillance starts to
interfere with the functioning of democracy, in that whistleblowers
(such as Snowden) are likely to be caught.</p>
-
+</div>
+<div class="columns" style="clear:both">
<p>Faced with government secrecy, we the people depend on
whistleblowers
to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
@@ -60,9 +73,11 @@
suffice to protect whistleblowers if “catching the
whistleblower” is grounds for access sufficient to identify him
or her. We need to go further.</p>
+</div>
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a
Democracy</h3>
+<div class="columns">
<p>If whistleblowers don't dare reveal crimes and lies, we lose the
last shred of effective control over our government and institutions.
That's why surveillance that enables the state to find out who has
@@ -91,9 +106,11 @@
that there might be terrorists among them. The point at which
surveillance is too much is the point at which the state can find who
spoke to a known journalist or a known dissident.</p>
+</div>
-<h3>Information, Once Collected, Will Be Misused</h3>
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
+<div class="columns">
<p>When people recognize that the level of general surveillance is too
high, the first response is to propose limits on access to the
accumulated data. That sounds nice, but it won't fix the problem, not
@@ -140,9 +157,11 @@
launch a massive fishing expedition against any person. To make
journalism and democracy safe, we must limit the accumulation of data
that is easily accessible to the state.</p>
+</div>
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
+<div class="columns">
<p>The Electronic Frontier Foundation and other organizations propose
a set of legal principles designed to <a
href="https://en.necessaryandproportionate.org/text">prevent the
@@ -170,9 +189,11 @@
regime would have to implement surveillance afresh, and it would only
collect data starting at that date. As for suspending or momentarily
ignoring this law, the idea would hardly make sense.</p>
+</div>
-<h3>First, Don't Be Foolish</h3>
+<h3 class="subheader">First, Don't Be Foolish</h3>
+<div class="columns">
<p>To have privacy, you must not throw it away: the first one who has
to protect your privacy is you. Avoid identifying yourself to web
sites, contact them with Tor, and use browsers that block the schemes
@@ -213,9 +234,11 @@
movements, but not all of them. Clearly, the better solution is to
make all these systems stop surveilling people other than legitimate
suspects.</p>
+</div>
-<h3>We Must Design Every System for Privacy</h3>
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
+<div class="columns">
<p>If we don't want a total surveillance society, we must consider
surveillance a kind of social pollution, and limit the surveillance
impact of each new digital system just as we limit the environmental
@@ -233,9 +256,11 @@
period. The same benefit, with no surveillance!</p>
<p>We need to design such privacy into all our digital systems.</p>
+</div>
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
+<div class="columns">
<p>One way to make monitoring safe for privacy is
to <a name="dispersal">keep the data dispersed and inconvenient to
access</a>. Old-fashioned security cameras were no threat to privacy(<a
href="#privatespace">*</a>).
@@ -267,9 +292,11 @@
camera points at the inside of a store, or at the street. Any camera
pointed at someone's private space by someone else violates privacy,
but that is another issue.</p>
+</div>
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce
Surveillance</h3>
+<div class="columns">
<p>Most data collection comes from people's own digital activities.
Usually the data is collected first by companies. But when it comes
to the threat to privacy and democracy, it makes no difference whether
@@ -325,9 +352,11 @@
customers' credit card details. An anonymous payment system would end
this danger: a security hole in the site can't hurt you if the site
knows nothing about you.</p>
+</div>
-<h3>Remedy for Travel Surveillance</h3>
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
+<div class="columns">
<p>We must convert digital toll collection to anonymous payment (using
digital cash, for instance). License-plate recognition systems
recognize all license plates, and
@@ -382,9 +411,11 @@
remains “out” for too long, the station where it was
borrowed can inform headquarters; in that case, it could send the
borrower's identity immediately.</p>
+</div>
-<h3>Remedy for Communications Dossiers</h3>
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
+<div class="columns">
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
@@ -422,9 +453,11 @@
some user of my email service, and my email service would know only
that I received mail from some user of your email service, but it
would be hard to determine that you had sent mail to me.</p>
+</div>
-<h3>But Some Surveillance Is Necessary</h3>
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
+<div class="columns">
<p>For the state to find criminals, it needs to be able to investigate
specific crimes, or specific suspected planned crimes, under a court
order. With the Internet, the power to tap phone conversations would
@@ -458,9 +491,10 @@
<p>However, journalism must be protected from surveillance even when
it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
-<hr />
-
+<div class="reduced-width">
<p>Digital technology has brought about a tremendous increase in the
level of surveillance of our movements, actions, and communications.
It is far more than we experienced in the 1990s, and <a
@@ -480,6 +514,8 @@
a grave surveillance deficit, and ought to be surveilled more than the
Soviet Union and East Germany were, we must reverse this increase.
That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -538,7 +574,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/31 04:28:15 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/surveillance-vs-democracy.ja.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ja.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/surveillance-vs-democracy.ja.po 31 Oct 2016 04:28:15 -0000 1.35
+++ po/surveillance-vs-democracy.ja.po 6 Nov 2016 21:28:15 -0000 1.36
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-08-29 13:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -35,25 +35,25 @@
msgid "A version of this article was first published in Wired in October 2013."
msgstr
"ãã®å°è«ã®çã¯æåã«Wiredã§013å¹´10æã«çºè¡¨ããã¾ããã"
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
msgid "<a href=\"/graphics/dog.html\">"
msgstr "<a href=\"/graphics/dog.html\">"
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
msgid ""
"Cartoon of a dog, wondering at the three ads that popped up on his computer "
"screen..."
msgstr
"ã³ã³ãã¥ã¼ã¿ã®ç»é¢ã«ç¾ããä¸ã¤ã®åºåãè¨ãç¬ã®æ¼«ç»..."
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
msgid "</a>"
msgstr "</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
msgid "“How did they find out I'm a dog?”"
msgstr "ãã©ããã£ã¦ãããããç¬ã ã¨ããã£ããã ãã?ã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Thanks to Edward Snowden's disclosures, we know that the current level of "
"general surveillance in society is incompatible with human rights. The "
@@ -74,7 +74,7 @@
"ããã¯æ°ä¸»ä¸»ç¾©ã®æ©è½ã¨å¹²æ¸ãå§ããç£è¦ã®ã¬ãã«ãè¶ãããã®ã§ã(ã¹ãã¼ãã³ã®ã"
"ããª)åçºè
ãæã¾ã£ã¦ãã¾ããããªãã®ã§ãããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Faced with government secrecy, we the people depend on whistleblowers to <a "
"href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">tell us what "
@@ -89,7 +89,7 @@
"ç£è¦ãç¨åº¦ãè¶ãã¦ãããã¨ãæå³ãã¾ããå½ã«å¯¾ããæ°ä¸»çãªå¶å¾¡ãå復ããã«"
"ã¯ãåçºè
ãèªåãå®å
¨ã
ã¨ãããç¹ã¾ã§ç£è¦ãåæ¸ããªããã°ãªãã¾ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -118,7 +118,7 @@
"opinion/2013/10/149481/\">ã²ã¨ãã³ãã¤ã³ã¿ã¼ãããã«è¶³ãè¸ã¿å
¥ããã°ããã(ã "
"ã)ã§ã¯ããããã¡ã®ãã©ã¤ãã·ã¼ãå®ããªãã§ããã</a>ã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
@@ -135,11 +135,11 @@
"ã¦ãåçºè
ãåå®ããã®ã«å
åãªã¢ã¯ã»ã¹ã許ãããã¨ããã°ããã®æ³æ¡ã¯åçºè
ã"
"å®ãã®ã«å
åã§ã¯ãªãã§ãããããã£ã¨å
ã«è¡ãå¿
è¦ãããã¾ãã"
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "The Upper Limit on Surveillance in a Democracy"
msgstr "æ°ä¸»ä¸»ç¾©ã«ãããç£è¦ã®ä¸é"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
"of effective control over our government and institutions. That's why "
@@ -151,7 +151,7 @@
"ããã¨ãå¯è½ã¨ãããããªç£è¦ã¯ããããã§ãæ°ä¸»ä¸»ç¾©ãèãå¾ã度ãè¶ãã¦ããã®"
"ã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
@@ -180,7 +180,7 @@
"ã®ä¼ç¤¾ããã</a>å®å¹çã«åéãã¦ãããã¨ããã¹ãã¼ãã³ã¯ããããã¡ã«ç¤ºããã®"
"ã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
@@ -198,11 +198,11 @@
"ããã¦ããã¸ã£ã¼ããªã¹ããç¥ããã¦ããåä½å¶æ´¾ã¨è©±ãã人ãæ¢ãåºããã¨ããç¹"
"ã§ãã"
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Information, Once Collected, Will Be Misused"
msgstr "æ
å ±ã¯ä¸åº¦éç©ãããã°æªç¨ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
@@ -223,7 +223,7 @@
"è
ããã¹ãã¤æ´»åãã¨è¨´ããããã°ããã¹ãã¤ããæ¢ãã¨ããè¨ã訳ã§ãéç©ããã"
"ãã¼ã¿ã¸ã®ã¢ã¯ã»ã¹ãããã¨ã«ãªãã§ãããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
@@ -253,7 +253,7 @@
"risks-increase-once-data-shared\">æ°ãããã£ã¸ã¿ã«ã»ã·ã¹ãã
</a>ã«æ¡å¼µããã¦"
"ãã¾ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -270,7 +270,7 @@
"citizens/\">ã¨ã¼ããã</a>ã¨<a href=\"https://en.wikipedia.org/wiki/"
"Japanese_American_internment\">åè¡å½</a>ããã®ä¾ã§ç¤ºãããããã«ã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Personal data collected by the state is also likely to be obtained by "
"outside crackers that break the security of the servers, even by <a href="
@@ -283,7 +283,7 @@
"articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first."
"shtml\">æµå¯¾çãªå½ã®ããã«åãã¦ããã¯ã©ãã«ã¼</a>ããç¥ãã¾ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Governments can easily use massive surveillance capability to <a href="
"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
@@ -293,7 +293,7 @@
"com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-"
"scandal.html\">æ°ä¸»ä¸»ç¾©ãç´æ¥è»¢è¦ããã</a>ãã¨ãã§ãã¾ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Total surveillance accessible to the state enables the state to launch a "
"massive fishing expedition against any person. To make journalism and "
@@ -304,11 +304,11 @@
"å§ãããã¨ãå¯è½ã¨ãã¾ããã¸ã£ã¼ããªãºã
ã¨æ°ä¸»ä¸»ç¾©ãå®å
¨ã«ããããã«ã¯ãå½ã«"
"ãã£ã¦ç°¡åã«ã¢ã¯ã»ã¹å¯è½ãªãã¼ã¿ã®éç©ãå¶éãããªããã°ãªãã¾ããã"
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Robust Protection for Privacy Must Be Technical"
msgstr "ãã©ã¤ãã·ã®å
ç¢ãªä¿è·ã¯æè¡çã§ãªããã°ãªããªã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The Electronic Frontier Foundation and other organizations propose a set of "
"legal principles designed to <a href=\"https://en.necessaryandproportionate."
@@ -323,7 +323,7 @@
"ã®ã¨ãã¦å«ã¿ã¾ããã§ããããçµæã¨ãã¦ãæ°ä¸»ä¸»ç¾©ã®èªç±ãä¿è·ããã«å
åã¨ãªã"
"ã§ãããããããå®å
¨ã«æ¡æãããä¾å¤ãªãã«æ°¸ä¹
ã«å®æ½ãããã®ã§ããã°ã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -333,7 +333,7 @@
"è«å
±æ´»å調æ»æ³ä¿®æ£æ³ã«è¦ãããããã«)ãåæ¢ããããã¯<a
href=\"http://www."
"nytimes.com/2009/04/16/us/16nsa.html\">ç¡è¦ããã</a>ã®ã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Meanwhile, demagogues will cite the usual excuses as grounds for total "
"surveillance; any terrorist attack, even one that kills just a handful of "
@@ -343,7 +343,7 @@
"ã§ãããããããªã¹ãã®æ»æããã£ãæ°äººã®äººã
ã殺ããã®ã§ããããã®ããããã«"
"æ©ä¼ãä¸ããèªå¤§å®£ä¼ã¨ãªãã§ãããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If limits on access to the data are set aside, it will be as if they had "
"never existed: years worth of dossiers would suddenly become available for "
@@ -364,11 +364,11 @@
"ãã¼ã¿ãéç©ããã
ãã§ãããã®æ³å¾ãåæ¢ãããä¸æçã«ç¡è¦ããã«é¢ããéãã"
"ãã®èãã¯æå³ãæã¤ã¨ã¯è¨ãé£ããã®ã§ãããã"
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "First, Don't Be Foolish"
msgstr "ã¾ãããã«ãªãã¨ã¯ããããªãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"To have privacy, you must not throw it away: the first one who has to "
"protect your privacy is you. Avoid identifying yourself to web sites, "
@@ -382,7 +382,7 @@
"ããããGNUãã©ã¤ãã·ã»ã¬ã¼ãã使ã£ã¦ãã¡ã¼ã«ã®ä¸èº«ãæå·åãã¾ããããç¾éã§"
"è²·ãç©ããã¾ãããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Keep your own data; don't store your data in a company's “"
"convenient” server. It's safe, however, to entrust a data backup to a "
@@ -395,7 +395,7 @@
"ã¢ã¼ã«ã¤ãããã¢ã¼ã«ã¤ãå
¨ä½ãæå·åããã®ã§ããã°ãåç¨ãµã¼ãã¹ã¸ã®ãã¼ã¿ã®"
"ããã¯ã¢ãããä¿¡ç¨ããã®ã¯ãããããªãããå®å
¨ã§ãããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy's sake, you must avoid nonfree software since, as a consequence "
"of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -412,7 +412,7 @@
"ãµã¼ãã¹</a>ãé¿ãã¾ãããããã¹ã¦ã®é¢é£ãããã¼ã¿ããµã¼ãã«è²ã渡ããã¨ãã"
"ãã¯è¦æ±ããã®ã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -434,7 +434,7 @@
"ã¨ãã¦ãããã®ã·ã¹ãã ã¯ã»ãã®äººã
ã«ãããã®ãã©ã¤ãã·ã諦ããå§åã¨ãªãã¾ã"
"ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Self-protection is essential, but even the most rigorous self-protection is "
"insufficient to protect your privacy on or from systems that don't belong to "
@@ -451,11 +451,11 @@
"ã§ãã¾ãããæããã«ããã¹ã¦ã®ãããã£ãã·ã¹ãã
ã(妥å½ãªå®¹çãããå ´å以å¤"
"ã¯)人ã
ãç£è¦ããªãããã«åæ¢ããã®ããã£ã¨ããã解決çã§ãã"
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "We Must Design Every System for Privacy"
msgstr "ãã©ã¤ãã·ã®ããã«ãã¹ã¦ã®ã·ã¹ãã
ãè¨è¨ããªããã°ãªããªã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we don't want a total surveillance society, we must consider surveillance "
"a kind of social pollution, and limit the surveillance impact of each new "
@@ -466,7 +466,7 @@
"ããã¦ãããããã®æ°ãããã£ã¸ã¿ã«ã·ã¹ãã
ã®ç£è¦ã®å½±é¿ãéå®ããªãã¦ã¯ãªãã¾"
"ãããã¡ããã©ã建ç¯ç©ã®ç°å¢ã¸ã®å½±é¿ãéå®ããããã«ã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For example: “smart” meters for electricity are touted for "
"sending the power company moment-by-moment data about each customer's "
@@ -486,17 +486,17 @@
"ããã¡ã¼ã¿ã«éä¿¡ã§ãã¾ããåã
ã®é¡§å®¢ã¯ä»»æã®æå®ãããæéã§èªåã®ä½¿ç¨ãå¹³å"
"使ç¨ã®ãã¿ã¼ã³ã¨æ¯è¼ã§ãã¾ããåãå©ä¾¿æ§ãç£è¦ãªãã§ã§ããã®ã§ã!"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid "We need to design such privacy into all our digital systems."
msgstr ""
"ãã¹ã¦ã®ããããã¡ã®ãã£ã¸ã¿ã«ã»ã·ã¹ãã
ã§ããã®ãããªãã©ã¤ãã·ãè¨è¨ããå¿
"
"è¦ãããã¾ãã"
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Collecting Data: Leaving It Dispersed"
msgstr "ãã¼ã¿ã®éç©ã«å¯¾ãã対ç:
ã¾ãæ£ãããã¾ã¾ã«ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
"the data dispersed and inconvenient to access</a>. Old-fashioned security "
@@ -515,7 +515,7 @@
"ã¦éå ±ãããå ´æã
ãã§ã¢ã¯ã»ã¹ããã¾ãããæ¯æ¥æ°ç¾ä¸æ¬ã®ãã¼ããç©ççã«éç©"
"ããè¦è´ãããã³ãã¼ãããã¨ã¯ä¸å¯è½ã§ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Nowadays, security cameras have become surveillance cameras: they are "
"connected to the Internet so recordings can be collected in a data center "
@@ -530,7 +530,7 @@
"ãè¡ã§å¸¸æ追跡ããã誰ã¨è©±ããããè¦ãããã¨ããæ¥ãæ¥ããã¨ãããããã§ãã"
"ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet-connected cameras often have lousy digital security themselves, "
"which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-"
@@ -552,7 +552,7 @@
"åãèªç±ã«æ稿ã§ããã¹ãã§ãããã¤ã³ã¿ã¼ãããã«ããããã®ãããªãã¼ã¿ã®ã·ã¹"
"ããããã¯ãªéç©ã¯å¶éãããªãã¦ã¯ãªãã¾ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
"points at the inside of a store, or at the street. Any camera pointed at "
@@ -564,11 +564,11 @@
"ã»ãã®èª°ãã«ãã£ã¦åãããã¦ããã©ããªã«ã¡ã©ããã©ã¤ãã·ã侵害ãã¾ããããã"
"ã¯å¥ã®åé¡ã§ãã"
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Internet Commerce Surveillance"
msgstr "ã¤ã³ã¿ã¼ãããã»ã³ãã¼ã¹ã®ç£è¦ã®å¯¾ç"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Most data collection comes from people's own digital activities. Usually "
"the data is collected first by companies. But when it comes to the threat "
@@ -582,7 +582,7 @@
"ãããã¾ããããªããªããä¼ç¤¾ã«ãã£ã¦éç©ããããã¼ã¿ã¯ã·ã¹ããããã¯ã«å½ã«å©"
"ç¨å¯è½ã ããã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -611,7 +611,7 @@
"ãã«éãã¾ãããå
ãã¦ãå¤ãã®ãããã£ãä¼ç¤¾ã¯ããã¼ã¿ãç´æ¥ã«æªç¨ãããã"
"ãã¼ã¿ã»ããã¼ã«ã¼ã«æä¾ãããããã®ã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The goal of making journalism and democracy safe therefore requires that we "
"reduce the data collected about people by any organization, not just by the "
@@ -627,7 +627,7 @@
"ã¿ã«ãã¼ã¿ã«ã¤ãã¦å¿
è¦ãªå
´åã¯ãããããã¡ã¨ããã¨ãããã©ããã¦ãå¿
è¦ãªçã"
"æéãè¶ãã¦ä¿æãããã¨ã許ãããã¹ãã§ã¯ããã¾ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One of the motives for the current level of surveillance of the Internet is "
"that sites are financed through advertising based on tracking users' "
@@ -645,7 +645,7 @@
"ãã¹ãå
¬ç´ããã¯ãã©ã¤ãã·ã侵害ããè¨ã訳ã¨ãªã£ã¦ããç¾ç¶ã«ã¤ãã¦ããããã"
"ã¡ã¯ããç¥ã£ã¦ãã¾ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
@@ -668,7 +668,7 @@
"href=\"http://taler.net/\">GNU
Taler</a>ã¨å¼ã°ãã¾ããä»ããé©åãªãã¸ãã¹ã®"
"åã決ããå¿
è¦ãªã
ãã§ãå½å®¶ã¯ããã妨害ããªããã°ããã®ã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"A further threat from sites' collection of personal data is that security "
"breakers might get in, take it, and misuse it. This includes customers' "
@@ -681,11 +681,11 @@
"ãªãã£ã»ãã¼ã«ã¯ããµã¤ããããªãã«ã¤ãã¦ãªã«ãç¥ããªããã°ãããªãã害ããã"
"ã¨ã¯ã§ãã¾ããã"
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Travel Surveillance"
msgstr "æ
è¡ã®ç£è¦ã®å¯¾ç"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We must convert digital toll collection to anonymous payment (using digital "
"cash, for instance). License-plate recognition systems recognize all "
@@ -707,7 +707,7 @@
"ãã®ã§ã¯ãªããã¨ãããã®ã§ããããã¦ããã¼ã¿ã¸ã®ã¢ã¯ã»ã¹ã¯è£å¤æã®ä»¤ç¶ã«ãã"
"ãã³ãã¼ã®ãªã¹ãã«éã£ã¦æ¢ç´¢ãããã¹ãã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The U.S. “no-fly” list must be abolished because it is <a href="
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
@@ -718,7 +718,7 @@
"racial-justice/victory-federal-court-recognizes\">è£å¤ãªãã®ç½°</a>ã
ããã§"
"ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It is acceptable to have a list of people whose person and luggage will be "
"searched with extra care, and anonymous passengers on domestic flights could "
@@ -732,7 +732,7 @@
"ã§ãã¾ããããå½ã¸ã®ãã©ã¤ãã®æä¹ãããã®å½ã¸ã®å
¥å½ãã¾ã£ãã許ããã¦ããªã"
"éå¸æ°ã«å¯¾ãã¦ç¦æ¢ããã®ã容èªã§ãã¾ããããã¯ãã¹ã¦ã®å¦¥å½ãªç®çã«å
åã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Many mass transit systems use some kind of smart cards or RFIDs for "
"payment. These systems accumulate personal data: if you once make the "
@@ -747,7 +747,7 @@
"ããã«ãããããã®ã«ã¼ãã«é¢é£ãã¦ãã¹ã¦ã®æ
ç¨ãè¨é²ããã§ããããåããã¦ã"
"大éç£è¦ã¨ãªãã¾ãããããã£ããã¼ã¿ã®éç©ã¯åæ¸ãããã¹ãã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Navigation services do surveillance: the user's computer tells the map "
"service the user's location and where the user wants to go; then the server "
@@ -768,7 +768,7 @@
"ç®ãã表示ã§ãã¾ããã¦ã¼ã¶ãã©ãã«ãã¦ã©ãã«è¡ããããã誰ã«ãä¼ãããã¨ãª"
"ããã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Systems for borrowing bicycles, etc., can be designed so that the borrower's "
"identity is known only inside the station where the item was borrowed. "
@@ -797,11 +797,11 @@
"ãããã¾ãããã®å
´åã«ã¯ãã¹ãã¼ã·ã§ã³ããåãã人ã®ã¢ã¤ãã³ãã£ãã£ãç´ã¡ã«"
"éãããã§ãããã"
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Communications Dossiers"
msgstr "éä¿¡ã®è¨é²ã®å¯¾ç"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
@@ -826,7 +826,7 @@
"technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSAã¯æºå¸¯"
"é»è©±ã®ä½ç½®æ
å ±ã®éç©</a>ã大éã«è¡ã£ã¦ããããã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unmonitored communication is impossible where systems create such dossiers. "
"So it should be illegal to create or keep them. ISPs and phone companies "
@@ -838,7 +838,7 @@
"ã«å¯¾ã調æ»ããæ³å»·ã®å½ä»¤ãªãã«é·æéã«æ¸¡ã£ã¦ãã®æ
å
±ãä¿æãããã¨ã許ããã"
"ã¹ãã§ã¯ããã¾ããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
@@ -860,7 +860,7 @@
"ã®ç£è¦ãåéãããªãã°ããã®æç¹ãããåã«ä½æãããå
¨å¡ã®é話è¨é²ã«ã¤ãã¦"
"ãã¼ã¿ãåå¾ããªãã§ãããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy about who you exchange email with, a simple partial solution is "
"for you and others to use email services in a country that would never "
@@ -882,11 +882,11 @@
"ãã¦ã¼ã¶ããããããã¡ã¼ã«ãåãåã£ããã¨ã
ããããããããããããªãããã"
"ãã«ã¡ã¼ã«ãéã£ããã¨ã確å®ãããã®ã¯å°é£ã§ãããã¨ããã·ã¹ãã
ã§ãã"
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "But Some Surveillance Is Necessary"
msgstr "ããããããç£è¦ã¯å¿
è¦ã "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For the state to find criminals, it needs to be able to investigate specific "
"crimes, or specific suspected planned crimes, under a court order. With the "
@@ -903,7 +903,7 @@
"(ããããæ¨å¥¨ããããã«)ããããã¡ãäºåã«å¤§éã®æ¸é¡ãéç©ãããã£ã¸ã¿ã«ã»ã·"
"ã¹ãã ãç¦æ¢ããã°ã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -926,7 +926,7 @@
"kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">è¦å¯ã®æ¦å¨ã®ä½¿ç¨"
"ã60%éä¸ããããã§ã</a>ãACLUã¯ããã好ã¾ããèãã¦ãã¾ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -947,7 +947,7 @@
"ã®å±éº(BP社ã®åæ²¹æµåºäºæ
ãç¦å³¶ã®ååç溶èã2008å¹´ã®ä¸çéèå±æ©ãèãã¦ã¿ã¦"
"ãã ãã)ã¯ããããªãºã ã«ããå±éºãå°ããè¦ãã¾ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, journalism must be protected from surveillance even when it is "
"carried out as part of a business."
@@ -955,7 +955,7 @@
"ããããªãããã¸ã£ã¼ããªãºã
ã¯ç£è¦ããå®ãããã¹ãã§ãããã¨ãããããããã¸"
"ãã¹ã®ä¸é¨ã¨ãã¦å®æ½ããã¦ããæã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Digital technology has brought about a tremendous increase in the level of "
"surveillance of our movements, actions, and communications. It is far more "
@@ -971,7 +971,7 @@
"éç©ããããã¼ã¿ã®å½ã«ãã使ç¨ã«é¢ãã¦ææ¡ããã¦ããæ³çå¶éã§ã¯ããããå¤ã"
"ãããªãã§ãããã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Companies are designing even more intrusive surveillance. Some project that "
"pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -987,7 +987,7 @@
"å¯è½ã§ãããæ°ä¸»ä¸»ç¾©ã¸ã®è
å¨ã¯æ¶æ¸¬ã§ã¯ããã¾ãããããã¯ç¾ã«æããè¦ãã¦ãã"
"ã®ã§ãã"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unless we believe that our free countries previously suffered from a grave "
"surveillance deficit, and ought to be surveilled more than the Soviet Union "
Index: po/surveillance-vs-democracy.lt-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.lt-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/surveillance-vs-democracy.lt-diff.html 22 Oct 2016 18:29:16 -0000
1.9
+++ po/surveillance-vs-democracy.lt-diff.html 6 Nov 2016 21:28:15 -0000
1.10
@@ -14,19 +14,36 @@
<!-- Parent-Version: 1.77 -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
-<span class="inserted"><ins><em><!-- GNUN: localize URL
/graphics/dog.small.jpg --></em></ins></span>
+<span class="inserted"><ins><em><style type="text/css"
media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+--></style>
+<!-- GNUN: localize URL /graphics/dog.small.jpg --></em></ins></span>
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist"
-->
<!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<span class="removed"><del><strong><h2>How</strong></del></span>
+<span class="inserted"><ins><em><h2 class="center">How</em></ins></span>
Much Surveillance Can Democracy Withstand?</h2>
-<p>by <a href="http://www.stallman.org/">Richard
Stallman</a></p>
+<span class="removed"><del><strong><p>by</strong></del></span>
+
+<span class="inserted"><ins><em><p class="byline
center">by</em></ins></span> <a
href="http://www.stallman.org/">Richard Stallman</a></p>
+
+<span
class="removed"><del><strong><blockquote><p>A</strong></del></span>
<span class="inserted"><ins><em><!-- rms: I deleted the link because of
Wired's announced
- anti-ad-block system --></em></ins></span>
-<blockquote><p>A version of this article was first published in
<span class="removed"><del><strong><a
href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/">Wired</a></strong></del></span>
<span class="inserted"><ins><em>Wired</em></ins></span>
+ anti-ad-block system -->
+<blockquote class="center"><p>A</em></ins></span> version of this
article was first published in <span class="removed"><del><strong><a
href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/">Wired</a></strong></del></span>
<span class="inserted"><ins><em>Wired</em></ins></span>
in October 2013.</p></blockquote>
-<span class="inserted"><ins><em><div class="pict medium">
+<span class="inserted"><ins><em><div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the
three ads that popped up on his computer screen..." /></a>
<p>“How did they find out I'm a dog?”</p>
@@ -42,7 +59,8 @@
is not exceeded? It is the level beyond which surveillance starts to
interfere with the functioning of democracy, in that whistleblowers
(such as Snowden) are likely to be caught.</p>
-
+<span class="inserted"><ins><em></div>
+<div class="columns" style="clear:both"></em></ins></span>
<p>Faced with government secrecy, we the people depend on
whistleblowers
to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
@@ -73,8 +91,12 @@
whistleblower” is grounds for access sufficient to identify him
or her. We need to go further.</p>
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<span class="removed"><del><strong><h3>The</strong></del></span>
+<span class="inserted"><ins><em></div>
+<h3 class="subheader" style="clear: both">The</em></ins></span> Upper
Limit on Surveillance in a Democracy</h3>
+
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>If whistleblowers don't dare reveal crimes and lies, we lose the
last shred of effective control over our government and institutions.
That's why surveillance that enables the state to find out who has
@@ -104,8 +126,12 @@
surveillance is too much is the point at which the state can find who
spoke to a known journalist or a known dissident.</p>
-<h3>Information, Once Collected, Will Be Misused</h3>
+<span class="removed"><del><strong><h3>Information,</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">Information,</em></ins></span> Once Collected,
Will Be Misused</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>When people recognize that the level of general surveillance is too
high, the first response is to propose limits on access to the
accumulated data. That sounds nice, but it won't fix the problem, not
@@ -154,8 +180,12 @@
journalism and democracy safe, we must limit the accumulation of data
that is easily accessible to the state.</p>
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<span class="removed"><del><strong><h3>Robust</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">Robust</em></ins></span> Protection for Privacy
Must Be Technical</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>The Electronic Frontier Foundation and other organizations propose
a set of legal principles designed to <a
href="https://en.necessaryandproportionate.org/text">prevent the
@@ -184,8 +214,12 @@
collect data starting at that date. As for suspending or momentarily
ignoring this law, the idea would hardly make sense.</p>
-<h3>First, Don't Be Foolish</h3>
+<span class="removed"><del><strong><h3>First,</strong></del></span>
+<span class="inserted"><ins><em></div>
+<h3 class="subheader">First,</em></ins></span> Don't Be
Foolish</h3>
+
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>To have privacy, you must not throw it away: the first one who has
to protect your privacy is you. Avoid identifying yourself to web
sites, contact them with Tor, and use browsers that block the schemes
@@ -227,8 +261,12 @@
make all these systems stop surveilling people other than legitimate
suspects.</p>
-<h3>We Must Design Every System for Privacy</h3>
+<span class="removed"><del><strong><h3>We</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">We</em></ins></span> Must Design Every System for
Privacy</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>If we don't want a total surveillance society, we must consider
surveillance a kind of social pollution, and limit the surveillance
impact of each new digital system just as we limit the environmental
@@ -247,8 +285,12 @@
<p>We need to design such privacy into all our digital systems.</p>
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<span class="removed"><del><strong><h3>Remedy</strong></del></span>
+<span class="inserted"><ins><em></div>
+<h3 class="subheader">Remedy</em></ins></span> for Collecting Data:
Leaving It Dispersed</h3>
+
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>One way to make monitoring safe for privacy is
to <a name="dispersal">keep the data dispersed and inconvenient to
access</a>. Old-fashioned security cameras were no threat to
privacy(<a href="#privatespace">*</a>).
@@ -282,9 +324,11 @@
camera points at the inside of a store, or at the street. Any camera
pointed at someone's private space by someone else violates privacy,
but that is another issue.</p>
+<span class="inserted"><ins><em></div></em></ins></span>
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 <span
class="removed"><del><strong>id="digitalcash">Remedy</strong></del></span>
<span class="inserted"><ins><em>id="digitalcash"
class="subheader">Remedy</em></ins></span> for Internet Commerce
Surveillance</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>Most data collection comes from people's own digital activities.
Usually the data is collected first by companies. But when it comes
to the threat to privacy and democracy, it makes no difference whether
@@ -341,8 +385,12 @@
this danger: a security hole in the site can't hurt you if the site
knows nothing about you.</p>
-<h3>Remedy for Travel Surveillance</h3>
+<span class="removed"><del><strong><h3>Remedy</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">Remedy</em></ins></span> for Travel
Surveillance</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>We must convert digital toll collection to anonymous payment (using
digital cash, for instance). License-plate recognition systems
recognize all license plates, and
@@ -398,8 +446,12 @@
borrowed can inform headquarters; in that case, it could send the
borrower's identity immediately.</p>
-<h3>Remedy for Communications Dossiers</h3>
+<span class="removed"><del><strong><h3>Remedy</strong></del></span>
+<span class="inserted"><ins><em></div>
+<h3 class="subheader">Remedy</em></ins></span> for Communications
Dossiers</h3>
+
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
@@ -438,8 +490,12 @@
that I received mail from some user of your email service, but it
would be hard to determine that you had sent mail to me.</p>
-<h3>But Some Surveillance Is Necessary</h3>
+<span class="removed"><del><strong><h3>But</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">But</em></ins></span> Some Surveillance Is
Necessary</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>For the state to find criminals, it needs to be able to investigate
specific crimes, or specific suspected planned crimes, under a court
order. With the Internet, the power to tap phone conversations would
@@ -474,8 +530,11 @@
<p>However, journalism must be protected from surveillance even when
it is carried out as part of a business.</p>
-<hr />
+<span class="removed"><del><strong><hr /></strong></del></span>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="reduced-width"></em></ins></span>
<p>Digital technology has brought about a tremendous increase in the
level of surveillance of our movements, actions, and communications.
It is far more than we experienced in the 1990s, and <a <span
class="removed"><del><strong>href="http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html">far</strong></del></span>
@@ -495,6 +554,8 @@
a grave surveillance deficit, and ought to be surveilled more than the
Soviet Union and East Germany were, we must reverse this increase.
That requires stopping the accumulation of big data about people.</p>
+<span class="inserted"><ins><em></div>
+</div></em></ins></span>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -553,7 +614,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/22 18:29:16 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/surveillance-vs-democracy.lt.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.lt.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/surveillance-vs-democracy.lt.po 22 Oct 2016 18:29:16 -0000 1.15
+++ po/surveillance-vs-democracy.lt.po 6 Nov 2016 21:28:15 -0000 1.16
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2015-12-16 13:11+0100\n"
"Last-Translator: Donatas Klimašauskas <address@hidden>\n"
"Language-Team: Lithuanian <address@hidden>\n"
@@ -36,29 +36,29 @@
msgid "A version of this article was first published in Wired in October 2013."
msgstr ""
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
#, fuzzy
#| msgid "<a href=\"/education/education.html\">Education</a>"
msgid "<a href=\"/graphics/dog.html\">"
msgstr "<a href=\"/education/education.html\">Å vietimas</a>"
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
msgid ""
"Cartoon of a dog, wondering at the three ads that popped up on his computer "
"screen..."
msgstr ""
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
#, fuzzy
#| msgid "</a>"
msgid "</a>"
msgstr "</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
msgid "“How did they find out I'm a dog?”"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Thanks to Edward Snowden's disclosures, we know that the current level of "
"general surveillance in society is incompatible with human rights. The "
@@ -79,7 +79,7 @@
"lygis, už kurio sekimas pradeda kirstis su demokratijos funkcionavimu, su "
"kuriuo informatoriai (tokie kaip Snowden) yra tikÄtina, kad bus pagauti."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Faced with government secrecy, we the people depend on whistleblowers to <a "
"href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">tell us what "
@@ -95,7 +95,7 @@
"MÅ«sų demokratinÄs valstybÄs kontrolÄs atgavimui, mes privalome
sumažinti "
"sekimÄ
tiek, jog informatoriai žinotų, kad yra saugūs."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
@@ -136,7 +136,7 @@
"www.wired.com/opinion/2013/10/149481/\">tai neapsaugos mūsų privatumo, kai "
"įžengiame į internetÄ
</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
@@ -154,11 +154,11 @@
"pagrindas gauti prieigÄ
, pakankamÄ
jį arba jÄ
identifikuoti. Mums reikia
"
"žengti toliau."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "The Upper Limit on Surveillance in a Democracy"
msgstr "VirÅ¡utinÄ sekimo demokratijoje riba"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
"of effective control over our government and institutions. That's why "
@@ -170,7 +170,7 @@
"Å tai todÄl sekimas, kuris valstybÄ Ä¯galina iÅ¡siaiÅ¡kinti kas kalbÄjo su
"
"žurnalistu yra per daug sekimo – per daug iÅ¡tverti demokratijai."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "An unnamed U.S. government official ominously told journalists in 2011 "
@@ -213,7 +213,7 @@
"\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
"verizon-2013-06-07\">iš kitų kompanijų irgi</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
@@ -232,11 +232,11 @@
"valstybÄ gali sužinoti kas kalbÄjo su žinomu žurnalistu arba žinomu "
"disidentu."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Information, Once Collected, Will Be Misused"
msgstr "Informacija, surinkus, bus netinkamai panaudota"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
@@ -258,7 +258,7 @@
"apkaltinamas „Å¡pionažu“, to „Å¡nipo“ suradimas bus "
"pasiteisinimas prieigai prie sukauptos medžiagos."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "In addition, the state's surveillance staff will misuse the data for "
@@ -299,7 +299,7 @@
"vairuotojo licencijų įrašų siekiant surasti kÄ
nors simpatiško</a>
– "
"praktika, žinoma kaip „valstybinio numerio paieÅ¡ka
pasimatymui“."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -317,7 +317,7 @@
"a> ir <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment"
"\">JAV</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Personal data collected by the state is also likely to be obtained by "
"outside crackers that break the security of the servers, even by <a href="
@@ -331,7 +331,7 @@
"revealed-even-worse-than-first.shtml\">įsilaužÄliai, dirbantys
priešiškoms "
"valstybÄms</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Governments can easily use massive surveillance capability to <a href="
"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
@@ -341,7 +341,7 @@
"www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-"
"wiretapping-scandal.html\">nusmukdyti demokratijÄ
tiesiogiai</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Total surveillance accessible to the state enables the state to launch a "
"massive fishing expedition against any person. To make journalism and "
@@ -353,11 +353,11 @@
"demokratijÄ
saugiomis, mes privalome apriboti duomenų, kurie yra lengvai "
"prieinami valstybei, kaupimÄ
."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Robust Protection for Privacy Must Be Technical"
msgstr "Tvirta privatumo apsauga privalo būti technine"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The Electronic Frontier Foundation and other organizations propose a set of "
"legal principles designed to <a href=\"https://en.necessaryandproportionate."
@@ -373,7 +373,7 @@
"adekvatÅ«s demokratinių laisvių apsaugai – jei bus visiÅ¡kai priimti
ir "
"be iÅ¡imÄių privalomai užtikrinti amžinai."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -383,7 +383,7 @@
"gali bÅ«ti atÅ¡auktos (kaip pagal FISA pataisų aktÄ
), atidÄtos arba <a
href="
"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignoruojamos</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Meanwhile, demagogues will cite the usual excuses as grounds for total "
"surveillance; any terrorist attack, even one that kills just a handful of "
@@ -393,7 +393,7 @@
"visiÅ¡kam sekimui; bet kokia teroristinÄ ataka, net kuria nužudoma tik "
"keletas žmonių, gali bÅ«ti iÅ¡pÅ«sta pateikti progÄ
."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If limits on access to the data are set aside, it will be as if they had "
"never existed: years worth of dossiers would suddenly become available for "
@@ -415,11 +415,11 @@
"duomenis tik nuo tada. Kas lieÄia atidÄjimÄ
arba laikinÄ
šio įstatymo "
"ignoravimÄ
, tokiÄ
idÄjÄ
būtų sunku logiškai pagrįsti."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "First, Don't Be Foolish"
msgstr "Pirma, nebūkite kvaili"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"To have privacy, you must not throw it away: the first one who has to "
"protect your privacy is you. Avoid identifying yourself to web sites, "
@@ -433,7 +433,7 @@
"kurias jos naudoja lankytojų stebÄjimui. Naudokite GNU Privacy Guard savo "
"el. pašto turinio užšifravimui. Už pirkinius atsiskaitykite grynais."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Keep your own data; don't store your data in a company's “"
"convenient” server. It's safe, however, to entrust a data backup to a "
@@ -448,7 +448,7 @@
"pavadinimus, prieš jį išsiųsdami, savo paties kompiuteryje užšifruosite
su "
"laisva programine įranga."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy's sake, you must avoid nonfree software since, as a consequence "
"of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -465,7 +465,7 @@
"jÅ«sų kompiuterinių skaiÄiavimų kontrolÄs atidavimo kitiems, Å¡itam iÅ¡
jūsų "
"reikia, kad perduotumÄte tam serveriui visus susijusius duomenis."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -488,7 +488,7 @@
"jÅ«s ketinate pateikti savÄ
jį, kadangi jos spaudžia kitus žmones
atsisakyti "
"savo privatumo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Self-protection is essential, but even the most rigorous self-protection is "
"insufficient to protect your privacy on or from systems that don't belong to "
@@ -506,11 +506,11 @@
"geresnis sprendimas yra sustabdyti visas šitas sistemas nuo kitų žmonių,
nei "
"tikri įtariamieji, sekimo."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "We Must Design Every System for Privacy"
msgstr "Mes privalome kiekvienÄ
sistemÄ
projektuoti privatumui"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we don't want a total surveillance society, we must consider surveillance "
"a kind of social pollution, and limit the surveillance impact of each new "
@@ -522,7 +522,7 @@
"naujai skaitmeninei sistemai lygiai taip pat, kaip mes apribojame gamtinÄs "
"aplinkos poveikį fizinÄms konstrukcijoms."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For example: “smart” meters for electricity are touted for "
"sending the power company moment-by-moment data about each customer's "
@@ -546,16 +546,16 @@
"periodu, su vidutiniu vartojimo modeliu tam periodui. Tokia pati nauda, be "
"jokio sekimo!"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid "We need to design such privacy into all our digital systems."
msgstr ""
"Mums reikia projektuoti tokį privatumÄ
visose mÅ«sų skaitmeninÄse
sistemose."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Collecting Data: Leaving It Dispersed"
msgstr "Duomenų rinkimo ištaisymas: palikti juos išbarstytus"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
"the data dispersed and inconvenient to access</a>. Old-fashioned security "
@@ -575,7 +575,7 @@
"kuriose kas nors praneÅ¡Ä apie nusikaltimÄ
. Nebūtų įmanoma fiziškai
surinkti "
"milijonus kaseÄių kiekvienÄ
dienÄ
ir jas peržiÅ«rÄti arba nukopijuoti."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Nowadays, security cameras have become surveillance cameras: they are "
"connected to the Internet so recordings can be collected in a data center "
@@ -590,7 +590,7 @@
"atpažinimo progresu galime sulaukti dienos, kada įtariamus žurnalistus,
kad "
"pamatyti su kuo jie Å¡neka, bus galima stebÄti gatvÄje visÄ
laikÄ
."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "Internet-connected cameras often have lousy digital security themselves, "
@@ -621,7 +621,7 @@
"nuotraukas ir video įrašus, bet sistemiškas tokių duomenų internete
kaupimas "
"privalo būti apribotas."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
"points at the inside of a store, or at the street. Any camera pointed at "
@@ -633,11 +633,11 @@
"kas nors nukreipia į kieno nors privaÄiÄ
erdvÄ, pažeidžia privatumÄ
,
bet tai "
"yra kita problema."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Internet Commerce Surveillance"
msgstr "InternetinÄs komercijos sekimo iÅ¡taisymas"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Most data collection comes from people's own digital activities. Usually "
"the data is collected first by companies. But when it comes to the threat "
@@ -651,7 +651,7 @@
"tiesiogiai atlieka valstybÄ, ar susitarta su verslu, nes tie duomenys, "
"kuriuos kompanijos renka, yra sistemiškai prieinami valstybei."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
@@ -686,7 +686,7 @@
"sakant, JAV vyriausybÄ neturi tų duomenų, bet praktine prasme galima "
"laikyti, kad ji juos turi."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The goal of making journalism and democracy safe therefore requires that we "
"reduce the data collected about people by any organization, not just by the "
@@ -703,7 +703,7 @@
"juos laikyti ilgiau, nei trumpÄ
laikÄ
, kuris neatskiriamai būtinas jų "
"reikalams su mumis."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One of the motives for the current level of surveillance of the Internet is "
"that sites are financed through advertising based on tracking users' "
@@ -722,7 +722,7 @@
"yra labiau pasiteisinimai pažeisti privatumÄ
, nei įsipareigojimai jį "
"išlaikyti."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "We could correct both problems by adopting a system of anonymous "
@@ -755,7 +755,7 @@
"pirma buvo sukurta 1980–1990 m. laikotarpyje</a>; mums reikia tik "
"tinkamų verslui planų ir, kad valstybÄ jiems nekliudytų."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"A further threat from sites' collection of personal data is that security "
"breakers might get in, take it, and misuse it. This includes customers' "
@@ -768,11 +768,11 @@
"mokÄjimų sistema šį pavojų užbaigtų: svetainÄs saugumo skylÄ negali
jums "
"pakenkti jei ta svetainÄ apie jus nieko nežino."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Travel Surveillance"
msgstr "Keliavimo sekimo ištaisymas"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We must convert digital toll collection to anonymous payment (using digital "
"cash, for instance). License-plate recognition systems recognize all "
@@ -796,7 +796,7 @@
"duomenų turÄtų bÅ«ti apribota valstybinių numerių pagal teismo
sprendimus "
"sÄ
rašo ieškojimu."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The U.S. “no-fly” list must be abolished because it is <a href="
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
@@ -806,7 +806,7 @@
"href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-"
"racial-justice/victory-federal-court-recognizes\">bausmÄ be teismo</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It is acceptable to have a list of people whose person and luggage will be "
"searched with extra care, and anonymous passengers on domestic flights could "
@@ -822,7 +822,7 @@
"valstybÄ, įlipti skrydžiams į tÄ
valstybÄ. Å ito turÄtų pakakti
visiems "
"teisÄtiems tikslams."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Many mass transit systems use some kind of smart cards or RFIDs for "
"payment. These systems accumulate personal data: if you once make the "
@@ -838,7 +838,7 @@
"keliones susietas su kiekviena kortele. Kartu jie prilygsta masiniam "
"sekimui. Šis duomenų rinkimas privalo būti sumažintas."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Navigation services do surveillance: the user's computer tells the map "
"service the user's location and where the user wants to go; then the server "
@@ -861,7 +861,7 @@
"apskaiÄiuoti marÅ¡rutÄ
ir jį pavaizduoti, niekam niekada nepranešant kur
tas "
"naudotojas yra ar kur nori keliauti."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Systems for borrowing bicycles, etc., can be designed so that the borrower's "
"identity is known only inside the station where the item was borrowed. "
@@ -891,11 +891,11 @@
"stotis iÅ¡ kurios jis buvo pasiskolintas gali bÅ«stinÄ informuoti; tuo
atveju, "
"ji galÄtų besiskolinanÄiojo tapatybÄ iÅ¡siųsti nedelsiant."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Communications Dossiers"
msgstr "Komunikacinių asmeninių įrašų ištaisymas"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
@@ -921,7 +921,7 @@
"security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location"
"\">NSA korinio ryšio telefonų vietos duomenis renka</a> masiškai."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unmonitored communication is impossible where systems create such dossiers. "
"So it should be illegal to create or keep them. ISPs and phone companies "
@@ -933,7 +933,7 @@
"telefoninio ryšio kompanijoms turi būti neleidžiama labai ilgai laikyti
Å¡iÄ
"
"informacijÄ
, nesant teismo sprendimo sekti tam tikrÄ
pusÄ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
@@ -956,7 +956,7 @@
"vyriausybÄ vÄl pradÄtų atlikti tokio tipo sekimÄ
, ji negautų duomenų
apie "
"kiekvieno telefoninius skambuÄius, atliktus iki to laiko."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy about who you exchange email with, a simple partial solution is "
"for you and others to use email services in a country that would never "
@@ -979,11 +979,11 @@
"paÅ¡tÄ
iš kažkokio jūsų el. pašto paslaugos naudotojo, bet būtų sunku
"
"nustatyti, kad jÅ«s man iÅ¡siuntÄte paÅ¡tÄ
."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "But Some Surveillance Is Necessary"
msgstr "Bet kažkiek sekimo yra būtina"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For the state to find criminals, it needs to be able to investigate specific "
"crimes, or specific suspected planned crimes, under a court order. With the "
@@ -1002,7 +1002,7 @@
"po fakto, jei prieÅ¡ tokį faktÄ
(kaip aš rekomendavau) mes neleisime "
"skaitmeninÄms sistemoms masiÅ¡kai kaupti asmeninius įraÅ¡us."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1027,7 +1027,7 @@
"ubiquitous-surveillance-police-edition\">jos jÄgos panaudojimas sumažÄjo "
"60 %</a>. ACLU Å¡itam teikia pirmenybÄ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1048,7 +1048,7 @@
"reikalingo lygio. Šių operacijų pavojus (apsvarstykite BP naftos
iÅ¡liejimÄ
, "
"iÅ¡silydimus FukuÅ¡imoje ir 2008 m. fiskalinÄ krizÄ) pranoksta
terorizmÄ
."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, journalism must be protected from surveillance even when it is "
"carried out as part of a business."
@@ -1056,7 +1056,7 @@
"TaÄiau, žurnalistika privalo bÅ«ti apsaugota nuo sekimo, net kai ji yra "
"vykdoma kaip verslo dalis."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "Digital technology has brought about a tremendous increase in the level "
@@ -1081,7 +1081,7 @@
"laikotarpiu, ir pasiÅ«lytos teisinÄs tų sukauptų duomenų valstybinio "
"naudojimo ribos to nepakeistų."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "Companies are designing even more intrusive surveillance. Some project "
@@ -1105,7 +1105,7 @@
"\">kaip žmonÄs galvoja</a>. Tokios galimybÄs yra neiÅ¡matuojamos; bet
grÄsmÄ "
"demokratijai nÄra spekuliacija. Ji egzistuoja ir yra matoma Å¡iandien."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unless we believe that our free countries previously suffered from a grave "
"surveillance deficit, and ought to be surveilled more than the Soviet Union "
Index: po/surveillance-vs-democracy.nl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.nl-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/surveillance-vs-democracy.nl-diff.html 22 Oct 2016 18:29:16 -0000
1.8
+++ po/surveillance-vs-democracy.nl-diff.html 6 Nov 2016 21:28:15 -0000
1.9
@@ -14,19 +14,35 @@
<!-- Parent-Version: 1.77 -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
-<span class="inserted"><ins><em><!-- GNUN: localize URL
/graphics/dog.small.jpg --></em></ins></span>
+<span class="inserted"><ins><em><style type="text/css"
media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+--></style>
+<!-- GNUN: localize URL /graphics/dog.small.jpg --></em></ins></span>
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist"
-->
<!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<span class="removed"><del><strong><h2>How</strong></del></span>
+<span class="inserted"><ins><em><h2 class="center">How</em></ins></span>
Much Surveillance Can Democracy Withstand?</h2>
-<p>by <a href="http://www.stallman.org/">Richard
Stallman</a></p>
+<span class="removed"><del><strong><p>by</strong></del></span>
+
+<span class="inserted"><ins><em><p class="byline
center">by</em></ins></span> <a
href="http://www.stallman.org/">Richard Stallman</a></p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>A version of this article was first published in
Wired
+<span
class="removed"><del><strong><blockquote><p>A</strong></del></span>
+<span class="inserted"><ins><em><blockquote
class="center"><p>A</em></ins></span> version of this article was
first published in Wired
in October 2013.</p></blockquote>
-<span class="inserted"><ins><em><div class="pict medium">
+<span class="inserted"><ins><em><div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the
three ads that popped up on his computer screen..." /></a>
<p>“How did they find out I'm a dog?”</p>
@@ -42,7 +58,8 @@
is not exceeded? It is the level beyond which surveillance starts to
interfere with the functioning of democracy, in that whistleblowers
(such as Snowden) are likely to be caught.</p>
-
+<span class="inserted"><ins><em></div>
+<div class="columns" style="clear:both"></em></ins></span>
<p>Faced with government secrecy, we the people depend on
whistleblowers
to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
@@ -73,8 +90,12 @@
whistleblower” is grounds for access sufficient to identify him
or her. We need to go further.</p>
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<span class="removed"><del><strong><h3>The</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader" style="clear: both">The</em></ins></span> Upper
Limit on Surveillance in a Democracy</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>If whistleblowers don't dare reveal crimes and lies, we lose the
last shred of effective control over our government and institutions.
That's why surveillance that enables the state to find out who has
@@ -104,8 +125,12 @@
surveillance is too much is the point at which the state can find who
spoke to a known journalist or a known dissident.</p>
-<h3>Information, Once Collected, Will Be Misused</h3>
+<span class="removed"><del><strong><h3>Information,</strong></del></span>
+<span class="inserted"><ins><em></div>
+<h3 class="subheader">Information,</em></ins></span> Once Collected,
Will Be Misused</h3>
+
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>When people recognize that the level of general surveillance is too
high, the first response is to propose limits on access to the
accumulated data. That sounds nice, but it won't fix the problem, not
@@ -153,8 +178,12 @@
journalism and democracy safe, we must limit the accumulation of data
that is easily accessible to the state.</p>
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<span class="removed"><del><strong><h3>Robust</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">Robust</em></ins></span> Protection for Privacy
Must Be Technical</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>The Electronic Frontier Foundation and other organizations propose
a set of legal principles designed to <a
href="https://en.necessaryandproportionate.org/text">prevent the
@@ -183,8 +212,12 @@
collect data starting at that date. As for suspending or momentarily
ignoring this law, the idea would hardly make sense.</p>
-<h3>First, Don't Be Foolish</h3>
+<span class="removed"><del><strong><h3>First,</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">First,</em></ins></span> Don't Be
Foolish</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>To have privacy, you must not throw it away: the first one who has
to protect your privacy is you. Avoid identifying yourself to web
sites, contact them with Tor, and use browsers that block the schemes
@@ -226,8 +259,12 @@
make all these systems stop surveilling people other than legitimate
suspects.</p>
-<h3>We Must Design Every System for Privacy</h3>
+<span class="removed"><del><strong><h3>We</strong></del></span>
+<span class="inserted"><ins><em></div>
+<h3 class="subheader">We</em></ins></span> Must Design Every System for
Privacy</h3>
+
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>If we don't want a total surveillance society, we must consider
surveillance a kind of social pollution, and limit the surveillance
impact of each new digital system just as we limit the environmental
@@ -246,8 +283,12 @@
<p>We need to design such privacy into all our digital systems.</p>
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<span class="removed"><del><strong><h3>Remedy</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">Remedy</em></ins></span> for Collecting Data:
Leaving It Dispersed</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>One way to make monitoring safe for privacy is
to <a name="dispersal">keep the data dispersed and inconvenient to
access</a>. Old-fashioned security cameras were no threat to
privacy(<a href="#privatespace">*</a>).
@@ -281,9 +322,11 @@
camera points at the inside of a store, or at the street. Any camera
pointed at someone's private space by someone else violates privacy,
but that is another issue.</p>
+<span class="inserted"><ins><em></div></em></ins></span>
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 <span
class="removed"><del><strong>id="digitalcash">Remedy</strong></del></span>
<span class="inserted"><ins><em>id="digitalcash"
class="subheader">Remedy</em></ins></span> for Internet Commerce
Surveillance</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>Most data collection comes from people's own digital activities.
Usually the data is collected first by companies. But when it comes
to the threat to privacy and democracy, it makes no difference whether
@@ -340,8 +383,12 @@
this danger: a security hole in the site can't hurt you if the site
knows nothing about you.</p>
-<h3>Remedy for Travel Surveillance</h3>
+<span class="removed"><del><strong><h3>Remedy</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">Remedy</em></ins></span> for Travel
Surveillance</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>We must convert digital toll collection to anonymous payment (using
digital cash, for instance). License-plate recognition systems
recognize all license plates, and
@@ -397,8 +444,12 @@
borrowed can inform headquarters; in that case, it could send the
borrower's identity immediately.</p>
-<h3>Remedy for Communications Dossiers</h3>
+<span class="removed"><del><strong><h3>Remedy</strong></del></span>
+<span class="inserted"><ins><em></div>
+<h3 class="subheader">Remedy</em></ins></span> for Communications
Dossiers</h3>
+
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
@@ -437,8 +488,12 @@
that I received mail from some user of your email service, but it
would be hard to determine that you had sent mail to me.</p>
-<h3>But Some Surveillance Is Necessary</h3>
+<span class="removed"><del><strong><h3>But</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">But</em></ins></span> Some Surveillance Is
Necessary</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>For the state to find criminals, it needs to be able to investigate
specific crimes, or specific suspected planned crimes, under a court
order. With the Internet, the power to tap phone conversations would
@@ -473,8 +528,11 @@
<p>However, journalism must be protected from surveillance even when
it is carried out as part of a business.</p>
-<hr />
+<span class="removed"><del><strong><hr /></strong></del></span>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="reduced-width"></em></ins></span>
<p>Digital technology has brought about a tremendous increase in the
level of surveillance of our movements, actions, and communications.
It is far more than we experienced in the 1990s, and <a
@@ -494,6 +552,8 @@
a grave surveillance deficit, and ought to be surveilled more than the
Soviet Union and East Germany were, we must reverse this increase.
That requires stopping the accumulation of big data about people.</p>
+<span class="inserted"><ins><em></div>
+</div></em></ins></span>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -552,7 +612,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/22 18:29:16 $
+$Date: 2016/11/06 21:28:15 $
<!-- timestamp end -->
</p>
</div>
Index: po/surveillance-vs-democracy.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.nl.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/surveillance-vs-democracy.nl.po 22 Oct 2016 18:29:16 -0000 1.15
+++ po/surveillance-vs-democracy.nl.po 6 Nov 2016 21:28:16 -0000 1.16
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-09-29 15:25+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch\n"
@@ -40,11 +40,11 @@
"oktober 2013."
# type: Content of: <body><div><div><div><ul><li>
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
msgid "<a href=\"/graphics/dog.html\">"
msgstr "<a href=\"/graphics/dog.html\">"
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
msgid ""
"Cartoon of a dog, wondering at the three ads that popped up on his computer "
"screen..."
@@ -53,15 +53,15 @@
"die op zijn computerscherm opdoemen..."
# type: Content of: <div><div><p>
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
msgid "</a>"
msgstr "</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
msgid "“How did they find out I'm a dog?”"
msgstr "“Hoe weten ze dat ik een hond ben?”"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Thanks to Edward Snowden's disclosures, we know that the current level of "
"general surveillance in society is incompatible with human rights. The "
@@ -83,7 +83,7 @@
"functioneren van onze democratie, waarbij klokkenluiders (zoals Snowden) "
"worden aangepakt."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Faced with government secrecy, we the people depend on whistleblowers to <a "
"href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">tell us what "
@@ -100,7 +100,7 @@
"moeten we de mate van toezicht terugbrengen naar een punt waarop "
"klokkenluiders erop kunnen vertrouwen dat zij veilig zijn."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
# | Using free/libre software, <a
# | href=\"/philosophy/free-software-even-more-important.html\">as I've
# | advocated for 30 years</a>, is the first step in taking control of our
@@ -154,7 +154,7 @@
"opinion/2013/10/149481/\">dat beschermt onze privacy niet als we ons op het "
"internet begeven</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
@@ -172,11 +172,11 @@
"genoeg reden is om de klokkenluider te identificeren, zal dat hem niet "
"genoeg beschermen. We moeten verder gaan."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "The Upper Limit on Surveillance in a Democracy"
msgstr "De bovengrens van controle in een democratie"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
"of effective control over our government and institutions. That's why "
@@ -188,7 +188,7 @@
"waarom toezicht waarbij de staat uit kan vinden wie met een journalist heeft "
"gepraat, te veel toezicht is—meer dan een democratie kan verdragen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
# | An unnamed U.S. government official ominously told journalists in 2011
# | that the <a
# |
href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S.
@@ -245,7 +245,7 @@
"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
"verizon-2013-06-07\">ook andere bedrijven</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
@@ -264,11 +264,11 @@
"overheidstoezicht te veel is, is het punt waarop de overheid er achter kan "
"komen wie met een bekende journalist of dissident heeft gesproken."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Information, Once Collected, Will Be Misused"
msgstr "Eenmaal verzamelde informatie, zal worden misbruikt"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
@@ -291,7 +291,7 @@
"spionage”, zal het vinden van de “spion” een excuus vormen "
"om toegang te krijgen tot het verzamelde materiaal."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
# | In addition, the state's surveillance staff will misuse the data for
# | personal reasons. Some NSA agents <a
# |
href=\"http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
@@ -353,7 +353,7 @@
"theyarewatching.org/issues/risks-increase-once-data-shared\">nieuwe digitale "
"systemen</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -371,7 +371,7 @@
"always-be-used-against-the-citizens/\">Europa</a> en in <a href=\"https://en."
"wikipedia.org/wiki/Japanese_American_internment\">de VS </a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Personal data collected by the state is also likely to be obtained by "
"outside crackers that break the security of the servers, even by <a href="
@@ -385,7 +385,7 @@
"articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first."
"shtml\">krakers die voor vijandelijke landen werken</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Governments can easily use massive surveillance capability to <a href="
"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
@@ -396,7 +396,7 @@
"government-is-blamed-for-wiretapping-scandal.html\">de democratie "
"rechtstreeks uit te hollen</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Total surveillance accessible to the state enables the state to launch a "
"massive fishing expedition against any person. To make journalism and "
@@ -408,11 +408,11 @@
"stellen, moeten we de verzameling van gegevens, die gemakkelijk voor de "
"overheid toegankelijk is, beperken."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Robust Protection for Privacy Must Be Technical"
msgstr "Goede privacy-bescherming moet technisch zijn"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The Electronic Frontier Foundation and other organizations propose a set of "
"legal principles designed to <a href=\"https://en.necessaryandproportionate."
@@ -429,7 +429,7 @@
"democratische vrijheden te beschermen—als deze compleet worden "
"aangenomen en zonder enige uitzondering altijd worden doorgevoerd."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -440,7 +440,7 @@
"Amendement-wet), opgeschort, of <a href=\"http://www.nytimes.com/2009/04/16/"
"us/16nsa.html\">genegeerd</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Meanwhile, demagogues will cite the usual excuses as grounds for total "
"surveillance; any terrorist attack, even one that kills just a handful of "
@@ -450,7 +450,7 @@
"voor totaal toezicht; elke terroristenaanval, zelfs eentje waarbij slechts "
"een handvol mensen omkomt, kan hiervoor worden aangegrepen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If limits on access to the data are set aside, it will be as if they had "
"never existed: years worth of dossiers would suddenly become available for "
@@ -474,11 +474,11 @@
"negeren van de wet op toegang tot gegevens zou in zo'n situatie nauwelijks "
"zin hebben."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "First, Don't Be Foolish"
msgstr "Wees om te beginnen geen dwaas"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"To have privacy, you must not throw it away: the first one who has to "
"protect your privacy is you. Avoid identifying yourself to web sites, "
@@ -492,7 +492,7 @@
"dat websites hun bezoekers niet kunnen volgen. Gebruik de GNU Privacy Guard "
"om de inhoud van je e-mail te versleutelen. Betaal contant voor dingen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Keep your own data; don't store your data in a company's “"
"convenient” server. It's safe, however, to entrust a data backup to a "
@@ -507,7 +507,7 @@
"versleutelt, inclusief de bestandsnamen, met vrije software op je eigen "
"computer voordat je het archief daar neerzet. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy's sake, you must avoid nonfree software since, as a consequence "
"of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -525,7 +525,7 @@
"jouw computeractiviteiten: het vereist dat je al jouw gegevens aan de server "
"overhandigt."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -548,7 +548,7 @@
"geven, zelfs als je jouw naam toch gaat geven, omdat het druk zet op anderen "
"om hun privacy in te leveren."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Self-protection is essential, but even the most rigorous self-protection is "
"insufficient to protect your privacy on or from systems that don't belong to "
@@ -567,11 +567,11 @@
"systemen stoppen met het volgen van personen die niet verdacht worden van "
"misdrijven."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "We Must Design Every System for Privacy"
msgstr "We moeten elk systeem ontwerpen met het oog op privacy"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we don't want a total surveillance society, we must consider surveillance "
"a kind of social pollution, and limit the surveillance impact of each new "
@@ -583,7 +583,7 @@
"toezichtmogelijkheden van elk nieuw digitaal systeem beperken, net zoals we "
"de invloed van constructiebouw op het milieu beperken."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For example: “smart” meters for electricity are touted for "
"sending the power company moment-by-moment data about each customer's "
@@ -607,15 +607,15 @@
"over elke gewenste tijdsperiode, met de het gemiddelde gebruik voor die "
"periode. Hetzelfde voordeel, zonder surveillance!"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid "We need to design such privacy into all our digital systems."
msgstr "We moeten zulke privacy in al onze digitale systemen inbouwen."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Collecting Data: Leaving It Dispersed"
msgstr "Oplossing voor het verzamelen van gegevens: verspreid het"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
"the data dispersed and inconvenient to access</a>. Old-fashioned security "
@@ -636,7 +636,7 @@
"misdrijf had gemeld. Het zou niet mogelijk zijn om alle videobanden elke dag "
"fysiek te verzamelen en te bekijken of te kopiëren. "
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Nowadays, security cameras have become surveillance cameras: they are "
"connected to the Internet so recordings can be collected in a data center "
@@ -652,7 +652,7 @@
"leiden waarop verdachte journalisten altijd op straat kunnen worden gevolgd, "
"waarbij bekeken kan worden met wie ze praten."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet-connected cameras often have lousy digital security themselves, "
"which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-"
@@ -675,7 +675,7 @@
"te publiceren, maar de systematische verzameling van zulke gegevens op het "
"internet moet worden beperkt."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
"points at the inside of a store, or at the street. Any camera pointed at "
@@ -687,11 +687,11 @@
"straat. Een camera die door iemand anders op iemands privéterrein is "
"gericht schendt de privacy, maar dat is een andere kwestie."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Internet Commerce Surveillance"
msgstr "Oplossing voor internettoezicht door bedrijven"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Most data collection comes from people's own digital activities. Usually "
"the data is collected first by companies. But when it comes to the threat "
@@ -706,7 +706,7 @@
"gegevens die bedrijven verzamelen zijn sowieso al systematisch beschikbaar "
"voor de overheid."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -736,7 +736,7 @@
"misbruiken veel van deze bedrijven de gegevens zelf of overhandigen het aan "
"gegevenshandelaren."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The goal of making journalism and democracy safe therefore requires that we "
"reduce the data collected about people by any organization, not just by the "
@@ -753,7 +753,7 @@
"transacties, mag het niet zijn toegestaan om deze langer te behouden dan een "
"korte tijd, niet langer dan nodig om de aankoop te verwerken."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One of the motives for the current level of surveillance of the Internet is "
"that sites are financed through advertising based on tracking users' "
@@ -772,7 +772,7 @@
"allemaal mee bekend dat het hebben van een “privacy-beleid” een "
"excuus is om privacy te schenden en niet iets om je aan te houden."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
# | We could correct both problems by adopting a system of anonymous
# | payments—anonymous for the payer, that is. (We don't want to help
# | the payee dodge taxes.) <a
@@ -817,7 +817,7 @@
"ontwikkeld in de jaren '80</a>; we hoeven alleen geschikte afspraken te "
"maken en een overheid die dit niet belemmert."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"A further threat from sites' collection of personal data is that security "
"breakers might get in, take it, and misuse it. This includes customers' "
@@ -831,11 +831,11 @@
"in een website kan jou geen schade toebrengen als de website niets over jou "
"weet."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Travel Surveillance"
msgstr "Oplossing voor toezicht in het verkeer en vervoer"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We must convert digital toll collection to anonymous payment (using digital "
"cash, for instance). License-plate recognition systems recognize all "
@@ -859,7 +859,7 @@
"de gegevens zou moeten worden beperkt tot het zoeken naar gezochte kentekens "
"die door een rechter op die lijst zijn geplaatst."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The U.S. “no-fly” list must be abolished because it is <a href="
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
@@ -870,7 +870,7 @@
"and-liberty-racial-justice/victory-federal-court-recognizes\">straft zonder "
"rechtszaak</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It is acceptable to have a list of people whose person and luggage will be "
"searched with extra care, and anonymous passengers on domestic flights could "
@@ -886,7 +886,7 @@
"als zij dit land niet mogen binnenreizen. Dit zou genoeg moeten zijn voor "
"alle legitieme doelen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Many mass transit systems use some kind of smart cards or RFIDs for "
"payment. These systems accumulate personal data: if you once make the "
@@ -902,7 +902,7 @@
"Verder slaan ze alle reizen op die elke kaart maakt. Tezamen is dit massale "
"surveillance. Deze gegevensverzameling moet worden ingeperkt."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Navigation services do surveillance: the user's computer tells the map "
"service the user's location and where the user wants to go; then the server "
@@ -926,7 +926,7 @@
"zonder dat iemand ooit wordt verteld waar de gebruiker is of waar hij heen "
"wil gaan."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Systems for borrowing bicycles, etc., can be designed so that the borrower's "
"identity is known only inside the station where the item was borrowed. "
@@ -957,11 +957,11 @@
"kwam het hoofdkantoor informeren; in een dergelijk geval kan het de "
"identiteit van de huurder onmiddellijk versturen."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Communications Dossiers"
msgstr "Oplossing voor communicatiedossiers"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
@@ -988,7 +988,7 @@
"your-location\">NSA locatiegegevens van mobiele telefoons massaal verzamelt</"
"a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unmonitored communication is impossible where systems create such dossiers. "
"So it should be illegal to create or keep them. ISPs and phone companies "
@@ -1001,7 +1001,7 @@
"deze informatie niet lang te bewaren, met uitzondering van een uitspraak van "
"een rechter om een bepaalde partij te surveilleren."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
@@ -1024,7 +1024,7 @@
"het geen gegevens verkrijgen van de telefoongesprekken van iedereen van voor "
"die tijd."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy about who you exchange email with, a simple partial solution is "
"for you and others to use email services in a country that would never "
@@ -1047,11 +1047,11 @@
"ontvangen van een gebruiker van jouw e-maildienst, maar het zou moeilijk "
"zijn om vast te stellen dat jij een e-mail naar mij hebt gestuurd."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "But Some Surveillance Is Necessary"
msgstr "Een beetje toezicht is wel nodig"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For the state to find criminals, it needs to be able to investigate specific "
"crimes, or specific suspected planned crimes, under a court order. With the "
@@ -1072,7 +1072,7 @@
"ontwerpen dat er geen massale dossiers worden opgebouwd vóór "
"het ontstaan ervan."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1097,7 +1097,7 @@
"police-edition\">hun gebruik van dwang met 60% was verminderd</a>. De ACLU "
"is hier voorstander van."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1119,7 +1119,7 @@
"gevaar van deze activiteiten (zoals de olieramp van BP, de kernramp van "
"Fukushima, en de financiële crisis van 2008) is groter dan terrorisme."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, journalism must be protected from surveillance even when it is "
"carried out as part of a business."
@@ -1127,7 +1127,7 @@
"Journalistiek moet echter beschermd worden tegen elke overheidstoezicht, "
"zelfs als het bedrijfsmatig wordt bedreven."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Digital technology has brought about a tremendous increase in the level of "
"surveillance of our movements, actions, and communications. It is far more "
@@ -1143,7 +1143,7 @@
"ondervonden</a> in de jaren 80. Voorgestelde wettelijke limieten op het "
"gebruik van verzamelde gegevens door de overheid zullen dat niet veranderen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Companies are designing even more intrusive surveillance. Some project that "
"pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1159,7 +1159,7 @@
"effecten zijn niet aantoonbaar, maar de bedreiging voor de democratie is "
"geen speculatie. Het bestaat en is vandaag de dag al zichtbaar."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unless we believe that our free countries previously suffered from a grave "
"surveillance deficit, and ought to be surveilled more than the Soviet Union "
Index: po/surveillance-vs-democracy.pot
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.pot,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/surveillance-vs-democracy.pot 22 Oct 2016 18:29:16 -0000 1.31
+++ po/surveillance-vs-democracy.pot 6 Nov 2016 21:28:16 -0000 1.32
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -34,25 +34,25 @@
msgid "A version of this article was first published in Wired in October 2013."
msgstr ""
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
msgid "<a href=\"/graphics/dog.html\">"
msgstr ""
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
msgid ""
"Cartoon of a dog, wondering at the three ads that popped up on his computer "
"screen..."
msgstr ""
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
msgid "</a>"
msgstr ""
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
msgid "“How did they find out I'm a dog?”"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Thanks to Edward Snowden's disclosures, we know that the current level of "
"general surveillance in society is incompatible with human rights. The "
@@ -65,7 +65,7 @@
"likely to be caught."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Faced with government secrecy, we the people depend on whistleblowers to <a "
"href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">tell us what "
@@ -75,7 +75,7 @@
"whistleblowers know they are safe."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Using free/libre software, <a "
"href=\"/philosophy/free-software-even-more-important.html\">as I've "
@@ -91,7 +91,7 @@
"privacy once we set foot on the Internet</a>."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a "
"href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
"
@@ -102,11 +102,11 @@
"identify him or her. We need to go further."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "The Upper Limit on Surveillance in a Democracy"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
"of effective control over our government and institutions. That's why "
@@ -114,7 +114,7 @@
"reporter is too much surveillance—too much for democracy to endure."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
"the <a "
@@ -131,7 +131,7 @@
"other companies too</a>."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the "
@@ -143,11 +143,11 @@
"journalist or a known dissident."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Information, Once Collected, Will Be Misused"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
@@ -161,7 +161,7 @@
"excuse to access the accumulated material."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
"personal reasons. Some NSA agents <a "
@@ -179,7 +179,7 @@
"digital systems</a>."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -191,7 +191,7 @@
"</a>."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Personal data collected by the state is also likely to be obtained by "
"outside crackers that break the security of the servers, even by <a "
@@ -199,14 +199,14 @@
"working for hostile states</a>."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Governments can easily use massive surveillance capability to <a "
"href=\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
"
"democracy directly</a>."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Total surveillance accessible to the state enables the state to launch a "
"massive fishing expedition against any person. To make journalism and "
@@ -214,11 +214,11 @@
"accessible to the state."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Robust Protection for Privacy Must Be Technical"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The Electronic Frontier Foundation and other organizations propose a set of "
"legal principles designed to <a "
@@ -229,21 +229,21 @@
"enforced without exception forever."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a "
"href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Meanwhile, demagogues will cite the usual excuses as grounds for total "
"surveillance; any terrorist attack, even one that kills just a handful of "
"people, can be hyped to provide an opportunity."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If limits on access to the data are set aside, it will be as if they had "
"never existed: years worth of dossiers would suddenly become available for "
@@ -256,11 +256,11 @@
"make sense."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "First, Don't Be Foolish"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"To have privacy, you must not throw it away: the first one who has to "
"protect your privacy is you. Avoid identifying yourself to web sites, "
@@ -269,7 +269,7 @@
"email. Pay for things with cash."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Keep your own data; don't store your data in a company's "
"“convenient” server. It's safe, however, to entrust a data "
@@ -278,7 +278,7 @@
"software on your own computer before uploading it."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy's sake, you must avoid nonfree software since, as a consequence "
"of giving others control of your computing, it is <a "
@@ -289,7 +289,7 @@
"it requires you to hand over all the pertinent data to the server."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Protect your friends' and acquaintances' privacy, too. <a "
"href=\"http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
"
@@ -302,7 +302,7 @@
"to surrender their privacy."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Self-protection is essential, but even the most rigorous self-protection is "
"insufficient to protect your privacy on or from systems that don't belong to "
@@ -313,11 +313,11 @@
"than legitimate suspects."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "We Must Design Every System for Privacy"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we don't want a total surveillance society, we must consider surveillance "
"a kind of social pollution, and limit the surveillance impact of each new "
@@ -325,7 +325,7 @@
"construction."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For example: “smart” meters for electricity are touted for "
"sending the power company moment-by-moment data about each customer's "
@@ -339,15 +339,15 @@
"surveillance!"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid "We need to design such privacy into all our digital systems."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Collecting Data: Leaving It Dispersed"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
"the data dispersed and inconvenient to access</a>. Old-fashioned security "
@@ -359,7 +359,7 @@
"every day and watch them or copy them."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Nowadays, security cameras have become surveillance cameras: they are "
"connected to the Internet so recordings can be collected in a data center "
@@ -369,7 +369,7 @@
"with."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet-connected cameras often have lousy digital security themselves, "
"which means <a "
@@ -382,7 +382,7 @@
"accumulation of such data on the Internet must be limited."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
"points at the inside of a store, or at the street. Any camera pointed at "
@@ -390,11 +390,11 @@
"another issue."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Internet Commerce Surveillance"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Most data collection comes from people's own digital activities. Usually "
"the data is collected first by companies. But when it comes to the threat "
@@ -403,7 +403,7 @@
"that the companies collect is systematically available to the state."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The NSA, through PRISM, has <a "
"href=\"https://www.commondreams.org/headline/2013/08/23-2\">gotten into the "
@@ -420,7 +420,7 @@
"directly or provide it to data brokers."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The goal of making journalism and democracy safe therefore requires that we "
"reduce the data collected about people by any organization, not just by the "
@@ -430,7 +430,7 @@
"inherently necessary for their dealings with us."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One of the motives for the current level of surveillance of the Internet is "
"that sites are financed through advertising based on tracking users' "
@@ -442,7 +442,7 @@
"commitments to uphold it."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
@@ -456,7 +456,7 @@
"suitable business arrangements, and for the state not to obstruct them."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"A further threat from sites' collection of personal data is that security "
"breakers might get in, take it, and misuse it. This includes customers' "
@@ -465,11 +465,11 @@
"you."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Travel Surveillance"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We must convert digital toll collection to anonymous payment (using digital "
"cash, for instance). License-plate recognition systems recognize all "
@@ -483,14 +483,14 @@
"court-ordered license-numbers."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The U.S. “no-fly” list must be abolished because it is <a "
"href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes\">punishment
"
"without trial</a>."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It is acceptable to have a list of people whose person and luggage will be "
"searched with extra care, and anonymous passengers on domestic flights could "
@@ -500,7 +500,7 @@
"purposes."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Many mass transit systems use some kind of smart cards or RFIDs for "
"payment. These systems accumulate personal data: if you once make the "
@@ -510,7 +510,7 @@
"collection must be reduced."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Navigation services do surveillance: the user's computer tells the map "
"service the user's location and where the user wants to go; then the server "
@@ -523,7 +523,7 @@
"telling anyone where the user is or wants to go."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Systems for borrowing bicycles, etc., can be designed so that the borrower's "
"identity is known only inside the station where the item was borrowed. "
@@ -540,11 +540,11 @@
"immediately."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Communications Dossiers"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
@@ -558,7 +558,7 @@
"collects cell phone location data</a> in bulk."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unmonitored communication is impossible where systems create such dossiers. "
"So it should be illegal to create or keep them. ISPs and phone companies "
@@ -566,7 +566,7 @@
"of a court order to surveil a certain party."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
@@ -580,7 +580,7 @@
"prior to that time."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy about who you exchange email with, a simple partial solution is "
"for you and others to use email services in a country that would never "
@@ -593,11 +593,11 @@
"service, but it would be hard to determine that you had sent mail to me."
msgstr ""
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "But Some Surveillance Is Necessary"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For the state to find criminals, it needs to be able to investigate specific "
"crimes, or specific suspected planned crimes, under a court order. With the "
@@ -608,7 +608,7 @@
"prevent digital systems from accumulating massive dossiers before the fact."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -621,7 +621,7 @@
"use of force fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a "
"href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations
"
@@ -634,13 +634,13 @@
"meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, journalism must be protected from surveillance even when it is "
"carried out as part of a business."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Digital technology has brought about a tremendous increase in the level of "
"surveillance of our movements, actions, and communications. It is far more "
@@ -651,7 +651,7 @@
"that."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Companies are designing even more intrusive surveillance. Some project that "
"pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -661,7 +661,7 @@
"democracy is not speculation. It exists and is visible today."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unless we believe that our free countries previously suffered from a grave "
"surveillance deficit, and ought to be surveilled more than the Soviet Union "
Index: po/surveillance-vs-democracy.pt-br.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.pt-br.po,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/surveillance-vs-democracy.pt-br.po 22 Oct 2016 18:29:16 -0000
1.8
+++ po/surveillance-vs-democracy.pt-br.po 6 Nov 2016 21:28:16 -0000
1.9
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-09-20 07:35-0300\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -40,11 +40,11 @@
"Uma versão deste artigo foi publicada primeiramente na Wired em Outubro de "
"2013."
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
msgid "<a href=\"/graphics/dog.html\">"
msgstr "<a href=\"/graphics/dog.html\">"
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
msgid ""
"Cartoon of a dog, wondering at the three ads that popped up on his computer "
"screen..."
@@ -53,15 +53,15 @@
"em sua tela..."
# type: Content of: <div><p>
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
msgid "</a>"
msgstr "</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
msgid "“How did they find out I'm a dog?”"
msgstr "âComo eles descobriram que eu sou um cachorro?â"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Thanks to Edward Snowden's disclosures, we know that the current level of "
"general surveillance in society is incompatible with human rights. The "
@@ -83,7 +83,7 @@
"democracia, na medida em que os denunciantes (como Snowden) são suscetÃveis
"
"de ser aprisionados."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Faced with government secrecy, we the people depend on whistleblowers to <a "
"href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">tell us what "
@@ -99,7 +99,7 @@
"muitos. Para recuperar nosso controle democrático sobre o estado, devemos "
"reduzir a vigilância ao ponto que denunciantes saibam que estarão seguros."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
@@ -140,7 +140,7 @@
"opinion/2013/10/149481/\">não protege nossa privacidade quando utilizamos a "
"Internet</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
@@ -157,11 +157,11 @@
"não será suficiente para proteger denunciantes, se âpegar os
denunciantesâ é "
"motivo suficiente para identificá-lo ou identificá-la. Necessitamos ir
além."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "The Upper Limit on Surveillance in a Democracy"
msgstr "O Limite Máximo de Vigilância em uma Democracia"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
"of effective control over our government and institutions. That's why "
@@ -174,7 +174,7 @@
"um jornalista é vigilância demais, uma vigilância que a democracia não
pode "
"tolerar."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "An unnamed U.S. government official ominously told journalists in 2011 "
@@ -218,7 +218,7 @@
"nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">de outras "
"empresas operadoras de comunicação também</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
@@ -237,11 +237,11 @@
"excessiva é atingido quando o Estado pode identificar quem se comunicou com "
"um jornalista ou com um dissidente conhecido."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Information, Once Collected, Will Be Misused"
msgstr "A Informação, Uma Vez Coletada, Será Utilizada de Modo Abusivo"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
@@ -264,7 +264,7 @@
"acesso, então uma vez que os denunciantes foram acusados de
âespionagemâ, "
"localizar o âespiãoâ será uma desculpa para acessar o material
acumulado."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "In addition, the state's surveillance staff will misuse the data for "
@@ -310,7 +310,7 @@
"theyarewatching.org/issues/risks-increase-once-data-shared\">novos sistemas "
"digitais</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -328,7 +328,7 @@
"citizens/\">Europa</a> e <a href=\"https://en.wikipedia.org/wiki/"
"Japanese_American_internment\">os EUA</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Personal data collected by the state is also likely to be obtained by "
"outside crackers that break the security of the servers, even by <a href="
@@ -342,7 +342,7 @@
"revealed-even-worse-than-first.shtml\">crackers trabalhando para Estados "
"hostis</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Governments can easily use massive surveillance capability to <a href="
"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
@@ -353,7 +353,7 @@
"is-blamed-for-wiretapping-scandal.html\">subverter diretamente a democracia</"
"a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Total surveillance accessible to the state enables the state to launch a "
"massive fishing expedition against any person. To make journalism and "
@@ -365,11 +365,11 @@
"jornalismo e a democracia seguros, necessitamos limitar a acumulação de "
"dados que está facilmente acessÃvel ao Estado."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Robust Protection for Privacy Must Be Technical"
msgstr "Proteção Robusta para a Privacidade Deve Ser Técnica"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The Electronic Frontier Foundation and other organizations propose a set of "
"legal principles designed to <a href=\"https://en.necessaryandproportionate."
@@ -386,7 +386,7 @@
"proteção das liberdades democráticas â se adotados completamente e "
"reforçados sem exceção para sempre."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -397,7 +397,7 @@
"suspensas ou <a href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html"
"\">ignoradas</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Meanwhile, demagogues will cite the usual excuses as grounds for total "
"surveillance; any terrorist attack, even one that kills just a handful of "
@@ -408,7 +408,7 @@
"apenas alguma pequena porção de pessoas, pode ser extravasada para fornecer
"
"uma oportunidade."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If limits on access to the data are set aside, it will be as if they had "
"never existed: years worth of dossiers would suddenly become available for "
@@ -430,11 +430,11 @@
"data. Quanto a suspender ou momentaneamente ignorar essa lei, a ideia "
"dificilmente faria sentido."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "First, Don't Be Foolish"
msgstr "Primeiramente, Não Seja Tolo"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"To have privacy, you must not throw it away: the first one who has to "
"protect your privacy is you. Avoid identifying yourself to web sites, "
@@ -448,7 +448,7 @@
"rastrear visitantes. Use o GNU Privacy Guard (GPG) para criptografar os "
"conteúdos de seu e-mail. Pague por coisas com dinheiro."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Keep your own data; don't store your data in a company's “"
"convenient” server. It's safe, however, to entrust a data backup to a "
@@ -462,7 +462,7 @@
"criptografe todo o pacote, incluindo os nomes dos arquivos, com software "
"libre em seu próprio computadores antes de enviá-lo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy's sake, you must avoid nonfree software since, as a consequence "
"of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -479,7 +479,7 @@
"outros o controle de seu computador, isso requer que você entregue todos os "
"dados pertinentes do servidor."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -501,7 +501,7 @@
"usuários forneça seus nomes reais, mesmo se você vai informar o seu, já
que "
"eles pressionam outras pessoas a abrir mão de sua privacidade."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Self-protection is essential, but even the most rigorous self-protection is "
"insufficient to protect your privacy on or from systems that don't belong to "
@@ -519,11 +519,11 @@
"todos eles. Claramente, a melhor solução é fazer com que todos esses "
"sistemas parem de vigiar pessoas além dos legitimamente suspeitos."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "We Must Design Every System for Privacy"
msgstr "Nós Devemos Projetar Todo Sistema para Privacidade"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we don't want a total surveillance society, we must consider surveillance "
"a kind of social pollution, and limit the surveillance impact of each new "
@@ -535,7 +535,7 @@
"vigilância de cada novo sistema digital da mesma forma que nós limitamos o "
"impacto ambiental de uma construção fÃsica."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For example: “smart” meters for electricity are touted for "
"sending the power company moment-by-moment data about each customer's "
@@ -559,16 +559,16 @@
"qualquer perÃodo desejado de tempo, com o padrão de uso médio para aquele "
"perÃodo. O mesmo benefÃcio, com nenhuma vigilância!"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid "We need to design such privacy into all our digital systems."
msgstr ""
"Nós precisamos projetar tal privacidade em todos os nossos sistemas
digitais."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Collecting Data: Leaving It Dispersed"
msgstr "Remédio para Coleta de Dados: Deixá-los Dispersos"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
"the data dispersed and inconvenient to access</a>. Old-fashioned security "
@@ -588,7 +588,7 @@
"locais onde alguém relatou um crime. Não seria realizável coletar "
"fisicamente milhões de fitas todo o dia e assisti-las ou copiá-las."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Nowadays, security cameras have become surveillance cameras: they are "
"connected to the Internet so recordings can be collected in a data center "
@@ -604,7 +604,7 @@
"que jornalistas suspeitos podem ser rastreados na rua todo o tempo para ver "
"com quem eles conversam."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet-connected cameras often have lousy digital security themselves, "
"which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-"
@@ -627,7 +627,7 @@
"vÃdeo ocasionalmente, mas a acumulação sistemática de tais dados na
Internet "
"deve ser limitada."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
"points at the inside of a store, or at the street. Any camera pointed at "
@@ -639,11 +639,11 @@
"aponte para o espaço privado de alguém por outra pessoa está violando a "
"privacidade do primeiro, mas isto é uma outra questão."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Internet Commerce Surveillance"
msgstr "Remédio para a Vigilância Comercial da Internet"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Most data collection comes from people's own digital activities. Usually "
"the data is collected first by companies. But when it comes to the threat "
@@ -658,7 +658,7 @@
"os dados que as empresas coletam está sistematicamente disponÃvel para o "
"Estado."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -690,7 +690,7 @@
"ou os fornecem para <i>data brokersâ</i><sup><a
href=\"#TransNote3\">3</a></"
"sup>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The goal of making journalism and democracy safe therefore requires that we "
"reduce the data collected about people by any organization, not just by the "
@@ -707,7 +707,7 @@
"mantê-los mais do que um curto perÃodo de tempo além do que é "
"intrinsecamente necessário para suas negociações conosco."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One of the motives for the current level of surveillance of the Internet is "
"that sites are financed through advertising based on tracking users' "
@@ -725,7 +725,7 @@
"todos nós estamos sabendo que âpolÃticas de privacidadeâ são mais
desculpas "
"para violação de privacidade do que compromisso de cumprimento."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "We could correct both problems by adopting a system of anonymous "
@@ -758,7 +758,7 @@
"\">dinheiro digital foi primeiramente nos anos 80s</a>; nós só precisamos
de "
"organizar um negócio adequado, e que o Estado não o obstrua."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"A further threat from sites' collection of personal data is that security "
"breakers might get in, take it, and misuse it. This includes customers' "
@@ -771,11 +771,11 @@
"sistema de pagamento anônimo exigiriam o fim desse perigo: um buraco de "
"segurança em um site não pode machucar se o site sabe nada sobre você."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Travel Surveillance"
msgstr "Remédio para Vigilância em Viagens"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We must convert digital toll collection to anonymous payment (using digital "
"cash, for instance). License-plate recognition systems recognize all "
@@ -798,7 +798,7 @@
"dados todos disponÃveis na Internet; acesso aos dados deveria ser limitado a
"
"pesquisar por uma lista de números de placas sob ordem judicial."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The U.S. “no-fly” list must be abolished because it is <a href="
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
@@ -808,7 +808,7 @@
"<a href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-"
"racial-justice/victory-federal-court-recognizes\">punição sem
julgamento</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It is acceptable to have a list of people whose person and luggage will be "
"searched with extra care, and anonymous passengers on domestic flights could "
@@ -824,7 +824,7 @@
"voos desde o embarque até o paÃs. Isso seria suficiente para todos "
"propósitos legÃtimos."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Many mass transit systems use some kind of smart cards or RFIDs for "
"payment. These systems accumulate personal data: if you once make the "
@@ -841,7 +841,7 @@
"Juntando tudo, eles acumulam muito para a vigilância massiva. A coleta "
"desses dados deve ser reduzida."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Navigation services do surveillance: the user's computer tells the map "
"service the user's location and where the user wants to go; then the server "
@@ -864,7 +864,7 @@
"anteriormente), computar a rota, e exibi-la, sem repassar a ninguém onde o "
"usuários está e aonde deseja ir."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Systems for borrowing bicycles, etc., can be designed so that the borrower's "
"identity is known only inside the station where the item was borrowed. "
@@ -894,11 +894,11 @@
"central; neste caso, ela poderia enviar a identidade do locatário "
"imediatamente."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Communications Dossiers"
msgstr "Remédio para Dossiês de Comunicação"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
@@ -925,7 +925,7 @@
"sounds-nsa-tracking-your-location\">NSA coleta dados da localização de "
"telefone celular</a> em massa."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unmonitored communication is impossible where systems create such dossiers. "
"So it should be illegal to create or keep them. ISPs and phone companies "
@@ -937,7 +937,7 @@
"telefonia devem não ser permitidas de manter essa informação por muito "
"tempo, na ausência de uma ordem judicial para vigiar uma determinada pessoa."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
@@ -961,7 +961,7 @@
"dados de todo mundo sobre as chamadas telefônicas feitas anteriormente a "
"este perÃodo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy about who you exchange email with, a simple partial solution is "
"for you and others to use email services in a country that would never "
@@ -983,11 +983,11 @@
"mail de alguns de meus usuários de seu serviço de e-mail, mas que seria "
"difÃcil determinar que você enviou um e-mail para mim."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "But Some Surveillance Is Necessary"
msgstr "Mas Alguma Vigilância à Necessária"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For the state to find criminals, it needs to be able to investigate specific "
"crimes, or specific suspected planned crimes, under a court order. With the "
@@ -1006,7 +1006,7 @@
"denunciantes após o fato, se (como eu recomendo) nós proibirmos que os "
"sistemas digitais acumulem dossiês massivos antes do fato."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1032,7 +1032,7 @@
"police-edition\">eles seu uso de força caiu em 60%</a>;. A ACLU concorda com
"
"isto."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1054,7 +1054,7 @@
"vazamento de óleo da petroleira BP, colapsos de Fukushima e as crises "
"fiscais em 2008) superam o terrorismo."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, journalism must be protected from surveillance even when it is "
"carried out as part of a business."
@@ -1062,7 +1062,7 @@
"Porém, jornalismo deve ser protegido da vigilância mesmo quando esta é
parte "
"de um negócio."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Digital technology has brought about a tremendous increase in the level of "
"surveillance of our movements, actions, and communications. It is far more "
@@ -1078,7 +1078,7 @@
"Cortina de Ferro experimentaram</a> nos anos 80s, e os limites legais "
"propostos para o uso do Estado dos dados acumulados em nada alterariam."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Companies are designing even more intrusive surveillance. Some project that "
"pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1094,7 +1094,7 @@
"pessoas pensam</a>. Tais possibilidades são imponderáveis; mas a ameaça Ã
"
"democracia não é especulação. Ela existe e está visÃvel hoje."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unless we believe that our free countries previously suffered from a grave "
"surveillance deficit, and ought to be surveilled more than the Soviet Union "
Index: po/surveillance-vs-democracy.ru-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ru-en.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- po/surveillance-vs-democracy.ru-en.html 23 Oct 2016 10:58:35 -0000
1.21
+++ po/surveillance-vs-democracy.ru-en.html 6 Nov 2016 21:28:16 -0000
1.22
@@ -2,19 +2,31 @@
<!-- Parent-Version: 1.77 -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+--></style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
-<p>by <a href="http://www.stallman.org/">Richard Stallman</a></p>
+<p class="byline center">by <a href="http://www.stallman.org/">Richard
Stallman</a></p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>A version of this article was first published in Wired
+<blockquote class="center"><p>A version of this article was first published in
Wired
in October 2013.</p></blockquote>
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the
three ads that popped up on his computer screen..." /></a>
<p>“How did they find out I'm a dog?”</p>
@@ -30,7 +42,8 @@
is not exceeded? It is the level beyond which surveillance starts to
interfere with the functioning of democracy, in that whistleblowers
(such as Snowden) are likely to be caught.</p>
-
+</div>
+<div class="columns" style="clear:both">
<p>Faced with government secrecy, we the people depend on
whistleblowers
to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
@@ -60,9 +73,11 @@
suffice to protect whistleblowers if “catching the
whistleblower” is grounds for access sufficient to identify him
or her. We need to go further.</p>
+</div>
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a
Democracy</h3>
+<div class="columns">
<p>If whistleblowers don't dare reveal crimes and lies, we lose the
last shred of effective control over our government and institutions.
That's why surveillance that enables the state to find out who has
@@ -91,9 +106,11 @@
that there might be terrorists among them. The point at which
surveillance is too much is the point at which the state can find who
spoke to a known journalist or a known dissident.</p>
+</div>
-<h3>Information, Once Collected, Will Be Misused</h3>
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
+<div class="columns">
<p>When people recognize that the level of general surveillance is too
high, the first response is to propose limits on access to the
accumulated data. That sounds nice, but it won't fix the problem, not
@@ -140,9 +157,11 @@
launch a massive fishing expedition against any person. To make
journalism and democracy safe, we must limit the accumulation of data
that is easily accessible to the state.</p>
+</div>
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
+<div class="columns">
<p>The Electronic Frontier Foundation and other organizations propose
a set of legal principles designed to <a
href="https://en.necessaryandproportionate.org/text">prevent the
@@ -170,9 +189,11 @@
regime would have to implement surveillance afresh, and it would only
collect data starting at that date. As for suspending or momentarily
ignoring this law, the idea would hardly make sense.</p>
+</div>
-<h3>First, Don't Be Foolish</h3>
+<h3 class="subheader">First, Don't Be Foolish</h3>
+<div class="columns">
<p>To have privacy, you must not throw it away: the first one who has
to protect your privacy is you. Avoid identifying yourself to web
sites, contact them with Tor, and use browsers that block the schemes
@@ -213,9 +234,11 @@
movements, but not all of them. Clearly, the better solution is to
make all these systems stop surveilling people other than legitimate
suspects.</p>
+</div>
-<h3>We Must Design Every System for Privacy</h3>
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
+<div class="columns">
<p>If we don't want a total surveillance society, we must consider
surveillance a kind of social pollution, and limit the surveillance
impact of each new digital system just as we limit the environmental
@@ -233,9 +256,11 @@
period. The same benefit, with no surveillance!</p>
<p>We need to design such privacy into all our digital systems.</p>
+</div>
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
+<div class="columns">
<p>One way to make monitoring safe for privacy is
to <a name="dispersal">keep the data dispersed and inconvenient to
access</a>. Old-fashioned security cameras were no threat to privacy(<a
href="#privatespace">*</a>).
@@ -267,9 +292,11 @@
camera points at the inside of a store, or at the street. Any camera
pointed at someone's private space by someone else violates privacy,
but that is another issue.</p>
+</div>
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce
Surveillance</h3>
+<div class="columns">
<p>Most data collection comes from people's own digital activities.
Usually the data is collected first by companies. But when it comes
to the threat to privacy and democracy, it makes no difference whether
@@ -325,9 +352,11 @@
customers' credit card details. An anonymous payment system would end
this danger: a security hole in the site can't hurt you if the site
knows nothing about you.</p>
+</div>
-<h3>Remedy for Travel Surveillance</h3>
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
+<div class="columns">
<p>We must convert digital toll collection to anonymous payment (using
digital cash, for instance). License-plate recognition systems
recognize all license plates, and
@@ -382,9 +411,11 @@
remains “out” for too long, the station where it was
borrowed can inform headquarters; in that case, it could send the
borrower's identity immediately.</p>
+</div>
-<h3>Remedy for Communications Dossiers</h3>
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
+<div class="columns">
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
@@ -422,9 +453,11 @@
some user of my email service, and my email service would know only
that I received mail from some user of your email service, but it
would be hard to determine that you had sent mail to me.</p>
+</div>
-<h3>But Some Surveillance Is Necessary</h3>
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
+<div class="columns">
<p>For the state to find criminals, it needs to be able to investigate
specific crimes, or specific suspected planned crimes, under a court
order. With the Internet, the power to tap phone conversations would
@@ -458,9 +491,10 @@
<p>However, journalism must be protected from surveillance even when
it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
-<hr />
-
+<div class="reduced-width">
<p>Digital technology has brought about a tremendous increase in the
level of surveillance of our movements, actions, and communications.
It is far more than we experienced in the 1990s, and <a
@@ -480,6 +514,8 @@
a grave surveillance deficit, and ought to be surveilled more than the
Soviet Union and East Germany were, we must reverse this increase.
That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -538,7 +574,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/23 10:58:35 $
+$Date: 2016/11/06 21:28:16 $
<!-- timestamp end -->
</p>
</div>
Index: po/surveillance-vs-democracy.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ru.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- po/surveillance-vs-democracy.ru.po 23 Oct 2016 10:58:35 -0000 1.59
+++ po/surveillance-vs-democracy.ru.po 6 Nov 2016 21:28:16 -0000 1.60
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-10-23 09:27+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -39,11 +39,11 @@
"ÐеÑÐ²Ð°Ñ Ð²ÐµÑÑÐ¸Ñ ÑÑой ÑÑаÑÑи бÑла
опÑбликована в окÑÑбÑе 2013 года в "
"“УайеÑед”."
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
msgid "<a href=\"/graphics/dog.html\">"
msgstr "<a href=\"/graphics/dog.html\">"
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
msgid ""
"Cartoon of a dog, wondering at the three ads that popped up on his computer "
"screen..."
@@ -51,15 +51,15 @@
"ÐаÑикаÑÑÑа: Ñобака Ñ Ñдивлением ÑмоÑÑиÑ
на ÑекламÑ, вÑÑкоÑивÑÑÑ Ð½Ð° ÑкÑане ее "
"компÑÑÑеÑа"
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
msgid "</a>"
msgstr "</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
msgid "“How did they find out I'm a dog?”"
msgstr "“Ðак они Ñзнали, ÑÑо Ñ —
Ñобака?”"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Thanks to Edward Snowden's disclosures, we know that the current level of "
"general surveillance in society is incompatible with human rights. The "
@@ -81,7 +81,7 @@
"Ñлежка наÑÐ¸Ð½Ð°ÐµÑ Ð²Ð¼ÐµÑиваÑÑÑÑ Ð²
ÑÑнкÑиониÑование демокÑаÑии, когда "
"оÑведомиÑелей (ÑакиÑ
как СноÑден), как
пÑавило, оÑлавливаÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Faced with government secrecy, we the people depend on whistleblowers to <a "
"href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">tell us what "
@@ -98,7 +98,7 @@
"гоÑÑдаÑÑÑвом, Ð¼Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ ÑокÑаÑиÑÑ ÑлежкÑ
до велиÑинÑ, пÑи коÑоÑой "
"оÑведомиÑели бÑдÑÑ Ð·Ð½Ð°ÑÑ, ÑÑо они в
безопаÑноÑÑи."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -127,7 +127,7 @@
"wired.com/opinion/2013/10/149481/\"> ÑÑо не заÑиÑÐ¸Ñ Ð½Ð°ÑÑ
ÑаÑÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ, "
"когда Ð¼Ñ Ð²ÑÑ
одим в ÐнÑеÑнеÑ</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
@@ -145,11 +145,11 @@
"поимка оÑведомиÑелє ÑÑановиÑÑÑ
оÑнованием Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа к даннÑм, "
"позволÑÑÑим иденÑиÑиÑиÑоваÑÑ ÐµÐ³Ð¾. Ðам
нÑжно идÑи далÑÑе."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "The Upper Limit on Surveillance in a Democracy"
msgstr "ÐеÑÑ
ний пÑедел Ñлежки пÑи демокÑаÑии"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
"of effective control over our government and institutions. That's why "
@@ -162,7 +162,7 @@
"гоÑÑдаÑÑÑÐ²Ñ ÑзнаваÑÑ, кÑо говоÑил Ñ
жÑÑналиÑÑом, ÑлиÑком велика — "
"ÑлиÑком велика, ÑÑÐ¾Ð±Ñ Ð´ÐµÐ¼Ð¾ÐºÑаÑÐ¸Ñ Ð¼Ð¾Ð³Ð»Ð° ее
вÑдеÑжаÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
@@ -191,7 +191,7 @@
"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
"verizon-2013-06-07\"> а Ñакже Ð¾Ñ Ð´ÑÑгиÑ
компаний</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
@@ -210,11 +210,11 @@
"ÑÑановиÑÑÑ ÑлиÑком велика — ÑÑо
ÑоÑка, в коÑоÑой гоÑÑдаÑÑÑво "
"Ð¼Ð¾Ð¶ÐµÑ ÑзнаÑÑ, кÑо говоÑил Ñ Ð¸Ð·Ð²ÐµÑÑнÑм
жÑÑналиÑÑом или извеÑÑнÑм диÑÑиденÑом."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Information, Once Collected, Will Be Misused"
msgstr "ÐÐ´Ð½Ð°Ð¶Ð´Ñ ÑобÑаннÑми ÑведениÑми бÑдÑÑ
злоÑпоÑÑеблÑÑÑ"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
@@ -238,7 +238,7 @@
"обвинÑÑ Ð² “Ñпионаже”, поиÑк
“Ñпиона” ÑÑÐ°Ð½ÐµÑ Ð¿Ð¾Ð²Ð¾Ð´Ð¾Ð¼ "
"Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа к Ð½Ð°ÐºÐ¾Ð¿Ð»ÐµÐ½Ð½Ð¾Ð¼Ñ Ð¼Ð°ÑеÑиалÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
@@ -270,7 +270,7 @@
"risks-increase-once-data-shared\">ÑиÑиÑÑÑ Ñ Ð¿Ð¾Ñвлением
новÑÑ
ÑиÑÑовÑÑ
"
"ÑиÑÑем</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -287,7 +287,7 @@
"will-always-be-used-against-the-citizens/\">пÑимеÑÑ Ð¸Ð·
ÐвÑопÑ</a> и <a href="
"\"https://en.wikipedia.org/wiki/Japanese_American_internment\">СШÐ</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Personal data collected by the state is also likely to be obtained by "
"outside crackers that break the security of the servers, even by <a href="
@@ -301,7 +301,7 @@
"revealed-even-worse-than-first.shtml\">взломÑиков,
ÑабоÑаÑÑиÑ
на вÑаждебнÑе "
"гоÑÑдаÑÑÑва</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Governments can easily use massive surveillance capability to <a href="
"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
@@ -312,7 +312,7 @@
"government-is-blamed-for-wiretapping-scandal.html\">напÑÑмÑÑ
подÑиниÑÑ Ñебе "
"демокÑаÑиÑ</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Total surveillance accessible to the state enables the state to launch a "
"massive fishing expedition against any person. To make journalism and "
@@ -324,11 +324,11 @@
"жÑÑналиÑÑÐ¸ÐºÑ Ð¸ демокÑаÑиÑ, Ð¼Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ
огÑаниÑиÑÑ ÑÐ±Ð¾Ñ Ð´Ð°Ð½Ð½ÑÑ
, коÑоÑÑе бÑдÑÑ "
"легко доÑÑÑÐ¿Ð½Ñ Ð³Ð¾ÑÑдаÑÑÑвÑ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Robust Protection for Privacy Must Be Technical"
msgstr "СÑÐ¾Ð¹ÐºÐ°Ñ Ð·Ð°ÑиÑа лиÑной жизни должна
бÑÑÑ ÑеÑ
ниÑеÑкой"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The Electronic Frontier Foundation and other organizations propose a set of "
"legal principles designed to <a href=\"https://en.necessaryandproportionate."
@@ -345,7 +345,7 @@
"Ñвобод — еÑли иÑ
пÑимÑÑ Ð² полном
обÑеме и бÑдÑÑ ÑоблÑдаÑÑ Ð²Ñегда "
"и без иÑклÑÑений."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -356,7 +356,7 @@
"Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ Ð¿ÑиоÑÑановлено, Ð½Ð°ÐºÐ¾Ð½ÐµÑ Ð¸Ñ
могÑÑ <a href=\"http://www.nytimes."
"com/2009/04/16/us/16nsa.html\"> игноÑиÑоваÑÑ</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Meanwhile, demagogues will cite the usual excuses as grounds for total "
"surveillance; any terrorist attack, even one that kills just a handful of "
@@ -366,7 +366,7 @@
"оÑнований Ð´Ð»Ñ ÑоÑалÑной Ñлежки; лÑбой
ÑеÑÑоÑиÑÑиÑеÑкий акÑ, даже еÑли в нем "
"Ð¿Ð¾Ð³Ð¸Ð±Ð½ÐµÑ Ð²Ñего неÑколÑко Ñеловек, можеÑ
иÑполÑзоваÑÑÑÑ Ð¸Ð¼Ð¸ как повод."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If limits on access to the data are set aside, it will be as if they had "
"never existed: years worth of dossiers would suddenly become available for "
@@ -388,11 +388,11 @@
"моменÑа. ЧÑо каÑаеÑÑÑ Ð¿ÑиоÑÑановки
дейÑÑÐ²Ð¸Ñ Ð¸Ð»Ð¸ игноÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ ÑÑого закона, "
"Ñо ÑÑа Ð¸Ð´ÐµÑ ÐµÐ´Ð²Ð° ли Ð¸Ð¼ÐµÐµÑ ÑмÑÑл."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "First, Don't Be Foolish"
msgstr "Ðо-пеÑвÑÑ
, не бÑÑÑ Ð´ÑÑаками"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"To have privacy, you must not throw it away: the first one who has to "
"protect your privacy is you. Avoid identifying yourself to web sites, "
@@ -407,7 +407,7 @@
"оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾ÑеÑиÑелей. ÐÑименÑйÑе GNU
Privacy Guard Ð´Ð»Ñ ÑиÑÑÐ¾Ð²Ð°Ð½Ð¸Ñ "
"ÑодеÑжимого Ñвоей ÑлекÑÑонной поÑÑÑ.
ÐплаÑивайÑе покÑпки налиÑнÑми."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Keep your own data; don't store your data in a company's “"
"convenient” server. It's safe, however, to entrust a data backup to a "
@@ -421,7 +421,7 @@
"веÑÑ ÑÑÐ¾Ñ Ð°ÑÑ
ив, в Ñом ÑиÑле имена Ñайлов,
на Ñвоем компÑÑÑеÑе Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ "
"ÑвободнÑÑ
пÑогÑамм пеÑед Ñем, как
оÑпÑавлÑÑÑ Ð¸Ñ
на ÑеÑвеÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy's sake, you must avoid nonfree software since, as a consequence "
"of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -438,7 +438,7 @@
"вÑÑиÑлениÑми, ÑÑо ÑÑебÑÐµÑ Ð¾Ñ Ð²Ð°Ñ
пÑедоÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð²ÑеÑ
обÑабаÑÑваемÑÑ
даннÑÑ
"
"на ÑеÑвеÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -461,7 +461,7 @@
"Ñвои наÑÑоÑÑие имена, даже еÑли вÑ
ÑобиÑаеÑеÑÑ Ð½Ð°Ð·Ð²Ð°ÑÑ Ñвои, поÑколÑÐºÑ ÑÑо "
"пооÑÑÑÐµÑ Ð´ÑÑгиÑ
лÑдей оÑказаÑÑÑÑ Ð¾Ñ Ñвоей
конÑиденÑиалÑноÑÑи."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Self-protection is essential, but even the most rigorous self-protection is "
"insufficient to protect your privacy on or from systems that don't belong to "
@@ -479,11 +479,11 @@
"но не вÑе иÑ
. ЯÑно, ÑÑо лÑÑÑе бÑло бÑ
заÑÑавиÑÑ Ð²Ñе ÑÑи ÑиÑÑÐµÐ¼Ñ Ð¿ÑекÑаÑиÑÑ "
"ÑÐ»ÐµÐ¶ÐºÑ Ð·Ð° лÑдÑми, за иÑклÑÑением законно
подозÑеваемÑÑ
."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "We Must Design Every System for Privacy"
msgstr "ÐаждÑÑ ÑиÑÑÐµÐ¼Ñ Ð½Ñжно пÑоекÑиÑоваÑÑ Ñ
ÑÑеÑом конÑиденÑиалÑноÑÑи"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we don't want a total surveillance society, we must consider surveillance "
"a kind of social pollution, and limit the surveillance impact of each new "
@@ -495,7 +495,7 @@
"каждой новой ÑиÑÑовой ÑиÑÑÐµÐ¼Ñ ÑоÑно Ñак
же, как Ð¼Ñ Ð¾Ð³ÑаниÑиваем воздейÑÑвие "
"ÑизиÑеÑкиÑ
ÑооÑÑжений на окÑÑжаÑÑÑÑ
ÑÑедÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For example: “smart” meters for electricity are touted for "
"sending the power company moment-by-moment data about each customer's "
@@ -519,16 +519,16 @@
"за нÑжнÑй пеÑиод Ñо ÑÑедним гÑаÑиком ÑаÑÑ
ода за ÑÑÐ¾Ñ Ð¿ÐµÑиод. То же Ñамое, "
"ÑолÑко без Ñлежки!"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid "We need to design such privacy into all our digital systems."
msgstr ""
"Ðам надо вÑÑÑаиваÑÑ ÑакÑÑ
конÑиденÑиалÑноÑÑÑ Ð²Ð¾ вÑе наÑи ÑиÑÑовÑе
ÑиÑÑемÑ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Collecting Data: Leaving It Dispersed"
msgstr "ÐеÑа пÑоÑив ÑбоÑа даннÑÑ
: оÑÑавлÑÑÑ Ð¸Ñ
ÑаÑÑÑедоÑоÑеннÑми"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
"the data dispersed and inconvenient to access</a>. Old-fashioned security "
@@ -548,7 +548,7 @@
"меÑÑаÑ
, где кÑо-Ñо ÑообÑал о пÑеÑÑÑплении.
ÐÑло ÑизиÑеÑки невозможно "
"ÑобиÑаÑÑ ÐºÐ°Ð¶Ð´Ñй Ð´ÐµÐ½Ñ Ð¼Ð¸Ð»Ð»Ð¸Ð¾Ð½Ñ Ð»ÐµÐ½Ñ, а
заÑем пÑоÑмаÑÑиваÑÑ Ð¸Ð»Ð¸ копиÑоваÑÑ Ð¸Ñ
."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Nowadays, security cameras have become surveillance cameras: they are "
"connected to the Internet so recordings can be collected in a data center "
@@ -564,7 +564,7 @@
"подозÑеваемÑÑ
жÑÑналиÑÑов ÑмогÑÑ
поÑÑоÑнно оÑÑлеживаÑÑ Ð½Ð° ÑлиÑе, ÑÑÐ¾Ð±Ñ "
"ÑвидеÑÑ, Ñ ÐºÐµÐ¼ они обÑаÑÑÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet-connected cameras often have lousy digital security themselves, "
"which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-"
@@ -587,7 +587,7 @@
"пÑбликоваÑÑ Ð¸Ð½Ð¾Ð³Ð´Ð° ÑоÑо- и видеозапиÑи, но
ÑиÑÑемаÑиÑеÑкое накопление ÑакиÑ
"
"даннÑÑ
в ÐнÑеÑнеÑе должно огÑаниÑиваÑÑÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
"points at the inside of a store, or at the street. Any camera pointed at "
@@ -599,11 +599,11 @@
"напÑÐ°Ð²Ð»ÐµÐ½Ð½Ð°Ñ Ð² ÑÑе-Ñо лиÑное пÑоÑÑÑанÑÑво
кем-Ñо дÑÑгим, вÑоÑгаеÑÑÑ Ð² лиÑнÑÑ "
"жизнÑ, но ÑÑо дÑÑгой вопÑоÑ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Internet Commerce Surveillance"
msgstr "ÐеÑÑ Ð¿ÑоÑив коммеÑÑеÑкой Ñлежки в
ÐнÑеÑнеÑе"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Most data collection comes from people's own digital activities. Usually "
"the data is collected first by companies. But when it comes to the threat "
@@ -618,7 +618,7 @@
"поÑÐ¾Ð¼Ñ ÑÑо даннÑе, коÑоÑÑе ÑобиÑаÑÑ
компании, ÑиÑÑемаÑиÑеÑки доÑÑÑÐ¿Ð½Ñ "
"гоÑÑдаÑÑÑвÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -648,7 +648,7 @@
"коÑоÑÑй они же и наноÑÑÑ, ÑобиÑÐ°Ñ ÑÑи
даннÑе. ÐÑоме Ñого, многие из ÑÑиÑ
"
"компаний напÑÑмÑÑ Ð·Ð»Ð¾ÑпоÑÑеблÑÑÑ
даннÑми, пÑÐ¾Ð´Ð°Ð²Ð°Ñ Ð¸Ñ
на биÑже даннÑÑ
."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The goal of making journalism and democracy safe therefore requires that we "
"reduce the data collected about people by any organization, not just by the "
@@ -665,7 +665,7 @@
"долÑÑе, Ñем коÑоÑкое вÑÐµÐ¼Ñ ÑвеÑÑ
Ñого, ÑÑо
пÑинÑипиалÑно необÑ
одимо в иÑ
"
"ÑабоÑе Ñ Ð½Ð°Ð¼Ð¸."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One of the motives for the current level of surveillance of the Internet is "
"that sites are financed through advertising based on tracking users' "
@@ -685,7 +685,7 @@
"конÑиденÑиалÑноÑÑи” пÑедÑÑавлÑÑÑ
Ñобой ÑкоÑее опÑÐ°Ð²Ð´Ð°Ð½Ð¸Ñ Ð´Ð»Ñ Ð½Ð°ÑÑÑÐµÐ½Ð¸Ñ "
"конÑиденÑиалÑноÑÑи, Ñем намеÑениÑ
ÑоблÑдаÑÑ ÐµÐµ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
@@ -709,7 +709,7 @@
"пÑедпÑиÑÑий, коÑоÑÑе занималиÑÑ Ð±Ñ ÑÑим, и
гоÑÑдаÑÑÑва, коÑоÑое не "
"пÑепÑÑÑÑвовало Ð±Ñ ÑÑомÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"A further threat from sites' collection of personal data is that security "
"breakers might get in, take it, and misuse it. This includes customers' "
@@ -722,11 +722,11 @@
"поконÑила Ð±Ñ Ñ ÑÑой ÑгÑозой: бÑеÑÑ Ð²
заÑиÑе ÑайÑа не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð²ÑедиÑÑ Ð²Ð°Ð¼, "
"когда ÑÐ°Ð¹Ñ Ð½Ð¸Ñего о Ð²Ð°Ñ Ð½Ðµ знаеÑ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Travel Surveillance"
msgstr "ÐеÑÑ Ð¿ÑоÑив Ñлежки за пеÑедвижениÑми"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We must convert digital toll collection to anonymous payment (using digital "
"cash, for instance). License-plate recognition systems recognize all "
@@ -749,7 +749,7 @@
"ÐнÑеÑнеÑÑ; доÑÑÑп к даннÑм должен бÑÑÑ
огÑаниÑен ÑпиÑком номеÑов авÑомобилей "
"в ÑозÑÑке."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The U.S. “no-fly” list must be abolished because it is <a href="
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
@@ -759,7 +759,7 @@
"href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-"
"racial-justice/victory-federal-court-recognizes\"> наказание без
ÑÑда</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It is acceptable to have a list of people whose person and luggage will be "
"searched with extra care, and anonymous passengers on domestic flights could "
@@ -774,7 +774,7 @@
"вообÑе не ÑазÑеÑен вÑезд в ÑÑÑанÑ, поÑадкÑ
на ÑейÑÑ Ñ Ð¿Ð¾Ñадками в ÑÑой "
"ÑÑÑане. ÐÑого должно бÑÑÑ Ð´Ð¾ÑÑаÑоÑно длÑ
вÑеÑ
законнÑÑ
Ñелей."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Many mass transit systems use some kind of smart cards or RFIDs for "
"payment. These systems accumulate personal data: if you once make the "
@@ -790,7 +790,7 @@
"ÑвÑзаннÑе Ñ ÐºÐ°Ð¶Ð´Ð¾Ð¹ каÑÑой. ÐÑе ÑÑо вмеÑÑе
ÑоÑÑавлÑÐµÑ ÑиÑÑÐµÐ¼Ñ Ð¼Ð°ÑÑовой "
"Ñлежки. Ð¡Ð±Ð¾Ñ ÑÑиÑ
даннÑÑ
нÑжно ÑокÑаÑиÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Navigation services do surveillance: the user's computer tells the map "
"service the user's location and where the user wants to go; then the server "
@@ -813,7 +813,7 @@
"(еÑли они еÑе не полÑÑенÑ), пÑокладÑваÑÑ
маÑÑÑÑÑ Ð¸ оÑобÑажаÑÑ ÐµÐ³Ð¾, не "
"пеÑÐµÐ´Ð°Ð²Ð°Ñ Ð½Ð¸ÐºÑда меÑÑоположениÑ
полÑзоваÑÐµÐ»Ñ Ð¸ пÑÐ½ÐºÑ Ð½Ð°Ð·Ð½Ð°ÑениÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Systems for borrowing bicycles, etc., can be designed so that the borrower's "
"identity is known only inside the station where the item was borrowed. "
@@ -843,11 +843,11 @@
"взÑли, Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑоинÑоÑмиÑоваÑÑ ÑенÑÑ; в
ÑÑом ÑлÑÑае она могла Ð±Ñ Ð½ÐµÐ¼ÐµÐ´Ð»ÐµÐ½Ð½Ð¾ "
"ÑообÑиÑÑ Ð¾ лиÑноÑÑи Ñого, кÑо взÑл ÑÑÑ
единиÑÑ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Communications Dossiers"
msgstr "ÐеÑÑ Ð¿ÑоÑив коммÑникаÑионнÑÑ
доÑÑе"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
@@ -875,7 +875,7 @@
"безопаÑноÑÑи ÑобиÑÐ°ÐµÑ Ð´Ð°Ð½Ð½Ñе о
меÑÑоположении ÑоÑовÑÑ
ÑелеÑонов</a> в "
"маÑÑовÑÑ
колиÑеÑÑваÑ
."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unmonitored communication is impossible where systems create such dossiers. "
"So it should be illegal to create or keep them. ISPs and phone companies "
@@ -888,7 +888,7 @@
"долго, еÑли ÑолÑко наблÑдение за
опÑеделеннÑм лиÑом не ÑÑÑановлено в "
"ÑÑдебном поÑÑдке."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
@@ -911,7 +911,7 @@
"Ñода ÑлежкÑ, оно не полÑÑило Ð±Ñ Ð´Ð°Ð½Ð½Ñе о
ÑелеÑоннÑÑ
пеÑеговоÑаÑ
каждого, "
"пÑоведеннÑÑ
до ÑÑого вÑемени."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy about who you exchange email with, a simple partial solution is "
"for you and others to use email services in a country that would never "
@@ -933,11 +933,11 @@
"какомÑ-Ñо полÑзоваÑÐµÐ»Ñ Ð¼Ð¾ÐµÐ¹ ÑлÑжбÑ
ÑлекÑÑонной поÑÑÑ, но бÑло Ð±Ñ ÑÑÑдно "
"опÑеделиÑÑ, ÑÑо Ð²Ñ Ð¿Ð¾Ñлали ÑообÑение мне."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "But Some Surveillance Is Necessary"
msgstr "Ðо иногда Ñлежка необÑ
одима"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For the state to find criminals, it needs to be able to investigate specific "
"crimes, or specific suspected planned crimes, under a court order. With the "
@@ -956,7 +956,7 @@
"(как Ñ Ñекомендовал) Ð¼Ñ Ð¿ÑедоÑвÑаÑим
пÑедваÑиÑелÑное маÑÑовое накопление "
"доÑÑе ÑиÑÑовÑми ÑиÑÑемами."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -982,7 +982,7 @@
"police-edition\"> пÑименение ÑÐ¸Ð»Ñ Ð¿Ð¾Ð»Ð¸ÑейÑкими
ÑокÑаÑилоÑÑ Ð½Ð° 60%</a>. ACLU "
"поддеÑÐ¶Ð¸Ð²Ð°ÐµÑ ÑÑо."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1006,7 +1006,7 @@
"неÑÑи BP, аваÑÐ¸Ñ Ð½Ð° ÐÐС в ФÑкÑÑиме и
ÑинанÑовÑй кÑÐ¸Ð·Ð¸Ñ 2008 года) "
"ÑгÑоза ÑеÑÑоÑизма иÑÑезаÑÑе мала."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, journalism must be protected from surveillance even when it is "
"carried out as part of a business."
@@ -1014,7 +1014,7 @@
"Ðднако жÑÑналиÑÑÐ¸ÐºÑ Ð½Ñжно заÑиÑаÑÑ Ð¾Ñ
наблÑдениÑ, даже еÑли она ведеÑÑÑ Ð² "
"Ñ
оде пÑедпÑинимаÑелÑÑкой деÑÑелÑноÑÑи."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Digital technology has brought about a tremendous increase in the level of "
"surveillance of our movements, actions, and communications. It is far more "
@@ -1032,7 +1032,7 @@
"огÑаниÑÐµÐ½Ð¸Ñ Ð½Ð° пÑименение гоÑÑдаÑÑÑвом
накопленнÑÑ
даннÑÑ
ÑÑого не изменили "
"бÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Companies are designing even more intrusive surveillance. Some project that "
"pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1048,7 +1048,7 @@
"лÑдей</a>. Такие возможноÑÑи ÑÑÑдно
взвеÑиÑÑ; но ÑгÑоза демокÑаÑии "
"— не вÑмÑÑел. Ð¡ÐµÐ³Ð¾Ð´Ð½Ñ Ð¾Ð½Ð° ÑÑÑеÑÑвÑÐµÑ Ð¸
вполне оÑÑÑима."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unless we believe that our free countries previously suffered from a grave "
"surveillance deficit, and ought to be surveilled more than the Soviet Union "
Index: po/surveillance-vs-democracy.sq-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.sq-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/surveillance-vs-democracy.sq-en.html 1 Nov 2016 17:27:59 -0000
1.15
+++ po/surveillance-vs-democracy.sq-en.html 6 Nov 2016 21:28:16 -0000
1.16
@@ -2,19 +2,31 @@
<!-- Parent-Version: 1.77 -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+--></style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
-<p>by <a href="http://www.stallman.org/">Richard Stallman</a></p>
+<p class="byline center">by <a href="http://www.stallman.org/">Richard
Stallman</a></p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>A version of this article was first published in Wired
+<blockquote class="center"><p>A version of this article was first published in
Wired
in October 2013.</p></blockquote>
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the
three ads that popped up on his computer screen..." /></a>
<p>“How did they find out I'm a dog?”</p>
@@ -30,7 +42,8 @@
is not exceeded? It is the level beyond which surveillance starts to
interfere with the functioning of democracy, in that whistleblowers
(such as Snowden) are likely to be caught.</p>
-
+</div>
+<div class="columns" style="clear:both">
<p>Faced with government secrecy, we the people depend on
whistleblowers
to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
@@ -60,9 +73,11 @@
suffice to protect whistleblowers if “catching the
whistleblower” is grounds for access sufficient to identify him
or her. We need to go further.</p>
+</div>
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a
Democracy</h3>
+<div class="columns">
<p>If whistleblowers don't dare reveal crimes and lies, we lose the
last shred of effective control over our government and institutions.
That's why surveillance that enables the state to find out who has
@@ -91,9 +106,11 @@
that there might be terrorists among them. The point at which
surveillance is too much is the point at which the state can find who
spoke to a known journalist or a known dissident.</p>
+</div>
-<h3>Information, Once Collected, Will Be Misused</h3>
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
+<div class="columns">
<p>When people recognize that the level of general surveillance is too
high, the first response is to propose limits on access to the
accumulated data. That sounds nice, but it won't fix the problem, not
@@ -140,9 +157,11 @@
launch a massive fishing expedition against any person. To make
journalism and democracy safe, we must limit the accumulation of data
that is easily accessible to the state.</p>
+</div>
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
+<div class="columns">
<p>The Electronic Frontier Foundation and other organizations propose
a set of legal principles designed to <a
href="https://en.necessaryandproportionate.org/text">prevent the
@@ -170,9 +189,11 @@
regime would have to implement surveillance afresh, and it would only
collect data starting at that date. As for suspending or momentarily
ignoring this law, the idea would hardly make sense.</p>
+</div>
-<h3>First, Don't Be Foolish</h3>
+<h3 class="subheader">First, Don't Be Foolish</h3>
+<div class="columns">
<p>To have privacy, you must not throw it away: the first one who has
to protect your privacy is you. Avoid identifying yourself to web
sites, contact them with Tor, and use browsers that block the schemes
@@ -213,9 +234,11 @@
movements, but not all of them. Clearly, the better solution is to
make all these systems stop surveilling people other than legitimate
suspects.</p>
+</div>
-<h3>We Must Design Every System for Privacy</h3>
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
+<div class="columns">
<p>If we don't want a total surveillance society, we must consider
surveillance a kind of social pollution, and limit the surveillance
impact of each new digital system just as we limit the environmental
@@ -233,9 +256,11 @@
period. The same benefit, with no surveillance!</p>
<p>We need to design such privacy into all our digital systems.</p>
+</div>
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
+<div class="columns">
<p>One way to make monitoring safe for privacy is
to <a name="dispersal">keep the data dispersed and inconvenient to
access</a>. Old-fashioned security cameras were no threat to privacy(<a
href="#privatespace">*</a>).
@@ -267,9 +292,11 @@
camera points at the inside of a store, or at the street. Any camera
pointed at someone's private space by someone else violates privacy,
but that is another issue.</p>
+</div>
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce
Surveillance</h3>
+<div class="columns">
<p>Most data collection comes from people's own digital activities.
Usually the data is collected first by companies. But when it comes
to the threat to privacy and democracy, it makes no difference whether
@@ -325,9 +352,11 @@
customers' credit card details. An anonymous payment system would end
this danger: a security hole in the site can't hurt you if the site
knows nothing about you.</p>
+</div>
-<h3>Remedy for Travel Surveillance</h3>
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
+<div class="columns">
<p>We must convert digital toll collection to anonymous payment (using
digital cash, for instance). License-plate recognition systems
recognize all license plates, and
@@ -382,9 +411,11 @@
remains “out” for too long, the station where it was
borrowed can inform headquarters; in that case, it could send the
borrower's identity immediately.</p>
+</div>
-<h3>Remedy for Communications Dossiers</h3>
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
+<div class="columns">
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
@@ -422,9 +453,11 @@
some user of my email service, and my email service would know only
that I received mail from some user of your email service, but it
would be hard to determine that you had sent mail to me.</p>
+</div>
-<h3>But Some Surveillance Is Necessary</h3>
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
+<div class="columns">
<p>For the state to find criminals, it needs to be able to investigate
specific crimes, or specific suspected planned crimes, under a court
order. With the Internet, the power to tap phone conversations would
@@ -458,9 +491,10 @@
<p>However, journalism must be protected from surveillance even when
it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
-<hr />
-
+<div class="reduced-width">
<p>Digital technology has brought about a tremendous increase in the
level of surveillance of our movements, actions, and communications.
It is far more than we experienced in the 1990s, and <a
@@ -480,6 +514,8 @@
a grave surveillance deficit, and ought to be surveilled more than the
Soviet Union and East Germany were, we must reverse this increase.
That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -538,7 +574,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/11/01 17:27:59 $
+$Date: 2016/11/06 21:28:16 $
<!-- timestamp end -->
</p>
</div>
Index: po/surveillance-vs-democracy.sq.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.sq.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- po/surveillance-vs-democracy.sq.po 1 Nov 2016 17:27:59 -0000 1.57
+++ po/surveillance-vs-democracy.sq.po 6 Nov 2016 21:28:16 -0000 1.58
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Besnik Bleta <address@hidden>\n"
"Language-Team: \n"
@@ -36,11 +36,11 @@
msgid "A version of this article was first published in Wired in October 2013."
msgstr "Një version i këtij artikulli u botua së pari në Wired, në Tetor
2013."
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
msgid "<a href=\"/graphics/dog.html\">"
msgstr "<a href=\"/graphics/dog.html\">"
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
msgid ""
"Cartoon of a dog, wondering at the three ads that popped up on his computer "
"screen..."
@@ -48,15 +48,15 @@
"Karikaturë e një qeni që hap sytë i çuditur para tre reklamave që u
shfaqën "
"në ekranin e tij të kompjuterit..."
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
msgid "</a>"
msgstr "</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
msgid "“How did they find out I'm a dog?”"
msgstr "“Nga e morën vesh që jam qen?”"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Thanks to Edward Snowden's disclosures, we know that the current level of "
"general surveillance in society is incompatible with human rights. The "
@@ -78,7 +78,7 @@
"mbikëqyrja fillon e plekset me funksionimin e demokracisë, pra kur "
"nxjerrësit e sekreteve (të tillë si Snowden-i) ka shumë gjasa të
zbulohen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Faced with government secrecy, we the people depend on whistleblowers to <a "
"href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">tell us what "
@@ -95,7 +95,7 @@
"zvogëlojmë mbikëqyrjen deri në një pikë, sa nxjerrësit e sekreteve ta
dinë "
"se nuk rrezikohen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -123,7 +123,7 @@
"tanë, por <a href=\"http://www.wired.com/opinion/2013/10/149481/\">kaq nuk "
"na e mbron privatësinë, pasi fusim këmbët në Internet</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
@@ -142,11 +142,11 @@
"patur akses të mjaftueshëm për identifikimin e tyre. Na duhet të
shkojmë më "
"tej."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "The Upper Limit on Surveillance in a Democracy"
msgstr "Kufiri i Sipërm i Mbikëqyrjes në një Demokraci"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
"of effective control over our government and institutions. That's why "
@@ -159,7 +159,7 @@
"mundur shtetit të gjejë se kush ka folur me një reporter është teprim "
"mbikëqyrjeje—shumë, për ta përballuar demokracia."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
@@ -188,7 +188,7 @@
"a> dhe <a href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-"
"networks-beyond-verizon-2013-06-07\">nga kompani të tjera po ashtu</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
@@ -207,11 +207,11 @@
"të gjejë se kush ka folur me një gazetar të njohur ose me një disident
të "
"njohur."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Information, Once Collected, Will Be Misused"
msgstr "Informacioni, Pasi Mblidhet, Do Të Keqpërdoret"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
@@ -234,7 +234,7 @@
"akuzohet për “spiunazh,” gjetja e “spiunit” do të "
"shërbejë si justifikim për hyrje në materialin e grumbulluar."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
@@ -266,7 +266,7 @@
"theyarewatching.org/issues/risks-increase-once-data-shared\">sistemet e reja "
"dixhitale</a>, kjo praktikë është zgjeruar."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -284,7 +284,7 @@
"citizens/\">Europës</a> dhe <a href=\"https://en.wikipedia.org/wiki/"
"Japanese_American_internment\">ShBA-ve </a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Personal data collected by the state is also likely to be obtained by "
"outside crackers that break the security of the servers, even by <a href="
@@ -298,7 +298,7 @@
"hack-revealed-even-worse-than-first.shtml\">sulmues që punojnë për llogari
"
"shtetesh armiqësore</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Governments can easily use massive surveillance capability to <a href="
"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
@@ -309,7 +309,7 @@
"is-blamed-for-wiretapping-scandal.html\">përmbysje të drejtpërdrejtë të "
"demokracisë</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Total surveillance accessible to the state enables the state to launch a "
"massive fishing expedition against any person. To make journalism and "
@@ -321,11 +321,11 @@
"demokracia të jenë të parrezikuara, na duhet të kufizojmë grumbullimin e
të "
"dhënave në të cilat shteti futet lehtësisht."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Robust Protection for Privacy Must Be Technical"
msgstr "Mbrojtja e Fuqishme Për Privatësinë Duhet Të Jetë Teknike"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The Electronic Frontier Foundation and other organizations propose a set of "
"legal principles designed to <a href=\"https://en.necessaryandproportionate."
@@ -342,7 +342,7 @@
"duhur për mbrojtjen e lirive demokratike—nëse adoptohen tërësisht
dhe "
"zbatohen përgjithmonë pa përjashtime."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -353,7 +353,7 @@
"Amendments Act), pezullohen, ose <a href=\"http://www.nytimes.com/2009/04/16/"
"us/16nsa.html\">shpërfillen</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Meanwhile, demagogues will cite the usual excuses as grounds for total "
"surveillance; any terrorist attack, even one that kills just a handful of "
@@ -364,7 +364,7 @@
"të cilit vriten vetëm një dorë personash, mund të fryhet për tâu
dhënë atyre "
"një mundësi më tepër."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If limits on access to the data are set aside, it will be as if they had "
"never existed: years worth of dossiers would suddenly become available for "
@@ -387,11 +387,11 @@
"Sa për pezullimin ose shpërfilljen përkohësisht të këtij ligji, ideja
zor se "
"do të kish kuptim."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "First, Don't Be Foolish"
msgstr "Së Pari, Mos u Bëni të Marrë"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"To have privacy, you must not throw it away: the first one who has to "
"protect your privacy is you. Avoid identifying yourself to web sites, "
@@ -405,7 +405,7 @@
"ata përdorin për të gjurmuar vizitorët. Përdorni GNU Privacy Guard-in
për "
"të fshehtëzuar lëndën e email-it tuaj. Blerjet paguajini me para në
dorë."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Keep your own data; don't store your data in a company's “"
"convenient” server. It's safe, however, to entrust a data backup to a "
@@ -419,7 +419,7 @@
"me kusht që të dhënat tâi keni fshehtëzuar, përfshi këtu emra
kartelash, me "
"software të lirë, në kompjuterin tuaj, përpara se tâi ngarkoni."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy's sake, you must avoid nonfree software since, as a consequence "
"of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -436,7 +436,7 @@
"që këto u japin të tjerëve mbi punimin tuaj në kompjuter, ju kërkojnë "
"detyrimisht tâi dorëzoni në shërbyes krejt të dhënat përkatëse."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -460,7 +460,7 @@
"ato ushtrojnë trysni mbi persona të tjerë që këta të heqin dorë nga "
"privatësia."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Self-protection is essential, but even the most rigorous self-protection is "
"insufficient to protect your privacy on or from systems that don't belong to "
@@ -479,11 +479,11 @@
"të reshtin mbikëqyrjen e njerëzve për krejt rastet e tjera, hiq ato për "
"dyshime të përligjura."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "We Must Design Every System for Privacy"
msgstr "Ãdo Sistem Duhet Ta Hartojmë Me Privatësinë Në Mendje"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we don't want a total surveillance society, we must consider surveillance "
"a kind of social pollution, and limit the surveillance impact of each new "
@@ -495,7 +495,7 @@
"mbikëqyrjes prej çdo sistemi të ri dixhital po njësoj siç kufizojmë
ndikimin "
"mjedisor të një konstruksioni fizik."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For example: “smart” meters for electricity are touted for "
"sending the power company moment-by-moment data about each customer's "
@@ -520,16 +520,16 @@
"me mesataren e përdorimit për atë periudhë. I njëjti përfitim, ama pa "
"mbikëqyrje!"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid "We need to design such privacy into all our digital systems."
msgstr ""
"Na duhet të hartojmë të tillë privatësi në krejt sistemet tona
dixhitale."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Collecting Data: Leaving It Dispersed"
msgstr "Kurë për Grumbullimin e të Dhënave: Të Lihen të Hapërdara"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
"the data dispersed and inconvenient to access</a>. Old-fashioned security "
@@ -551,7 +551,7 @@
"grumbulloheshin fizikisht miliona shirita regjistrimesh çdo ditë dhe të "
"shiheshin apo kopjoheshin."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Nowadays, security cameras have become surveillance cameras: they are "
"connected to the Internet so recordings can be collected in a data center "
@@ -567,7 +567,7 @@
"sjellin një ditë kur gazetarët e dyshuar të ndiqen rrugës gjithë
kohën, për "
"të parë se me kë bisedojnë."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet-connected cameras often have lousy digital security themselves, "
"which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-"
@@ -590,7 +590,7 @@
"i lirë të postojë, me raste, foto dhe regjistrime video, por grumbullimi "
"sistematik në Internet i të dhënave të tilla duhet të kufizohet."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
"points at the inside of a store, or at the street. Any camera pointed at "
@@ -602,11 +602,11 @@
"mbi hapësirën private të dikujt, nga dikush tjetër, cenon privatësinë,
por "
"ky është problem tjetër."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Internet Commerce Surveillance"
msgstr "Kurë për Mbikëqyrje Internet Nga Tregtia"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Most data collection comes from people's own digital activities. Usually "
"the data is collected first by companies. But when it comes to the threat "
@@ -620,7 +620,7 @@
"së bërë drejtpërdrejt nga shteti apo të deleguar një biznesi, ngaqë
shteti "
"mund tâi ketë të dhënat që mbledhin kompanitë."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -650,7 +650,7 @@
"grumbullimit të këtyre të dhënave. Veç kësaj, mjaft nga këto kompani,
i "
"keqpërdorin vetë të dhënat ose ua furnizojnë ato tregtarëve të të
dhënave."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The goal of making journalism and democracy safe therefore requires that we "
"reduce the data collected about people by any organization, not just by the "
@@ -667,7 +667,7 @@
"mbajnë ato më gjatë se një interval të shkurtër kohe përtej atij që "
"nevojitet doemos për çka po kryejnë për ne."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One of the motives for the current level of surveillance of the Internet is "
"that sites are financed through advertising based on tracking users' "
@@ -687,7 +687,7 @@
"tepër justifikime për të shkelur privatësinë, se sa angazhime për ta "
"mbrojtur atë."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
@@ -712,7 +712,7 @@
"marrëveshje të përshtatshme mes bizneseve, dhe që shteti të mos i
pengojë "
"ato."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"A further threat from sites' collection of personal data is that security "
"breakers might get in, take it, and misuse it. This includes customers' "
@@ -725,11 +725,11 @@
"sistem pagesash anonime do tâi jepte fund këtij rreziku: një e çarë
sigurie "
"te sajti nuk do tâju bënte dëm, nëse sajti nuk di asnjë gjë rreth
jush."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Travel Surveillance"
msgstr "Kurë për Mbikëqyrjen e Udhëtimeve"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We must convert digital toll collection to anonymous payment (using digital "
"cash, for instance). License-plate recognition systems recognize all "
@@ -753,7 +753,7 @@
"në të dhënat do të duhej kufizuar në kërkime për numra sipas një
liste me "
"targa që kanë urdhër gjykate."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The U.S. “no-fly” list must be abolished because it is <a href="
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
@@ -763,7 +763,7 @@
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
"justice/victory-federal-court-recognizes\">ndëshkim pa gjyq</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It is acceptable to have a list of people whose person and luggage will be "
"searched with extra care, and anonymous passengers on domestic flights could "
@@ -779,7 +779,7 @@
"nuk u është lejuar të hyjnë fare në vend, të hipin në fluturime drejt
një "
"vendi. Kjo do të duhej të ishte e mjaftë për krejt qëllimet e ligjshme."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Many mass transit systems use some kind of smart cards or RFIDs for "
"payment. These systems accumulate personal data: if you once make the "
@@ -795,7 +795,7 @@
"gjithçka ka të bëjë me udhëtimet përshoqëruar secilës kartë. Të
marra "
"bashkë, bëhen mbikëqyrje masive. Ky grumbullim të dhënash duhet
reduktuar."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Navigation services do surveillance: the user's computer tells the map "
"service the user's location and where the user wants to go; then the server "
@@ -818,7 +818,7 @@
"rrugën, dhe ta shfaqë, pa i treguar kujt ndonjëherë se ku gjendet apo ku "
"dëshiron të shkojë përdoruesi."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Systems for borrowing bicycles, etc., can be designed so that the borrower's "
"identity is known only inside the station where the item was borrowed. "
@@ -849,11 +849,11 @@
"për një kohë të gjatë, stacioni nga u mor me qira mund të njoftojë
qendrën; "
"në këtë rast, mund ta dërgojë identitetin e qiramarrësit menjëherë."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Communications Dossiers"
msgstr "Kurë për Dosjet e Komunikimeve"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
@@ -880,7 +880,7 @@
"sounds-nsa-tracking-your-location\">NSA-ja i grumbullon të dhënat mbi "
"vendndodhjet e celularëve</a> në stil tregu shumice."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unmonitored communication is impossible where systems create such dossiers. "
"So it should be illegal to create or keep them. ISPs and phone companies "
@@ -893,7 +893,7 @@
"informacion të tillë për një kohë të gjatë, në mungesë të një
urdhri gjykate "
"për të përgjuar një palë të caktuar."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
@@ -915,7 +915,7 @@
"tepër, nëse qeveria i kthehet këtij lloj mbikëqyrje, nuk do të merrte
të "
"dhëna mbi thirrjet telefonike të gjithkujt të bëra përpara asaj kohe."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy about who you exchange email with, a simple partial solution is "
"for you and others to use email services in a country that would never "
@@ -939,11 +939,11 @@
"shërbimit tuaj email, por do të ishte e vështirë të përcaktohej se
email-in "
"ma keni dërguar mua."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "But Some Surveillance Is Necessary"
msgstr "Ca Mbikëqyrje Ama Ãshtë e Nevojshme"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For the state to find criminals, it needs to be able to investigate specific "
"crimes, or specific suspected planned crimes, under a court order. With the "
@@ -962,7 +962,7 @@
"sekretit pas faktit të kryer, nëse (siç këshilloj) ua pengojmë sistemeve
"
"dixhitalë grumbullimin e dosjeve masive përpara faktit të kryer."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -987,7 +987,7 @@
"ubiquitous-surveillance-police-edition\">përdorimi i forcës prej tyre ra me
"
"60%</a>. ACLU është në favor të kësaj."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1010,7 +1010,7 @@
"shkrirja e reaktorit në Fukushima, dhe krizën fiskale të 2008-s) e bën
më të "
"vogël atë të terrorizmit."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, journalism must be protected from surveillance even when it is "
"carried out as part of a business."
@@ -1018,7 +1018,7 @@
"Sido që të jetë, gazetaria duhet të mbrohet nga mbikëqyrja edhe kur
kryhet "
"si pjesë e një biznesi."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Digital technology has brought about a tremendous increase in the level of "
"surveillance of our movements, actions, and communications. It is far more "
@@ -1035,7 +1035,7 @@
"â80, dhe kufijtë e propozuar ligjorë mbi përdorimin nga shteti të të
dhënave "
"të grumbulluara nuk do ta ndryshonin gjendjen."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Companies are designing even more intrusive surveillance. Some project that "
"pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1052,7 +1052,7 @@
"saktësi; por kërcënimi ndaj demokracisë këtu sâështë spekulim.
Ekziston dhe "
"është i dukshëm që sot."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unless we believe that our free countries previously suffered from a grave "
"surveillance deficit, and ought to be surveilled more than the Soviet Union "
Index: po/surveillance-vs-democracy.uk-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/surveillance-vs-democracy.uk-diff.html 24 Oct 2016 08:58:32 -0000
1.2
+++ po/surveillance-vs-democracy.uk-diff.html 6 Nov 2016 21:28:16 -0000
1.3
@@ -14,19 +14,35 @@
<!-- Parent-Version: 1.77 -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
-<span class="inserted"><ins><em><!-- GNUN: localize URL
/graphics/dog.small.jpg --></em></ins></span>
+<span class="inserted"><ins><em><style type="text/css"
media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+--></style>
+<!-- GNUN: localize URL /graphics/dog.small.jpg --></em></ins></span>
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist"
-->
<!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<span class="removed"><del><strong><h2>How</strong></del></span>
+<span class="inserted"><ins><em><h2 class="center">How</em></ins></span>
Much Surveillance Can Democracy Withstand?</h2>
-<p>by <a href="http://www.stallman.org/">Richard
Stallman</a></p>
+<span class="removed"><del><strong><p>by</strong></del></span>
+
+<span class="inserted"><ins><em><p class="byline
center">by</em></ins></span> <a
href="http://www.stallman.org/">Richard Stallman</a></p>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
-<blockquote><p>A version of this article was first published in
Wired
+<span
class="removed"><del><strong><blockquote><p>A</strong></del></span>
+<span class="inserted"><ins><em><blockquote
class="center"><p>A</em></ins></span> version of this article was
first published in Wired
in October 2013.</p></blockquote>
-<span class="inserted"><ins><em><div class="pict medium">
+<span class="inserted"><ins><em><div class="article">
+
+<div id="intro">
+<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the
three ads that popped up on his computer screen..." /></a>
<p>“How did they find out I'm a dog?”</p>
@@ -42,7 +58,8 @@
is not exceeded? It is the level beyond which surveillance starts to
interfere with the functioning of democracy, in that whistleblowers
(such as Snowden) are likely to be caught.</p>
-
+<span class="inserted"><ins><em></div>
+<div class="columns" style="clear:both"></em></ins></span>
<p>Faced with government secrecy, we the people depend on
whistleblowers
to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
@@ -73,8 +90,12 @@
whistleblower” is grounds for access sufficient to identify him
or her. We need to go further.</p>
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<span class="removed"><del><strong><h3>The</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader" style="clear: both">The</em></ins></span> Upper
Limit on Surveillance in a Democracy</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>If whistleblowers don't dare reveal crimes and lies, we lose the
last shred of effective control over our government and institutions.
That's why surveillance that enables the state to find out who has
@@ -104,8 +125,12 @@
surveillance is too much is the point at which the state can find who
spoke to a known journalist or a known dissident.</p>
-<h3>Information, Once Collected, Will Be Misused</h3>
+<span class="removed"><del><strong><h3>Information,</strong></del></span>
+<span class="inserted"><ins><em></div>
+<h3 class="subheader">Information,</em></ins></span> Once Collected,
Will Be Misused</h3>
+
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>When people recognize that the level of general surveillance is too
high, the first response is to propose limits on access to the
accumulated data. That sounds nice, but it won't fix the problem, not
@@ -153,8 +178,12 @@
journalism and democracy safe, we must limit the accumulation of data
that is easily accessible to the state.</p>
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<span class="removed"><del><strong><h3>Robust</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">Robust</em></ins></span> Protection for Privacy
Must Be Technical</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>The Electronic Frontier Foundation and other organizations propose
a set of legal principles designed to <a
href="https://en.necessaryandproportionate.org/text">prevent the
@@ -183,8 +212,12 @@
collect data starting at that date. As for suspending or momentarily
ignoring this law, the idea would hardly make sense.</p>
-<h3>First, Don't Be Foolish</h3>
+<span class="removed"><del><strong><h3>First,</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">First,</em></ins></span> Don't Be
Foolish</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>To have privacy, you must not throw it away: the first one who has
to protect your privacy is you. Avoid identifying yourself to web
sites, contact them with Tor, and use browsers that block the schemes
@@ -226,8 +259,12 @@
make all these systems stop surveilling people other than legitimate
suspects.</p>
-<h3>We Must Design Every System for Privacy</h3>
+<span class="removed"><del><strong><h3>We</strong></del></span>
+<span class="inserted"><ins><em></div>
+<h3 class="subheader">We</em></ins></span> Must Design Every System for
Privacy</h3>
+
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>If we don't want a total surveillance society, we must consider
surveillance a kind of social pollution, and limit the surveillance
impact of each new digital system just as we limit the environmental
@@ -246,8 +283,12 @@
<p>We need to design such privacy into all our digital systems.</p>
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<span class="removed"><del><strong><h3>Remedy</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">Remedy</em></ins></span> for Collecting Data:
Leaving It Dispersed</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>One way to make monitoring safe for privacy is
to <a name="dispersal">keep the data dispersed and inconvenient to
access</a>. Old-fashioned security cameras were no threat to
privacy(<a href="#privatespace">*</a>).
@@ -279,9 +320,11 @@
camera points at the inside of a store, or at the street. Any camera
pointed at someone's private space by someone else violates privacy,
but that is another issue.</p>
+<span class="inserted"><ins><em></div></em></ins></span>
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 <span
class="removed"><del><strong>id="digitalcash">Remedy</strong></del></span>
<span class="inserted"><ins><em>id="digitalcash"
class="subheader">Remedy</em></ins></span> for Internet Commerce
Surveillance</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>Most data collection comes from people's own digital activities.
Usually the data is collected first by companies. But when it comes
to the threat to privacy and democracy, it makes no difference whether
@@ -338,8 +381,12 @@
this danger: a security hole in the site can't hurt you if the site
knows nothing about you.</p>
-<h3>Remedy for Travel Surveillance</h3>
+<span class="removed"><del><strong><h3>Remedy</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">Remedy</em></ins></span> for Travel
Surveillance</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>We must convert digital toll collection to anonymous payment (using
digital cash, for instance). License-plate recognition systems
recognize all license plates, and
@@ -395,8 +442,12 @@
borrowed can inform headquarters; in that case, it could send the
borrower's identity immediately.</p>
-<h3>Remedy for Communications Dossiers</h3>
+<span class="removed"><del><strong><h3>Remedy</strong></del></span>
+<span class="inserted"><ins><em></div>
+<h3 class="subheader">Remedy</em></ins></span> for Communications
Dossiers</h3>
+
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
@@ -435,8 +486,12 @@
that I received mail from some user of your email service, but it
would be hard to determine that you had sent mail to me.</p>
-<h3>But Some Surveillance Is Necessary</h3>
+<span class="removed"><del><strong><h3>But</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<h3 class="subheader">But</em></ins></span> Some Surveillance Is
Necessary</h3>
+<span class="inserted"><ins><em><div class="columns"></em></ins></span>
<p>For the state to find criminals, it needs to be able to investigate
specific crimes, or specific suspected planned crimes, under a court
order. With the Internet, the power to tap phone conversations would
@@ -471,8 +526,11 @@
<p>However, journalism must be protected from surveillance even when
it is carried out as part of a business.</p>
-<hr />
+<span class="removed"><del><strong><hr /></strong></del></span>
+<span class="inserted"><ins><em></div>
+<div class="column-limit"></div>
+<div class="reduced-width"></em></ins></span>
<p>Digital technology has brought about a tremendous increase in the
level of surveillance of our movements, actions, and communications.
It is far more than we experienced in the 1990s, and <a
@@ -492,6 +550,8 @@
a grave surveillance deficit, and ought to be surveilled more than the
Soviet Union and East Germany were, we must reverse this increase.
That requires stopping the accumulation of big data about people.</p>
+<span class="inserted"><ins><em></div>
+</div></em></ins></span>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -550,7 +610,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/24 08:58:32 $
+$Date: 2016/11/06 21:28:16 $
<!-- timestamp end -->
</p>
</div>
Index: po/surveillance-vs-democracy.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- po/surveillance-vs-democracy.uk.po 22 Oct 2016 18:29:16 -0000 1.46
+++ po/surveillance-vs-democracy.uk.po 6 Nov 2016 21:28:16 -0000 1.47
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
"PO-Revision-Date: 2016-07-09 09:20+0200\n"
"Last-Translator: Andriy Bandura <address@hidden>\n"
"Language-Team: Ukrainian <>\n"
@@ -42,30 +42,30 @@
"Wired”."
# type: Content of: <body><div><div><div><ul><li>
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
#, fuzzy
#| msgid "<a href=\"/doc/doc.html\">Documentation</a>"
msgid "<a href=\"/graphics/dog.html\">"
msgstr "<a href=\"/doc/doc.html\">ÐокÑменÑаÑÑÑ</a>"
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
msgid ""
"Cartoon of a dog, wondering at the three ads that popped up on his computer "
"screen..."
msgstr ""
# type: Content of: <div><div><div>
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
#, fuzzy
#| msgid "</a>"
msgid "</a>"
msgstr "</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
msgid "“How did they find out I'm a dog?”"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Thanks to Edward Snowden's disclosures, we know that the current level of "
"general surveillance in society is incompatible with human rights. The "
@@ -87,7 +87,7 @@
"ÑÑнкÑÑонÑÐ²Ð°Ð½Ð½Ñ Ð´ÐµÐ¼Ð¾ÐºÑаÑÑÑ, коли
ÑнÑоÑмаÑоÑÑв (ÑакиÑ
Ñк СноÑден), Ñк пÑавило,
"
"вÑдловлÑÑÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Faced with government secrecy, we the people depend on whistleblowers to <a "
"href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\">tell us what "
@@ -103,7 +103,7 @@
"демокÑаÑиÑний конÑÑÐ¾Ð»Ñ Ð½Ð°ÑÐ¾Ð´Ñ Ð½Ð°Ð´
деÑжавоÑ, ми Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ ÑкоÑоÑиÑи ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð´Ð¾ "
"велиÑини, пÑи ÑкÑй лÑди бÑдÑÑÑ Ð·Ð½Ð°Ñи, Ñо
вони в безпеÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
@@ -144,7 +144,7 @@
"www.wired.com/opinion/2013/10/149481/\"> Ñе не заÑ
иÑÑиÑÑ
наÑе пÑиваÑне "
"жиÑÑÑ, коли ми виÑ
одимо в ÐнÑеÑнеÑ</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
@@ -162,11 +162,11 @@
"пÑÐ¹Ð¼Ð°Ð½Ð½Ñ ÑнÑоÑмаÑоÑа” ÑÑÐ°Ñ Ð¿ÑдÑÑавоÑ
Ð´Ð»Ñ Ð´Ð¾ÑÑÑÐ¿Ñ Ð´Ð¾ даниÑ
, дозволÑÑ "
"ÑденÑиÑÑкÑваÑи його. Ðам ÑÑеба йÑи далÑ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "The Upper Limit on Surveillance in a Democracy"
msgstr "ÐеÑÑ
Ð½Ñ Ð¼ÐµÐ¶Ð° ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð¿Ñи демокÑаÑÑÑ"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
"of effective control over our government and institutions. That's why "
@@ -179,7 +179,7 @@
"з жÑÑналÑÑÑом, занадÑо велике —
занадÑо велика, аби демокÑаÑÑÑ "
"могла його виÑÑимаÑи."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "An unnamed U.S. government official ominously told journalists in 2011 "
@@ -222,7 +222,7 @@
"href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-"
"beyond-verizon-2013-06-07\"> а Ñакож вÑд ÑнÑиÑ
компанÑй</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
@@ -241,11 +241,11 @@
"ÑоÑка, в ÑкÑй деÑжава може дÑзнаÑиÑÑ, Ñ
Ñо
говоÑив з вÑдомим жÑÑналÑÑÑом або "
"вÑдомим диÑиденÑом."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Information, Once Collected, Will Be Misused"
msgstr "Ðдного ÑÐ°Ð·Ñ Ð·ÑбÑаними вÑдомоÑÑÑми
бÑдÑÑÑ Ð·Ð»Ð¾Ð²Ð¶Ð¸Ð²Ð°Ñи"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
@@ -269,7 +269,7 @@
"ÑпигÑнÑÑвє, поÑÑк “ÑпигÑна”
ÑÑане пÑиводом Ð´Ð»Ñ Ð´Ð¾ÑÑÑÐ¿Ñ Ð´Ð¾ "
"накопиÑеного маÑеÑÑалÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "In addition, the state's surveillance staff will misuse the data for "
@@ -315,7 +315,7 @@
"org/issues/risks-increase-once-data-shared\">поÑиÑÑÑÑÑÑÑ Ñз
поÑÐ²Ð¾Ñ Ð½Ð¾Ð²Ð¸Ñ
"
"ÑиÑÑовиÑ
ÑиÑÑем</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -332,7 +332,7 @@
"be-used-against-the-citizens/\">пÑиклади з ÐвÑопи</a> Ñ <a
href=\"https://en."
"wikipedia.org/wiki/Japanese_American_internment\">СШÐ</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Personal data collected by the state is also likely to be obtained by "
"outside crackers that break the security of the servers, even by <a href="
@@ -345,7 +345,7 @@
"techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-"
"worse-than-first.shtml\">зломлÑваÑÑв, ÑÐºÑ Ð¿ÑаÑÑÑÑÑ Ð½Ð°
воÑÐ¾Ð¶Ñ Ð´ÐµÑжави</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Governments can easily use massive surveillance capability to <a href="
"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
@@ -356,7 +356,7 @@
"blamed-for-wiretapping-scandal.html\"> безпоÑеÑеднÑо
пÑдпоÑÑдкÑваÑи ÑÐ¾Ð±Ñ "
"демокÑаÑÑÑ</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Total surveillance accessible to the state enables the state to launch a "
"massive fishing expedition against any person. To make journalism and "
@@ -368,11 +368,11 @@
"демокÑаÑÑÑ, ми Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð¾Ð±Ð¼ÐµÐ¶Ð¸Ñи збÑÑ Ð´Ð°Ð½Ð¸Ñ
, ÑÐºÑ Ð±ÑдÑÑÑ Ð»ÐµÐ³ÐºÐ¾ доÑÑÑÐ¿Ð½Ñ "
"деÑжавÑ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Robust Protection for Privacy Must Be Technical"
msgstr "СÑÑйкий заÑ
иÑÑ Ð¾ÑобиÑÑого жиÑÑÑ
повинен бÑÑи ÑеÑ
нÑÑним"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The Electronic Frontier Foundation and other organizations propose a set of "
"legal principles designed to <a href=\"https://en.necessaryandproportionate."
@@ -388,7 +388,7 @@
"пÑинÑипи бÑдÑÑÑ Ð°Ð´ÐµÐºÐ²Ð°ÑÐ½Ñ Ð·Ð°Ñ
иÑÑÑ
демокÑаÑиÑниÑ
Ñвобод — ÑкÑо ÑÑ
"
"пÑиймÑÑÑ Ñ Ð¿Ð¾Ð²Ð½Ð¾Ð¼Ñ Ð¾Ð±ÑÑÐ·Ñ Ñ Ð±ÑдÑÑÑ
доÑÑимÑваÑиÑÑ Ð·Ð°Ð²Ð¶Ð´Ð¸ Ñ Ð±ÐµÐ· винÑÑкÑв."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -399,7 +399,7 @@
"пÑипинена, або ÑÑ
можÑÑÑ <a
href=\"http://www.nytimes.com/2009/04/16/"
"us/16nsa.html\"> ÑгноÑÑваÑи</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Meanwhile, demagogues will cite the usual excuses as grounds for total "
"surveillance; any terrorist attack, even one that kills just a handful of "
@@ -409,7 +409,7 @@
"ÑоÑалÑного ÑÑеженнÑ; бÑдÑ-Ñкий
ÑеÑоÑиÑÑиÑний акÑ, навÑÑÑ ÑкÑо в нÑомÑ
загине "
"кÑлÑка лÑдей, може викоÑиÑÑовÑваÑиÑÑ Ð½Ð¸Ð¼Ð¸
Ñк пÑивÑд."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If limits on access to the data are set aside, it will be as if they had "
"never existed: years worth of dossiers would suddenly become available for "
@@ -431,11 +431,11 @@
"моменÑÑ. Що ÑÑоÑÑÑÑÑÑÑ Ð¿ÑизÑÐ¿Ð¸Ð½ÐµÐ½Ð½Ñ Ð´ÑÑ
або ÑгноÑÑÐ²Ð°Ð½Ð½Ñ ÑÑого законÑ, ÑÑ "
"ÑÐ´ÐµÑ Ð½Ð°Ð²ÑÑд Ñи Ð¼Ð°Ñ ÑенÑ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "First, Don't Be Foolish"
msgstr "Ðо-пеÑÑе, не бÑÑи дÑÑнÑми"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"To have privacy, you must not throw it away: the first one who has to "
"protect your privacy is you. Avoid identifying yourself to web sites, "
@@ -450,7 +450,7 @@
"вÑдÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð²ÑдвÑдÑваÑÑв. ÐаÑÑоÑовÑйÑе GNU
Privacy Guard Ð´Ð»Ñ ÑиÑÑÑÐ²Ð°Ð½Ð½Ñ "
"вмÑÑÑÑ ÑвоÑÑ ÐµÐ»ÐµÐºÑÑÐ¾Ð½Ð½Ð¾Ñ Ð¿Ð¾ÑÑи. ÐплаÑÑйÑе
покÑпки гоÑÑвкоÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Keep your own data; don't store your data in a company's “"
"convenient” server. It's safe, however, to entrust a data backup to a "
@@ -464,7 +464,7 @@
"ÑайлÑв на ÑвоÑÐ¼Ñ ÐºÐ¾Ð¼Ð¿'ÑÑеÑÑ Ð·Ð° допомогоÑ
вÑлÑниÑ
пÑогÑам пеÑед Ñим, Ñк "
"вÑдпÑавлÑÑи ÑÑ
на ÑеÑвеÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy's sake, you must avoid nonfree software since, as a consequence "
"of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -480,7 +480,7 @@
"поÑлÑг пÑдмÑни пÑогÑам</a>, а Ñакож
пеÑедаÑÑ ÑнÑим конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ваÑими "
"обÑиÑленнÑми, Ñе Ð²Ð¸Ð¼Ð°Ð³Ð°Ñ Ð²Ñд Ð²Ð°Ñ Ð½Ð°Ð´Ð°Ð½Ð½Ñ
вÑÑÑ
обÑоблÑваниÑ
даниÑ
на ÑеÑвеÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -503,7 +503,7 @@
"Ñмена, навÑÑÑ ÑкÑо ви збиÑаÑÑеÑÑ Ð½Ð°Ð·Ð²Ð°Ñи
ÑвоÑ, позаÑк Ñе заоÑ
оÑÑÑ ÑнÑиÑ
"
"лÑдей вÑдмовиÑиÑÑ Ð²Ñд ÑвоÑÑ
конÑÑденÑÑйноÑÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Self-protection is essential, but even the most rigorous self-protection is "
"insufficient to protect your privacy on or from systems that don't belong to "
@@ -521,11 +521,11 @@
"ЯÑно, Ñо кÑаÑе бÑло б пÑимÑÑиÑи вÑÑ ÑÑ
ÑиÑÑеми пÑипиниÑи ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð° лÑдÑми, "
"за винÑÑком законно пÑдозÑÑваниÑ
."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "We Must Design Every System for Privacy"
msgstr "ÐÐ¾Ð¶Ð½Ñ ÑиÑÑÐµÐ¼Ñ Ð¿Ð¾ÑÑÑбно пÑоекÑÑваÑи з
ÑÑаÑ
ÑваннÑм конÑÑденÑÑйноÑÑÑ"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"If we don't want a total surveillance society, we must consider surveillance "
"a kind of social pollution, and limit the surveillance impact of each new "
@@ -537,7 +537,7 @@
"Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ ÐºÐ¾Ð¶Ð½Ð¾Ñ Ð½Ð¾Ð²Ð¾Ñ ÑиÑÑÐ¾Ð²Ð¾Ñ ÑиÑÑеми
ÑоÑно Ñак Ñамо, Ñк ми обмежÑÑмо "
"вплив ÑÑзиÑниÑ
ÑпоÑÑд на навколиÑнÑ
ÑеÑедовиÑе."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For example: “smart” meters for electricity are touted for "
"sending the power company moment-by-moment data about each customer's "
@@ -561,16 +561,16 @@
"поÑÑвнÑваÑи Ñе з ÑвоÑми вимÑÑами за
поÑÑÑбний пеÑÑод з ÑеÑеднÑм гÑаÑÑком "
"виÑÑÐ°Ñ Ð·Ð° Ñей пеÑÑод. Те ж Ñаме, ÑÑлÑки без
ÑÑеженнÑ!"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid "We need to design such privacy into all our digital systems."
msgstr ""
"Ðам ÑÑеба вбÑдовÑваÑи ÑÐ°ÐºÑ Ð¶
конÑÑденÑÑйнÑÑÑÑ Ñ Ð²ÑÑ Ð½Ð°ÑÑ ÑиÑÑовÑ
ÑиÑÑеми."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Collecting Data: Leaving It Dispersed"
msgstr "ÐаÑ
Ñд пÑоÑи збоÑÑ Ð´Ð°Ð½Ð¸Ñ
: залиÑайÑе ÑÑ
ÑозоÑеÑедженими"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
"the data dispersed and inconvenient to access</a>. Old-fashioned security "
@@ -590,7 +590,7 @@
"пÑо злоÑин. ÐÑло ÑÑзиÑно неможливо
збиÑаÑи кожен Ð´ÐµÐ½Ñ Ð¼ÑлÑйони ÑÑÑÑÑок, а "
"поÑÑм пеÑеглÑдаÑи або копÑÑваÑи ÑÑ
."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Nowadays, security cameras have become surveillance cameras: they are "
"connected to the Internet so recordings can be collected in a data center "
@@ -606,7 +606,7 @@
"пÑдозÑÑваниÑ
жÑÑналÑÑÑÑв зможÑÑÑ
поÑÑÑйно вÑдÑлÑдковÑваÑи на вÑлиÑÑ, Ñоб "
"побаÑиÑи, з ким вони ÑпÑлкÑÑÑÑÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet-connected cameras often have lousy digital security themselves, "
"which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-"
@@ -628,7 +628,7 @@
"вÑдеозапиÑи, але ÑиÑÑемаÑиÑне
накопиÑÐµÐ½Ð½Ñ ÑакиÑ
даниÑ
Ñ ÐнÑеÑнеÑÑ
повинне "
"обмежÑваÑиÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
"points at the inside of a store, or at the street. Any camera pointed at "
@@ -640,11 +640,11 @@
"оÑобиÑÑий пÑоÑÑÑÑ ÐºÐ¸Ð¼Ð¾ÑÑ ÑнÑим,
вÑÑÑÑаÑÑÑÑÑ Ð² оÑобиÑÑе жиÑÑÑ, але Ñе ÑнÑе "
"пиÑаннÑ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Internet Commerce Surveillance"
msgstr "ÐаÑ
оди пÑоÑи комеÑÑÑйного ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð²
ÐнÑеÑнеÑÑ"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Most data collection comes from people's own digital activities. Usually "
"the data is collected first by companies. But when it comes to the threat "
@@ -658,7 +658,7 @@
"ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð´ÐµÑÐ¶Ð°Ð²Ð¾Ñ Ð±ÐµÐ·Ð¿Ð¾ÑеÑеднÑо або ÑÑ
доÑÑÑаÑÑÑ Ð¿ÑдпÑиÑмÑÑвÑ, ÑÐ¾Ð¼Ñ Ñо данÑ, "
"ÑÐºÑ Ð·Ð±Ð¸ÑаÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½ÑÑ, ÑиÑÑемаÑиÑно
доÑÑÑÐ¿Ð½Ñ Ð´ÐµÑжавÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -687,7 +687,7 @@
"ÑаÑÑÐ¸Ð½Ñ Ñкоди, ÑÐºÑ Ð²Ð¾Ð½Ð¸ наноÑÑÑÑ, збиÑаÑÑи
ÑÑ Ð´Ð°Ð½Ñ. ÐÑÑм Ñого, багаÑо з ÑиÑ
"
"компанÑй безпоÑеÑеднÑо зловживаÑÑÑ
даними, пÑодаÑÑи ÑÑ
на бÑÑÐ¶Ñ Ð´Ð°Ð½Ð¸Ñ
."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The goal of making journalism and democracy safe therefore requires that we "
"reduce the data collected about people by any organization, not just by the "
@@ -703,7 +703,7 @@
"опеÑаÑÑÑÑ
, Ñм не повинно бÑÑи дозволено
збеÑÑгаÑи ÑÑ
довÑе, нÑж коÑоÑкий ÑÐ°Ñ "
"пÑÑÐ»Ñ Ñого, Ñо пÑинÑипово необÑ
Ñдно Ñм длÑ
ÑобоÑи з нами."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"One of the motives for the current level of surveillance of the Internet is "
"that sites are financed through advertising based on tracking users' "
@@ -723,7 +723,7 @@
"ÑкоÑÑÑе випÑÐ°Ð²Ð´Ð°Ð½Ð½Ñ Ð´Ð»Ñ Ð¿Ð¾ÑÑÑеннÑ
конÑÑденÑÑйноÑÑÑ, нÑж намÑÑи
доÑÑимÑваÑиÑÑ "
"ÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "We could correct both problems by adopting a system of anonymous "
@@ -756,7 +756,7 @@
"вÑÑÑмдеÑÑÑÑ Ñоки XX ÑÑолÑÑÑÑ</a>; нам
бÑакÑÑ ÑÑлÑки пÑдпÑиÑмÑÑв, ÑÐºÑ "
"займалиÑÑ Ð± Ñим, Ñ Ð´ÐµÑжави, Ñка б не
пеÑеÑкоджала ÑÑомÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"A further threat from sites' collection of personal data is that security "
"breakers might get in, take it, and misuse it. This includes customers' "
@@ -769,11 +769,11 @@
"Ñз ÑÑÑÑ Ð·Ð°Ð³ÑозоÑ: пÑолом Ñ Ð·Ð°Ñ
иÑÑÑ ÑайÑÑ
не може заÑкодиÑи вам, коли ÑÐ°Ð¹Ñ "
"нÑÑого пÑо Ð²Ð°Ñ Ð½Ðµ знаÑ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Travel Surveillance"
msgstr "ÐаÑ
оди пÑоÑи ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð°
пеÑеÑÑваннÑми"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"We must convert digital toll collection to anonymous payment (using digital "
"cash, for instance). License-plate recognition systems recognize all "
@@ -795,7 +795,7 @@
"пÑиÑÐ¾Ð¼Ñ Ð¿Ð¾Ð²Ð½Ñ Ð´Ð°Ð½Ñ Ð½Ðµ Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð±ÑÑи
доÑÑÑÐ¿Ð½Ñ Ð¿Ð¾ ÐнÑеÑнеÑÑ; доÑÑÑп до даниÑ
"
"повинен бÑÑи обмежений ÑпиÑком номеÑÑв
авÑомобÑлÑв Ñ ÑозÑÑкÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"The U.S. “no-fly” list must be abolished because it is <a href="
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
@@ -805,7 +805,7 @@
"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
"justice/victory-federal-court-recognizes\">покаÑÐ°Ð½Ð½Ñ Ð±ÐµÐ·
ÑÑдÑ</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"It is acceptable to have a list of people whose person and luggage will be "
"searched with extra care, and anonymous passengers on domestic flights could "
@@ -820,7 +820,7 @@
"Ð²Ð·Ð°Ð³Ð°Ð»Ñ Ð½Ðµ дозволено в'Ñзд в кÑаÑнÑ,
доÑÑÑп на ÑейÑи з поÑадками в ÑÑй "
"кÑаÑнÑ. ЦÑого повинно бÑÑи доÑÑаÑнÑо длÑ
вÑÑÑ
законниÑ
ÑÑлей."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Many mass transit systems use some kind of smart cards or RFIDs for "
"payment. These systems accumulate personal data: if you once make the "
@@ -836,7 +836,7 @@
"пов'ÑÐ·Ð°Ð½Ñ Ð· ÐºÐ¾Ð¶Ð½Ð¾Ñ ÐºÐ°ÑÑкоÑ. ÐÑе Ñе Ñазом
ÑÑановиÑÑ ÑиÑÑÐµÐ¼Ñ Ð¼Ð°Ñового "
"ÑÑеженнÑ. ÐбÑÑ ÑиÑ
даниÑ
поÑÑÑбно
ÑкоÑоÑиÑи."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Navigation services do surveillance: the user's computer tells the map "
"service the user's location and where the user wants to go; then the server "
@@ -859,7 +859,7 @@
"маÑÑÑÑÑ Ñ Ð²ÑдобÑажаÑи його, не пеÑедаÑÑи
нÑкÑди ÑозÑаÑÑÐ²Ð°Ð½Ð½Ñ Ñа пÑÐ½ÐºÑ "
"пÑизнаÑеннÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Systems for borrowing bicycles, etc., can be designed so that the borrower's "
"identity is known only inside the station where the item was borrowed. "
@@ -889,11 +889,11 @@
"пÑоÑнÑоÑмÑваÑи ÑенÑÑ; Ñ ÑÑÐ¾Ð¼Ñ Ð²Ð¸Ð¿Ð°Ð´ÐºÑ
вона могла б негайно повÑдомиÑи пÑо "
"оÑобиÑÑоÑÑÑ Ñого, Ñ
Ñо взÑв ÑÑ Ð¾Ð´Ð¸Ð½Ð¸ÑÑ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "Remedy for Communications Dossiers"
msgstr "ÐаÑ
оди пÑоÑи комÑнÑкаÑÑйниÑ
доÑÑÑ"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
@@ -920,7 +920,7 @@
"sure-sounds-nsa-tracking-your-location\">ÐгенÑÑÑво
наÑÑоналÑÐ½Ð¾Ñ Ð±ÐµÐ·Ð¿ÐµÐºÐ¸ "
"маÑово збиÑÐ°Ñ Ð´Ð°Ð½Ñ Ð¿Ñо мÑÑÑе знаÑ
одженнÑ
ÑÑÑлÑниковиÑ
ÑелеÑонÑв</a>."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unmonitored communication is impossible where systems create such dossiers. "
"So it should be illegal to create or keep them. ISPs and phone companies "
@@ -933,7 +933,7 @@
"довго, ÑкÑо ÑÑлÑки ÑпоÑÑеÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð°
Ð¿ÐµÐ²Ð½Ð¾Ñ Ð¾ÑÐ¾Ð±Ð¾Ñ Ð½Ðµ вÑÑановлено в ÑÑÐ´Ð¾Ð²Ð¾Ð¼Ñ "
"поÑÑдкÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
@@ -955,7 +955,7 @@
"Ð·Ð½Ð¾Ð²Ñ Ð²Ð²ÐµÐ»Ð° Ñаке ÑÑеженнÑ, воно не набÑло
б Ð´Ð°Ð½Ñ Ð¿Ñо ÑелеÑÐ¾Ð½Ð½Ñ Ð¿ÐµÑеговоÑи "
"кожного, пÑÐ¾Ð²ÐµÐ´ÐµÐ½Ñ Ð´Ð¾ ÑÑого ÑаÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For privacy about who you exchange email with, a simple partial solution is "
"for you and others to use email services in a country that would never "
@@ -977,11 +977,11 @@
"ÑлÑжби елекÑÑÐ¾Ð½Ð½Ð¾Ñ Ð¿Ð¾ÑÑи, але бÑло б важко
визнаÑиÑи, Ñо ви поÑлали "
"повÑÐ´Ð¾Ð¼Ð»ÐµÐ½Ð½Ñ Ð¼ÐµÐ½Ñ."
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
msgid "But Some Surveillance Is Necessary"
msgstr "Ðле ÑÐ½Ð¾Ð´Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð½ÐµÐ¾Ð±Ñ
Ñдне"
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"For the state to find criminals, it needs to be able to investigate specific "
"crimes, or specific suspected planned crimes, under a court order. With the "
@@ -999,7 +999,7 @@
"можливоÑÑÑ Ð·Ð½Ð°Ñ
одиÑи ÑнÑоÑмаÑоÑÑв заднÑм
ÑиÑлом, ÑкÑо (Ñк Ñ ÑекомендÑвав) ми "
"запобÑжимо попеÑеднÑÐ¾Ð¼Ñ Ð¼Ð°ÑовомÑ
накопиÑÐµÐ½Ð½Ñ Ð´Ð¾ÑÑÑ ÑиÑÑовими ÑиÑÑемами."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1024,7 +1024,7 @@
"ubiquitous-surveillance-police-edition\">заÑÑоÑÑÐ²Ð°Ð½Ð½Ñ Ñили
полÑÑейÑÑкими "
"ÑкоÑоÑилоÑÑ Ð½Ð° 60%</a>. ACLU пÑдÑÑимÑÑ Ñе."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1047,7 +1047,7 @@
"ÐоÑÑвнÑно з Ð½ÐµÐ±ÐµÐ·Ð¿ÐµÐºÐ¾Ñ ÑакиÑ
дÑй
(згадаймо виÑÑк наÑÑи BP, аваÑÑÑ Ð½Ð° ÐÐС Ñ "
"ФÑкÑÑÑÐ¼Ñ Ñ ÑÑнанÑÐ¾Ð²Ñ ÐºÑÐ¸Ð·Ñ 2008 ÑокÑ)
загÑоза ÑеÑоÑÐ¸Ð·Ð¼Ñ Ð½Ð¸ÑÑвно мала."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"However, journalism must be protected from surveillance even when it is "
"carried out as part of a business."
@@ -1055,7 +1055,7 @@
"ÐÑоÑе жÑÑналÑÑÑÐ¸ÐºÑ Ð¿Ð¾ÑÑÑбно заÑ
иÑаÑи вÑд
ÑпоÑÑеÑеженнÑ, навÑÑÑ ÑкÑо вона "
"ведеÑÑÑÑ Ð² Ñ
Ð¾Ð´Ñ Ð¿ÑдпÑиÑмниÑÑкоÑ
дÑÑлÑноÑÑÑ."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Digital technology has brought about a tremendous increase in the level of "
"surveillance of our movements, actions, and communications. It is far more "
@@ -1073,7 +1073,7 @@
"законодавÑÑ Ð¾Ð±Ð¼ÐµÐ¶ÐµÐ½Ð½Ñ Ñодо викоÑиÑÑаннÑ
деÑÐ¶Ð°Ð²Ð¾Ñ Ð½Ð°ÐºÐ¾Ð¿Ð¸ÑениÑ
даниÑ
не "
"змÑнÑÑÑÑ ÑÑого."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Companies are designing even more intrusive surveillance. Some project that "
"pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1089,7 +1089,7 @@
"але загÑоза демокÑаÑÑÑ — не вигадка.
СÑÐ¾Ð³Ð¾Ð´Ð½Ñ Ð²Ð¾Ð½Ð° ÑÑнÑÑ Ñ ÑÑлком "
"вÑдÑÑÑна."
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
msgid ""
"Unless we believe that our free countries previously suffered from a grave "
"surveillance deficit, and ought to be surveilled more than the Soviet Union "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy right-to-read.de.html right-to-r...,
GNUN <=