www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy right-to-read.de.html right-to-r...


From: GNUN
Subject: www/philosophy right-to-read.de.html right-to-r...
Date: Sun, 6 Nov 2016 21:28:17 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/11/06 21:28:16

Modified files:
        philosophy     : right-to-read.de.html right-to-read.es.html 
                         right-to-read.fr.html right-to-read.it.html 
                         right-to-read.ja.html right-to-read.ru.html 
                         right-to-read.uk.html 
                         surveillance-vs-democracy.es.html 
                         surveillance-vs-democracy.fr.html 
                         surveillance-vs-democracy.it.html 
                         surveillance-vs-democracy.ja.html 
                         surveillance-vs-democracy.ru.html 
                         surveillance-vs-democracy.sq.html 
                         surveillance-vs-democracy.uk.html 
        philosophy/po  : right-to-read.ar.po right-to-read.bg.po 
                         right-to-read.ca.po right-to-read.cs-diff.html 
                         right-to-read.cs.po right-to-read.de-en.html 
                         right-to-read.de.po right-to-read.el-diff.html 
                         right-to-read.el.po right-to-read.es-en.html 
                         right-to-read.es.po right-to-read.fa.po 
                         right-to-read.fr-en.html right-to-read.fr.po 
                         right-to-read.it-en.html right-to-read.it.po 
                         right-to-read.ja-en.html right-to-read.ja.po 
                         right-to-read.ko-diff.html right-to-read.ko.po 
                         right-to-read.lt-diff.html right-to-read.lt.po 
                         right-to-read.nl-diff.html right-to-read.nl.po 
                         right-to-read.pl-diff.html right-to-read.pl.po 
                         right-to-read.pot right-to-read.pt-br-diff.html 
                         right-to-read.pt-br.po right-to-read.ru-en.html 
                         right-to-read.ru.po right-to-read.sr.po 
                         right-to-read.sv.po right-to-read.tr.po 
                         right-to-read.uk-diff.html right-to-read.uk.po 
                         surveillance-vs-democracy.es-en.html 
                         surveillance-vs-democracy.es.po 
                         surveillance-vs-democracy.fr-en.html 
                         surveillance-vs-democracy.fr.po 
                         surveillance-vs-democracy.it-en.html 
                         surveillance-vs-democracy.it.po 
                         surveillance-vs-democracy.ja-en.html 
                         surveillance-vs-democracy.ja.po 
                         surveillance-vs-democracy.lt-diff.html 
                         surveillance-vs-democracy.lt.po 
                         surveillance-vs-democracy.nl-diff.html 
                         surveillance-vs-democracy.nl.po 
                         surveillance-vs-democracy.pot 
                         surveillance-vs-democracy.pt-br.po 
                         surveillance-vs-democracy.ru-en.html 
                         surveillance-vs-democracy.ru.po 
                         surveillance-vs-democracy.sq-en.html 
                         surveillance-vs-democracy.sq.po 
                         surveillance-vs-democracy.uk-diff.html 
                         surveillance-vs-democracy.uk.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.de.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.es.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.fr.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.it.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.ja.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.ru.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.uk.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.es.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.fr.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.it.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ja.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ru.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.sq.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.uk.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ar.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.bg.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ca.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.cs-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.cs.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.de-en.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.de.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.el-diff.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.el.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.es-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.es.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.fa.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.fr-en.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.fr.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.it-en.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.it.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ja-en.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ja.po?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ko-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ko.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.lt-diff.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.lt.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.nl-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.nl.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.pl-diff.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.pl.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.pt-br-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.pt-br.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ru-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ru.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.sr.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.sv.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.tr.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.uk-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.uk.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.es-en.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.es.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.fr-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.fr.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ja-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ja.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.lt-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.lt.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.nl-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.nl.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.pot?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.pt-br.po?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru-en.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.sq-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.sq.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk-diff.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk.po?cvsroot=www&r1=1.46&r2=1.47

Patches:
Index: right-to-read.de.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.de.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- right-to-read.de.html       28 Oct 2016 11:58:13 -0000      1.68
+++ right-to-read.de.html       6 Nov 2016 21:28:14 -0000       1.69
@@ -6,31 +6,62 @@
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Das Recht zu lesen - GNU-Projekt - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns >
+ p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 -->
 </style>
 
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
-<h2>Das Recht zu lesen</h2>
+<h2 class="center">Das Recht zu lesen</h2>
 
-<p>
+<p class="byline center">
 von <strong><a href="//www.stallman.org/">Richard Stallman</a></strong></p>
-
-<p>
+<p class="center">
 Die englische Originalausgabe erschien unter dem Titel <cite xml:lang="en"
 lang="en">The Right to Read</cite> in <span xml:lang="en"
 lang="en">Communications of the ACM</span>, New York, Jg. 40, 1997, 2.</p>
-<hr />
+<hr class="thin" />
 
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
             Aus: <cite>Der Weg nach Tycho</cite>, einer Sammlung von Artikeln 
über die
 Vorgeschichte der Lunarischen Revolution, veröffentlicht 2096 in Luna City.
 </p></blockquote>
 
+<div class="columns">
 <p>
 Für Dan Halbert begann der Weg nach Tycho an der
 Hochschule&#160;&#8209;&#160;als Lissa Lenz darum bat, ihr seinen Rechner zu
@@ -73,7 +104,10 @@
 konnte er hoffen, dass seine eigenen Forschungsarbeiten, wenn häufig darauf
 Bezug genommen wird, genug einbringen würden, diese Darlehen
 zurückzuzahlen.]</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Später würde Dan erfahren, dass es eine Zeit gab, als jeder in die
 Bibliothek gehen und Zeitschriftenartikel lesen konnte, und sogar
@@ -123,7 +157,10 @@
 Root-Passwort seines Rechners zu kennen nicht installieren. Und weder die
 US-Bundespolizei <span xml:lang="en" lang="en">FBI</span> noch der <span
 xml:lang="en" lang="en">Microsoft Support</span> würden es aushändigen.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Dan beschloß, dass er Lissa nicht einfach seinen Rechner leihen konnte. Doch
 er konnte nicht ablehnen ihr zu helfen, da er sie liebte. Jede Gelegenheit
@@ -162,7 +199,10 @@
 nutzen. Vorher hatten Hochschulen einen anderen Ansatz zur Disziplinierung
 von Studenten;  sie haben Tätigkeiten bestraft, die schädlich waren, nicht
 solche, die lediglich Verdacht erregten.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Lissa meldete Dan nicht bei der SPA. Seine Entscheidung, ihr zu helfen,
 führte zu ihrer Ehe und auch zur Infragestellung dessen, was ihnen als
@@ -173,6 +213,7 @@
 Luna, wo sie andere gefunden haben, die sich ebenfalls dem langen Arm der
 SPA entzogen hatten. Als 2062 der Aufstand von Tycho begann, wurde das
 allgemeine Recht zu lesen schnell eines seiner zentralen Ziele.</p>
+</div>
 
 <div class="announcement">
 <blockquote>
@@ -184,8 +225,10 @@
 <div id="AuthorsNote">
 <h3>Anmerkungen<!-- des Autors --></h3>
 
-<ul>
-<li>Diese Geschichte ist vermeintlich ein historischer Artikel, der von jemand
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>Diese Geschichte ist vermeintlich ein historischer Artikel, der von jemand
 anderem in der Zukunft geschrieben werden wird, Dan Halberts Jugend unter
 einer repressiven durch ungerechte Kräfte geprägte Gesellschaft
 beschreibend, die <em><a
@@ -193,27 +236,36 @@
 Propaganda benutzt. Daher verwendet er die Terminologie dieser
 Gesellschaft. Um sichtlich noch beklemmender zu klingen, habe ich versucht
 dies <!--aus heutiger Sicht -->zu projizieren.
+</p>
+</div>
+<div class="column-limit"></div>
 </li>
 
 <li>
+<div class="reduced-width">
 <p>Rechner-erzwungene Restriktionen von Verleih- oder Lesebüchern (und anderer
 publizierter Werke) sind als <em>DRM</em> bekannt, kurz für <em>Digitale
 Rechte-Minderung</em>. Zur Beseitigung von DRM führte die Free Software
 Foundation die Kampagne <em><a
 href="//DefectiveByDesign.org">Defective-by-Design</a></em> ein. Bitte
 unterstützen Sie die Kampagne.</p>
-</li>
 
-<li>
 <p>Die Electronic Frontier Foundation, eine eigenständige, nicht mit der Free
 Software Foundation in Beziehung stehende Organisation, kämpft auch gegen
 DRM.</p>
+</div>
+<div class="column-limit"></div>
 </li>
+</ul>
 
-<li>
+<blockquote class="info center">
 <p>Die folgende(n) Anmerkung(en) wurde(n) seit der Erstveröffentlichung der
 Geschichte mehrmals aktualisiert.</p>
+</blockquote>
 
+<ul class="no-bullet">
+<li>
+<div class="columns">
 <p>
 Der Kampf um das Recht zu lesen wird bereits ausgefochten. Es wird
 vielleicht noch 50 Jahre andauern bis unsere letzten Freiheiten in
@@ -256,15 +308,20 @@
 Consortium</span></i> (kurz W3C) ist in den Schatten der
 Urheberrechtsindustrie geratenen; es steht kurz davor ein DRM-System als
 offiziellen Teil der Internet-Spezifikationen zu genehmigen.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
 Unfreie Software tendiert zu <a href="/proprietary/">vielerlei
 missbräuchlichen Eigenschaften</a>, die zu dem Schluss führen, dass man <a
 href="/philosophy/free-software-even-more-important">zu keiner Zeit einem
 unfreien Programm vertrauen kann</a>. Wir müssen bloß auf Freie (Libre)
 Software bestehen und unfreie Programme zurückweisen.</p>
 
-<p>
+<p class="inline-block">
 Mit Windows Vista gab Microsoft zu, dass sie eine Hintertür eingebaut
 hatten: Microsoft kann sie benutzen, um zwangsweise
 Software-„Verbesserungen“ zu installieren, selbst wenn Nutzer eher erwägen
@@ -273,7 +330,12 @@
 bestimmten Gerätetreibers zu verweigern. Der Hauptzweck von Vistas rigorosen
 Vorgehen gegen Nutzer war DRM aufzuerlegen, das Nutzer nicht überwinden
 können. Natürlich ist Windows 10 nicht besser.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 Einer der Gedanken in der Geschichte wurde in der Realität nicht
 vorgeschlagen, jedenfalls nicht bis 2002: Die Vorstellung, dass das FBI und
@@ -306,7 +368,12 @@
 Microsofts Schlüssel, und ob der Eigentümer des Rechners jedes andere System
 (wie GNU/Linux) installieren kann, ist unter Kontrolle Microsofts. Wir
 nennen dies <em><span xml:lang="en" lang="en">Restricted Boot</span></em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 Im Jahr 1997, als diese Geschichte erstmals publiziert wurde, drohte die SPA
 kleinen Internetdienstanbietern mit der Aufforderung, der SPA die
@@ -330,7 +397,12 @@
 gemachte Schreckenskampagne der BSA machte leicht verschleierte Drohungen,
 dass Personen, die Software gemeinsam benutzen, also teilen, im Gefängnis
 vergewaltigt werden würden.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="reduced-width">
 <p>
 Die beschriebenen Hochschulsicherheitsrichtlinien sind keine
 Erfindung. Beispielsweise zeigt ein Rechner einer Universität in der Gegend
@@ -354,12 +426,15 @@
 Dies ist ein interessanter Ansatz zum Vierten Zusatzartikel zur
 US-Verfassung: fast jedermann im Voraus zu zwingen, auf die entsprechenden
 Rechte zu verzichten.</p>
+</div>
 </li>
 </ul>
+<div class="column-limit"></div>
 </div>
 
 <h3 id="BadNews">Schlechte Nachrichten</h3>
 
+<div class="columns">
 <p>
 Der Kampf um das Recht zu lesen ist&#160;&#8209;&#160;zu unseren
 Ungunsten&#160;&#8209;&#160;im Gange. Der ist Feind organisiert, wir
@@ -383,11 +458,11 @@
 <li><p>Es verfügt über DRM, die Nutzer von der gemeinsamen Nutzung von Kopien
 abhalten soll.</p></li>
 
-<li><p>Es verfügt über eine Hintertür, mit der Amazon jedes Buch aus der 
Ferne
+<li><p class="inline-block">Es verfügt über eine Hintertür, mit der Amazon 
jedes Buch aus der Ferne
 löschen kann. Im Jahr 2009 wurden so Tausende Kopien von George Orwells
 <cite>1984</cite> entfernt.</p></li>
 
-<li><p>Für den Fall, dass das alles nicht Orwellsch genug ist, gibt es noch 
eine
+<li><p class="inline-block">Für den Fall, dass das alles nicht Orwellsch 
genug ist, gibt es noch eine
 universelle Hintertür, mit der Amazon die Software aus der Ferne ändern und
 jede andere Form von Bosheit einführen kann.</p></li>
 </ul>
@@ -411,6 +486,7 @@
 FSF</a>. Es gibt auch eine Reihe von <a href="/help/">Möglichkeiten, an
 unserer Arbeit zu partizipieren</a>.
 </p>
+</div>
 
 <h3 id="References">Referenzen</h3>
 
@@ -442,13 +518,7 @@
 Urheber- und Patentrechts zu widersetzen und rückgängig zu machen.</li>
 </ul>
 
-<hr />
-<blockquote id="fsfs"><p class="big">Dieser Aufsatz wurde englischsprachig in 
<cite><a
-href="//shop.fsf.org/product/free-software-free-society/" xml:lang="en"
-lang="en">Free Software, Free Society: The Selected Essays of Richard
-M. Stallman</a></cite> veröffentlicht.</p></blockquote>
-
-<h5>Weitere Texte</h5>
+<h4>Weitere Texte</h4>
 
 <ul>
        <li><a href="/philosophy/">Philosophie des GNU-Projekts</a></li>
@@ -457,6 +527,13 @@
 id="copy-protection" xml:lang="en" lang="en">Copy Protection: Just Say
 No</a></cite>, in: Computerworld 2000.</li>
 </ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">Dieser Aufsatz wurde englischsprachig in 
<cite><a
+href="//shop.fsf.org/product/free-software-free-society/" xml:lang="en"
+lang="en">Free Software, Free Society: The Selected Essays of Richard
+M. Stallman</a></cite> veröffentlicht.</p></blockquote>
 
 <div class="translators-notes">
 
@@ -550,7 +627,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Aktualisierung:
 
-$Date: 2016/10/28 11:58:13 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: right-to-read.es.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.es.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- right-to-read.es.html       20 Oct 2016 11:28:32 -0000      1.49
+++ right-to-read.es.html       6 Nov 2016 21:28:14 -0000       1.50
@@ -6,30 +6,61 @@
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>El derecho a leer - Proyecto GNU - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns >
+ p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 -->
 </style>
 
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.es.html" -->
-<h2>El derecho a leer</h2>
+<h2 class="center">El derecho a leer</h2>
 
-<p>
+<p class="byline center">
 por <a href="http://www.stallman.org/";><strong>Richard 
Stallman</strong></a></p>
-
-<p>
+<p class="center">
 <em>Este artículo se publicó en febrero de 1997 en  <cite>Communications of
 the ACM</cite> (Vol. 40, Número 2).</em></p>
-<hr />
+<hr class="thin" />
 
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
             De <cite>El camino a Tycho</cite>, una colección de artículos 
sobre los
 antecedentes de la Revolución Lunar, publicado en Luna City en 2096.
 </p></blockquote>
 
+<div class="columns">
 <p>
 Para Dan Halbert el viaje a Tycho comenzó en la universidad, cuando un día
 Lissa Lenz le pidió prestado el ordenador. El suyo se había averiado, y a
@@ -68,7 +99,10 @@
 Dan pretendía hacer carrera en la universidad, esperaba que sus propios
 artículos de investigación, en caso de ser citados frecuentemente, le
 reportaran los suficientes beneficios como para pagar el préstamo).</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Más tarde Dan descubrió que había habido un tiempo en el que todo el mundo
 podía ir a una biblioteca y leer artículos, incluso libros, sin tener que
@@ -115,7 +149,10 @@
 se podían instalar sin conocer la clave del administrador de nuestro
 ordenador, cosa que ni el FBI ni el servicio técnico de Microsoft estaban
 dispuestos a revelar.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Dan llegó a la conclusión de que no podía prestarle sin más el ordenador a
 Lissa. Sin embargo, no podía negarse a ayudarla porque estaba enamorado de
@@ -151,7 +188,10 @@
 masivamente. Antes de eso, las universidades mantenían una actitud diferente
 en relación con la disciplina estudiantil: se castigaban las actividades
 perniciosas, no las que simplemente levantaran sospechas.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Lissa no denunció a Dan a la APS. Su decisión de ayudarla los condujo al
 matrimonio y también a que cuestionasen lo que les habían enseñado acerca de
@@ -163,6 +203,7 @@
 al igual que ellos intentaban librarse del largo brazo de la APS. Cuando
 empezó el Levantamiento de Tycho, en 2062, el derecho universal a leer se
 convirtió en una de sus proclamas fundamentales.</p>
+</div>
 
 <div class="announcement">
 <blockquote>
@@ -174,17 +215,23 @@
 <div id="AuthorsNote">
 <h3>Notas del autor</h3>
 
-<ul>
-<li>Este relato es un artículo histórico ficticio supuestamente escrito por
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>Este relato es un artículo histórico ficticio supuestamente escrito por
 alguien en el futuro. En él se narra la juventud de Dan Halbert en una
 sociedad modelada por poderes injustos que utilizan el término «pirata» de
 manera engañosa y partidista. El artículo emplea la terminología propia de
 esa sociedad. He tratado de trasladar ese uso del lenguaje al futuro, a una
 sociedad en la que su opresividad resulta más patente. Véase <a
 href="/philosophy/words-to-avoid.html#Piracy">«Piratería»</a>. 
+</p>
+</div>
+<div class="column-limit"></div>
 </li>
 
 <li>
+<div class="reduced-width">
 <p>Las restricciones informáticas impuestas sobre el préstamo o la lectura de
 libros (y otros tipos de publicaciones) se conocen como DRM, sigla en inglés
 de «Digital Restrictions Management» (gestión digital de
@@ -192,17 +239,22 @@
 Foundation ha emprendido la campaña <a
 href="http://DefectiveByDesign.org";>Defective by Design</a>, para la que
 solicitamos su apoyo.</p>
-</li>
 
-<li>
 <p>La Electronic Frontier Foundation, una organización independiente, no
 vinculada a la Free Software Foundation, también hace campaña contra el 
DRM.</p>
+</div>
+<div class="column-limit"></div>
 </li>
+</ul>
 
-<li>
+<blockquote class="info center">
 <p>La siguiente nota ha sido actualizada varias veces desde la primera
 publicación del cuento.</p>
+</blockquote>
 
+<ul class="no-bullet">
+<li>
+<div class="columns">
 <p>
 La batalla por el derecho a leer se está librando ya en la
 actualidad. Aunque pudieran pasar 50 años antes de que nuestras libertades
@@ -239,15 +291,20 @@
 La sombra de la industria del copyright planea incluso sobre el <cite>World
 Wide Web Consortium</cite>, que está a punto de aprobar un sistema DRM como
 parte oficial de las especificaciones de la red.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
 El software que no es libre suele presentar <a href="/proprietary/">todo
 tipo de características abusivas</a>, lo que lleva a la conclusión de que <a
 href="/philosophy/free-software-even-more-important.html">nunca se puede
 confiar en un programa que no sea libre</a>. Debemos exigir software libre,
 y rechazar programas privativos.</p>
 
-<p>
+<p class="inline-block">
 Microsoft ha admitido la incorporación en Windows Vista de una puerta
 trasera: Microsoft puede usarla para instalar por la fuerza
 «actualizaciones» de software, incluso aunque los usuarios las consideren
@@ -256,7 +313,12 @@
 dispositivos. El principal propósito de las medidas restrictivas de Vista
 era imponer a los usuarios un DRM que no pudieran saltarse. Por supuesto,
 Windows 10 no es mejor.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 Una de las ideas que se presentan en este cuento se hizo realidad en
 2002. Es la idea de que el FBI y Microsoft guarden las claves de
@@ -286,7 +348,12 @@
 Microsoft, y aunque el propietario de la máquina pueda instalar cualquier
 otro sistema (como GNU/Linux), lo hará bajo el control de Microsoft. A esto
 lo llamamos <em>arranque restringido</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 Cuando se escribió esta historia por primera vez, en 1997, la SPA estaba
 amenazando a pequeños proveedores de servicios de Internet (<abbr
@@ -307,7 +374,12 @@
 amigos. En una campaña de terror organizada por la BSA en Argentina, en
 2001, se lanzaron veladas amenazas de que las personas que comparten
 software serían violadas en prisión.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="reduced-width">
 <p>
 Las políticas de seguridad descritas anteriormente no son imaginarias. Por
 ejemplo, un ordenador de una universidad del área de Chicago mostraba este
@@ -332,12 +404,15 @@
 Es una curiosa forma de entender la Cuarta Enmienda: presionar a casi todo
 el mundo para que acceda a renunciar de antemano a los derechos que la
 enmienda les otorga. </p>
+</div>
 </li>
 </ul>
+<div class="column-limit"></div>
 </div>
 
 <h3 id="BadNews">Malas noticias</h3>
 
+<div class="columns">
 <p>
 Hasta ahora la batalla por el derecho a leer no se está resolviendo a
 nuestro favor. El enemigo está organizado, y nosotros no. 
@@ -361,10 +436,10 @@
 
 <li><p>Tiene DRM, para evitar que los usuarios compartan copias.</p></li>
 
-<li><p>Tiene una puerta trasera que permite a Amazon borrar por control remoto
+<li><p class="inline-block">Tiene una puerta trasera que permite a Amazon 
borrar por control remoto
 cualquier libro. En 2009 borraron miles de copias de 1984, de George 
Orwell.</p></li>
 
-<li><p>Por si todo eso no fuera suficientemente «orwelliano», hay una puerta
+<li><p class="inline-block">Por si todo eso no fuera suficientemente 
«orwelliano», hay una puerta
 trasera universal mediante la cual Amazon puede cambiar el software por
 control remoto, y hacer cualquier otra fechoría.</p></li>
 </ul>
@@ -386,6 +461,7 @@
 labor más en general. Hay también una <a href="/help/help.html">lista de
 maneras de participar en nuestro trabajo</a>.
 </p>
+</div>
 
 <h3 id="References">Referencias</h3>
 
@@ -415,13 +491,7 @@
 revertir esta situación.</li>
 </ul>
 
-<hr />
-<blockquote id="fsfs"><p class="big">Este ensayo está publicado en el libro <a
-href="http://shop.fsf.org/product/free-software-free-society/";><cite>Software
-libre para una sociedad libre: Selección de ensayos de Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Otros textos para leer</h5>
+<h4>Otros textos para leer</h4>
 
 <ul>
        <li><a href="/philosophy/philosophy.html">Filosofía del Proyecto 
GNU</a></li>
@@ -430,6 +500,13 @@
 id="copy-protection"><cite>Copy Protection: Just Say No</cite></a>,
 publicado en <cite>Computer World</cite>.</li>
 </ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">Este ensayo está publicado en el libro <a
+href="http://shop.fsf.org/product/free-software-free-society/";><cite>Software
+libre para una sociedad libre: Selección de ensayos de Richard
+M. Stallman</cite></a>.</p></blockquote>
 
 <div class="translators-notes">
 
@@ -511,7 +588,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2016/10/20 11:28:32 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: right-to-read.fr.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.fr.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- right-to-read.fr.html       20 Oct 2016 18:57:39 -0000      1.107
+++ right-to-read.fr.html       6 Nov 2016 21:28:14 -0000       1.108
@@ -6,30 +6,61 @@
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Le droit de lire - Projet GNU - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns >
+ p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 -->
 </style>
 
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.fr.html" -->
-<h2>Le droit de lire</h2>
+<h2 class="center">Le droit de lire</h2>
 
-<p>
+<p class="byline center">
 par <a href="http://www.stallman.org/";><strong>Richard 
Stallman</strong></a></p>
-
-<p>
+<p class="center">
 <em>Cet article a été publié dans la parution de février 1997 de
 <cite>Communications of the ACM</cite> (volume 40, numéro 2).</em></p>
-<hr />
+<hr class="thin" />
 
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
             Extrait de <cite>The Road to Tycho</cite>, une collection 
d'articles sur les
 antécédents de la révolution lunaire publiée à Luna City en 2096.
 </p></blockquote>
 
+<div class="columns">
 <p>
 Pour Dan Halbert, la route vers Tycho commença à l'université, quand Lissa
 Lenz lui demanda de lui prêter son ordinateur. Le sien était en panne et, à
@@ -69,7 +100,10 @@
 puisque Dan visait une carrière universitaire, il pouvait espérer que ses
 propres articles scientifiques, s'ils étaient souvent référencés, lui
 rapporteraient assez pour rembourser sa dette).</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Par la suite, Dan apprendrait qu'il y avait eu une époque où n'importe qui
 pouvait aller à la bibliothèque lire des articles de revues, et même des
@@ -118,7 +152,10 @@
 vous en aviez un, sans connaître le mot de passe administrateur de votre
 ordinateur. Or, ni le FBI ni l'Aide technique Microsoft ne vous le
 révèlerait.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Dan conclut qu'il ne pouvait pas se contenter de prêter son ordinateur à
 Lissa. Mais il ne pouvait refuser de l'aider, car il l'aimait. Chaque
@@ -156,7 +193,10 @@
 avaient une approche différente de la discipline des étudiants ; elles
 punissaient les activités qui causaient du tort et pas celles qui
 éveillaient simplement des soupçons.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Lissa ne dénonça pas Dan à la SPA. Sa décision de l'aider les amena à se
 marier et aussi à remettre en question ce qu'on leur avait enseigné dans
@@ -167,6 +207,7 @@
 pris leurs distances par rapport au long bras de la SPA. Quand la révolte de
 Tycho commença en 2062, le droit universel de lire devint bientôt un de ses
 objectifs principaux.</p>
+</div>
 
 <div class="announcement">
 <blockquote>
@@ -179,17 +220,23 @@
 <div id="AuthorsNote">
 <h3>Notes de l'auteur</h3>
 
-<ul>
-<li>Cette histoire est un article historique fictif qui sera écrit dans le 
futur
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>Cette histoire est un article historique fictif qui sera écrit dans le 
futur
 par quelqu'un d'autre pour décrire la jeunesse de Dan Halbert au sein d'une
 société répressive mise en place par des forces injustes utilisant le mot
 « pirate » dans leur propagande. La terminologie de cette société y est 
donc
 employée. J'ai tenté de la projeter dans un univers plus visiblement
 tyrannique. Consultez « <a
 href="/philosophy/words-to-avoid.html#Piracy">Piratage</a> ».
+</p>
+</div>
+<div class="column-limit"></div>
 </li>
 
 <li>
+<div class="reduced-width">
 <p>Les restrictions imposées par ordinateur sur le prêt ou la lecture de 
livres
 (et autres sortes d'œuvres publiées) sont connues sous le nom de DRM,
 raccourci pour <cite>Digital Restrictions Management</cite> (gestion
@@ -198,18 +245,23 @@
 href="http://DefectiveByDesign.org";>Defective by Design</a></cite>.<a
 id="TransNote2-rev" href="#TransNote2"><sup>2</sup></a>. Nous demandons
 votre soutien.</p>
-</li>
 
-<li>
 <p>L'<cite>Electronic Frontier Foundation</cite>, une organisation séparée 
sans
 lien avec la <cite>Free Software Fondation</cite>, fait également campagne
 contre les DRM.</p>
+</div>
+<div class="column-limit"></div>
 </li>
+</ul>
 
-<li>
+<blockquote class="info center">
 <p>La note suivante a été modifiée plusieurs fois depuis la première
 publication de cette histoire.</p>
+</blockquote>
 
+<ul class="no-bullet">
+<li>
+<div class="columns">
 <p>
 La bataille pour le droit de lire fait déjà rage. Bien qu'il puisse
 s'écouler 50 ans avant que nos libertés d'antan s'effacent dans 
l'obscurité,
@@ -252,8 +304,13 @@
 Le <cite>World Wide Web Consortium</cite> lui-même est tombé sous la coupe
 de l'industrie du copyright; il est sur le point d'approuver l'inscription
 officielle d'un système de DRM dans les spécifications du web.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
 Le logiciel non libre a tendance à posséder <a href="/proprietary/"> des
 fonctionnalités abusives de toutes sortes</a>, ce qui conduit naturellement
 à la conclusion qu'<a
@@ -261,7 +318,7 @@
 faire confiance à un programme non libre</a>. Nous devons exiger du logiciel
 exclusivement libre et rejeter les programmes non libres.</p>
 
-<p>
+<p class="inline-block">
 Microsoft a admis avoir intégré une porte dérobée à Windows Vista. Cette
 société peut s'en servir pour installer de force des « mises à niveau » 
de
 logiciels, même si les utilisateurs les considèrent plutôt comme des
@@ -270,7 +327,12 @@
 périphérique. L'objectif principal de cette répression des utilisateurs par
 Vista était d'imposer des DRM que les utilisateurs ne pourraient pas
 outrepasser. Bien sûr, Windows 10 n'a rien à lui envier.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 L'une des idées contenues dans cette histoire n'a en fait été proposée 
qu'en
 2002. C'est l'idée que le FBI et Microsoft garderaient les mot de passe
@@ -301,7 +363,12 @@
 clé de Microsoft ; le choix de laisser ou non l'utilisateur installer un
 autre système (GNU/Linux par exemple) appartient à Microsoft. Nous appelons
 cela <em>démarrage restreint</em> <cite>[restricted boot]</cite>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 En 1997, quand cette histoire a été publiée, la SPA menaçait de petits
 fournisseurs d'accès à Internet (FAI) en exigeant qu'ils lui permettent de
@@ -322,7 +389,12 @@
 et amis ; dans une campagne de terreur orchestrée par la BSA en 2001 en
 Argentine, des menaces à peine voilées ont été faites, selon lesquelles les
 gens partageant du logiciel seraient violés en prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="reduced-width">
 <p>
 Les politiques universitaires de sécurité décrites précédemment ne sont 
pas
 imaginaires. Par exemple, un ordinateur dans une université de la région de
@@ -347,12 +419,15 @@
 Il s'agit d'une approche intéressante du quatrième amendement : pousser
 presque tous les gens à accepter d'avance de renoncer aux droits qu'il leur
 accorde.</p>
+</div>
 </li>
 </ul>
+<div class="column-limit"></div>
 </div>
 
 <h3 id="BadNews">Mauvaises nouvelles</h3>
 
+<div class="columns">
 <p>
 Jusqu'à présent, la bataille pour le droit de lire tourne à notre
 détriment. L'ennemi est organisé alors que nous ne le sommes pas.
@@ -376,11 +451,11 @@
 
 <li><p>Elle a un DRM conçu pour empêcher l'utilisateur de partager des 
copies.</p></li>
 
-<li><p>Elle a une porte dérobée par laquelle Amazon peut effacer à distance
+<li><p class="inline-block">Elle a une porte dérobée par laquelle Amazon 
peut effacer à distance
 n'importe quel livre. En 2009, elle a effacé des milliers de copies de
 « 1984 », le roman de George Orwell.</p></li>
 
-<li><p>Et si tout ça n'est pas encore assez orwellien, il y a une porte 
dérobée
+<li><p class="inline-block">Et si tout ça n'est pas encore assez orwellien, 
il y a une porte dérobée
 universelle par laquelle Amazon peut modifier le logiciel à distance et
 introduire n'importe quelle autre forme de vilainie.</p></li>
 </ul>
@@ -404,6 +479,7 @@
 la FSF</a> pour soutenir l'ensemble de notre travail. Il y a aussi de
 nombreux moyens d'y <a href="/help/help.html">participer</a>.
 </p>
+</div>
 
 <h3 id="References">Références</h3>
 
@@ -432,13 +508,7 @@
 de faire marche arrière.</li>
 </ul>
 
-<hr />
-<blockquote id="fsfs"><p class="big">Cet essai est publié dans <a
-href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Autres textes à lire</h5>
+<h4>Autres textes à lire</h4>
 
 <ul>
        <li><a href="/philosophy/philosophy.html">Philosophie du projet 
GNU</a></li>
@@ -447,6 +517,13 @@
 id="copy-protection"> Copy Protection: Just Say No</a>, publié dans
 <cite>Computer World</cite>.</li>
 </ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">Cet essai est publié dans <a
+href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
 
 <div class="translators-notes">
 
@@ -541,7 +618,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2016/10/20 18:57:39 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: right-to-read.it.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.it.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- right-to-read.it.html       20 Oct 2016 20:27:37 -0000      1.58
+++ right-to-read.it.html       6 Nov 2016 21:28:14 -0000       1.59
@@ -6,30 +6,61 @@
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Il diritto a leggere - Progetto GNU - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns >
+ p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 -->
 </style>
 
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
-<h2>Il diritto a leggere</h2>
+<h2 class="center">Il diritto a leggere</h2>
 
-<p>
+<p class="byline center">
 di <a href="http://www.stallman.org/";><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
 <em>Questo articolo è apparso nel numero di febbraio 1997 di
 <cite>Communications of the ACM</cite> (volume 40, numero 2).</em></p>
-<hr />
+<hr class="thin" />
 
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
             Da <cite>La strada per Tycho</cite>, una raccolta di articoli sugli
 antefatti della Rivoluzione Lunare, pubblicata a Città della Luna nel 2096.
 </p></blockquote>
 
+<div class="columns">
 <p>
 Per Dan Halbert, la strada per Tycho cominciò al college, quando Lissa Lenz
 gli chiese in prestito il computer. Il suo le si era rotto, e non sarebbe
@@ -67,7 +98,10 @@
 siccome Dan puntava alla carriera accademica, poteva sperare che i suoi
 stessi articoli gli avrebbero reso abbastanza da ripagare il prestito, se
 citati abbastanza spesso.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Più in là Dan avrebbe imparato che c'era stato un tempo in cui chiunque
 poteva andare in biblioteca e leggere gli articoli delle riviste, e persino
@@ -113,7 +147,10 @@
 per installarli dovevi conoscere la parola segreta primaria del tuo
 computer, quella più segreta di tutte, e né l'FBI né il supporto clienti
 della Microsoft te l'avrebbero mai svelata.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Dan si rese conto che non poteva semplicemente prestare il suo computer a
 Lissa. Ma come poteva rifiutarsi di aiutarla? lui la amava. Ogni volta che
@@ -150,7 +187,10 @@
 adottavano un approccio differente alla disciplina degli studenti, punivano
 le attività che causavano dei danni, non quelle che sollevavano solo
 sospetti.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Lissa non denunciò Dan all'APS. La sua decisione di aiutarla portò al loro
 matrimonio, come li portò anche a mettere in dubbio quello che era stato
@@ -161,6 +201,7 @@
 s'erano sottratti al lungo braccio dell'APS. Quando cominciò la Rivolta di
 Tycho nel 2062, il diritto universale a leggere ne divenne presto uno degli
 obiettivi centrali.</p>
+</div>
 
 <div class="announcement">
 <blockquote>
@@ -172,34 +213,45 @@
 <div id="AuthorsNote">
 <h3>Note dell'autore</h3>
 
-<ul>
-<li>Questa storia finge di essere un articolo storico scritto nel futuro da
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>Questa storia finge di essere un articolo storico scritto nel futuro da
 altri autori, per descrivere la giovinezza di Dan Halbert in una società
 repressiva forgiata dalle forze ingiuste che usano "pirata" come termine di
 propaganda. Quindi usa la terminologia di quella società. Ho cercato di
 rendere la storia come se si svolgesse in un futuro ancora più
 opprimente. Vedere <a
 href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Pirateria&rdquo;</a>.
+</p>
+</div>
+<div class="column-limit"></div>
 </li>
 
 <li>
+<div class="reduced-width">
 <p>Le restrizioni imposte tramite computer per il prestito e la lettura dei
 liberi (e altre opere pubblicate) sono note come DRM, che noi chiamiamo
 &ldquo;Digital Restrictions Management&rdquo;.  Per eliminare i DRM, la Free
 Software Foundation ha lanciato la campagna <a
 href="http://DefectiveByDesign.org";>Defective by Design</a> e chiede il
 vostro aiuto.</p>
-</li>
 
-<li>
 <p>Anche la Electronic Frontier Foundation, un'organizzazione separata non
 collegata alla Free Software Foundation, organizza campagne contro i DRM.</p>
+</div>
+<div class="column-limit"></div>
 </li>
+</ul>
 
-<li>
+<blockquote class="info center">
 <p>Questa nota è stata aggiornata più volte dalla prima pubblicazione di 
questa
 storia.</p>
+</blockquote>
 
+<ul class="no-bullet">
+<li>
+<div class="columns">
 <p>
 Il diritto a leggere è una battaglia che si combatte oggi. Sebbene possano
 volerci 50 anni perché le nostre libertà presenti si dissolvano
@@ -233,21 +285,31 @@
 <p>
 Anche il World Wide Web Consortium sta cedendo al potere delle aziende; sta
 per approvare un sistema DRM come parte ufficiale delle specifiche del web.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
 Il software non libero tende ad avere <a href="/proprietary/">abusi di vario
 genere</a>, che fanno concludere che <a
 href="/philosophy/free-software-even-more-important.html">non si può mai
 avere fiducia in un programma non libero</a>.  Dobbiamo respingere i
 programmi non liberi.</p>
 
-<p>
+<p class="inline-block">
 Con Windows vista, Microsoft ha ammesso di avere inserito una backdoor per
 installare "aggiornamenti" software anche se indesiderati dall'utente. Può
 anche imporre a tutti i PC che usano Vista di non eseguire un certo driver
 di dispositivo hardware. Lo scopo principale era quello di imporre DRM che
 l'utente non potesse superare. Ovviamente Windows 10 non è migliore.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 Una delle idee nel racconto non è stata proposta nella realtà prima del
 2002, quella che l'FBI e Microsoft terranno le parole segrete primarie per
@@ -275,7 +337,12 @@
 progettati per Windows 10 hanno solo la chiave di Microsoft e il fatto di
 poter installare un altro sistema (come GNU/Linux) è sotto il controllo di
 Microsoft. Noi lo chiamiamo <em>restricted boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 Nel 1997, quando fu scritta la prima versione di questo racconto, la SPA
 stava minacciando dei piccoli fornitori di accesso a Internet, pretendendo
@@ -294,7 +361,12 @@
 lavoro e gli amici. Una campagna mediatica terroristica della BSA in
 Argentina nel 2001 avanzava velate minacce che le persone che condividevano
 il software sarebbero state violentate in carcere.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="reduced-width">
 <p>
 Le politiche di sicurezza delle università descritte sopra non sono
 immaginarie. Per esempio, sullo schermo di un computer in un'università
@@ -317,12 +389,15 @@
 <p>
 È invero un approccio interessante al Quarto Emendamento: pressare da subito
 i più a rinunciare ai propri diritti che questo garantisce.</p>
+</div>
 </li>
 </ul>
+<div class="column-limit"></div>
 </div>
 
 <h3 id="BadNews">Cattive notizie</h3>
 
+<div class="columns">
 <p>
 La battaglia per il diritto a leggere è già in corso, e stiamo subendo. Il
 nemico è organizzato e noi non lo siamo.
@@ -342,11 +417,11 @@
 
 <li><p>Ha DRM per evitare che gli utenti condividano copie.</p></li>
 
-<li><p>Ha una backdoor che Amazon può usare per cancellare da remoto qualsiasi
+<li><p class="inline-block">Ha una backdoor che Amazon può usare per 
cancellare da remoto qualsiasi
 libro e che nel 2009 è stata usata per cancellare copie del libro "1984" di
 George Orwell.</p></li>
 
-<li><p>Se questo non è abbastanza Orwelliano c'è una backdoor universale con 
cui
+<li><p class="inline-block">Se questo non è abbastanza Orwelliano c'è una 
backdoor universale con cui
 Amazon può cambiare il software da remoto, introducendo qualsiasi tipo di
 funzioni.</p></li>
 </ul>
@@ -365,6 +440,7 @@
 alla FSF</a> per darci un sostegno generico, oppure vedete questi altri <a
 href="/help/help.html">modi per aiutare il nostro lavoro</a>.
 </p>
+</div>
 
 <h3 id="References">Riferimenti</h3>
 
@@ -393,13 +469,7 @@
 dai brevetti.</li>
 </ul>
 
-<hr />
-<blockquote id="fsfs"><p class="big">Questo testo è stato pubblicato in <a
-href="http://shop.fsf.org/product/free-software-free-society/";><cite>  Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Altri testi da leggere</h5>
+<h4>Altri testi da leggere</h4>
 
 <ul>
        <li><a href="/philosophy/philosophy.html">Filosofia del progetto 
GNU</a></li>
@@ -408,6 +478,13 @@
 id="copy-protection">Copy Protection: Just Say No</a>, Pubblicato in
 Computer World.</li>
 </ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">Questo testo è stato pubblicato in <a
+href="http://shop.fsf.org/product/free-software-free-society/";><cite>  Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
 
 <div class="translators-notes">
 
@@ -486,7 +563,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/10/20 20:27:37 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: right-to-read.ja.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.ja.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- right-to-read.ja.html       31 Oct 2016 04:28:15 -0000      1.51
+++ right-to-read.ja.html       6 Nov 2016 21:28:14 -0000       1.52
@@ -6,29 +6,60 @@
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>読む権利 - GNUプロジェクト - 
フリーソフトウェアファウンデーション</title>
 <style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns >
+ p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 -->
 </style>
 
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.ja.html" -->
-<h2>読む権利</h2>
+<h2 class="center">読む権利</h2>
 
-<p>
+<p class="byline center">
 <a 
href="http://www.stallman.org/";><strong>リチャード・ストールマン</strong></a>著</p>
-
-<p>
+<p class="center">
 <em>この記事は<cite>Communications of the
 ACM</cite>1997年2月号(第40巻No.2)に掲載されました。</em></p>
-<hr />
+<hr class="thin" />
 
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
             月面革命の先行者
に関する記事集、<cite>ティコへの道</cite>、ルナシティ発行、2096年、より。
 </p></blockquote>
 
+<div class="columns">
 <p>
 
ダン・ハルバートにとって、ティコへの道は大学から始まった。&mdash;リッサ・レンツが、彼のコンピュータを貸して欲しいと言ってきたときに。自分のコンピュータがæ•
…
障してしまった彼女は、他のコンピュータを借りられない限り学期の中間プロジェクトを終わらせることができなかった。ダンを除けば、他に彼女がé
 ¼ã‚ã‚‹è€…はいなかった。</p>
 
@@ -42,7 +73,10 @@
 
 <p>
 
もちろん、リッサが彼の本を読むことを意図しているとは限らない。彼女はコンピュータを中間レポートを書くためã
 
けに使いたいのかも知れない。しかしダンは、彼女が中流階級の家庭の出で授業料支払いの余裕はなく、読書料は言うまでもないことを知っていた。彼の本を読むのが、彼女が卒業できる唯一の道ã
 
ろう。彼はこの状況を理解していた。彼自身、自分が読むç 
”究論文のå…
¨ã¦ã«å¯¾ã™ã‚‹èª­æ›¸æ–™ã‚’払うために、金を借りなければならなかったのã
 ã€‚(こういった読書料の10%はその論文を書いた研究者
たちに支払われた。ダンは学者になるつもりだ
ったので、将来彼自身の研究論文が頻繁に参ç…
§ã•ã‚Œã‚Œã°ã€ã“のローンを返済できると望むことができたのã
 ã€‚)</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 
後にダンは、かつて誰でも図書館に行けば、学術雑誌の記事や、あるいは書籍さえも料金を支払うことなく読むことができた時代があったことを知った。当時は、政府の図書館利用助成金無しで何千ページも読ç
 ´ã—た在野の研究者たちがいたのだ。しかし1990年代にå…
¥ã‚Šã€å–¶åˆ©ã®ã¿ãªã‚‰ãšéžå–¶åˆ©ã®å­¦è¡“出版社もまた、アクセスに料金を課すようになった。2047年までに、かつて図書館では学術文献に自由に誰でもアクセスできたことなど、おぼろげな記憶の彼方に消えてしまったのである。</p>
 
@@ -57,7 +91,10 @@
 
 <p>
 著作権監視装置を、改変したシステム
カーネルをインストールすることで回避することも可能だ
った。ダンは、自由なカーネルや、完å…
¨ã«è‡ªç”±ãªã‚ªãƒšãƒ¬ãƒ¼ãƒ†ã‚£ãƒ³ã‚°ãƒ»ã‚·ã‚¹ãƒ†ãƒ 
さえも前世紀末には存在していたことを知った。しかし現在ではそれらはデバッガ同様違法であるã
 ã‘でなく、もしそのようなシステム
を持っていたとしても、コンピュータのルート・パスワードを知らないことにはインストールできないのã
 
った。FBIもマイクロソフト・サポートもパスワードを教えてはくれない。</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 
ダンは、単にリッサに彼のコンピュータを貸すことはできないと結論づけた。しかし彼は彼女を助けることを拒否できなかった。ダンは彼女のことを愛していたからã
 
。彼女と話す時はいつも、ダンの心は喜びに満ちあふれるのã
 ã£ãŸã€‚そしてリッサは他ならぬ彼に助けを求めてきたのだ
から、彼女も彼を愛しているのかもしれなかった。</p>
 
@@ -72,9 +109,13 @@
 
 <p>
 
後に、ダンはこの種の大学の方針は相当数の大学生がコンピュータを使い始めた1980年代から始まったものに過ぎないことを知った。それまでは、大学は学生規則に関して異なった方針を保持していた。当時の彼らは、有害な活動を罰したのであって、疑いを持たれたã
 ã‘の者は罰しなかったのである。</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 リッサはダンをSPAにå 
±å‘Šã—なかった。彼の彼女を助けるという決意は、ついには彼女との結婚に彼を導いたが、さらに彼らは子供のときから海賊行為として教えられてきたことに疑問を持つようになった。ダンとリッサは著作権の歴史について調べ始め、ソビエト連邦とそこでの複製の制限、そしてå
…ƒã€…の合衆国憲法さえ読んだ
。彼らは月に移住したが、彼らの他にも同様にSPAの長いè…
•ã‹ã‚‰é€ƒã‚ŒãŸäººã€…
がいることを知った。2062年にティコ蜂起が始まったとき、万人にとっての読む権利はまもなくその中心的な目的の一つとなったのである。</p>
+</div>
 
 <div class="announcement">
 <blockquote>
@@ -86,24 +127,35 @@
 <div id="AuthorsNote">
 <h3>作者の注釈</h3>
 
-<ul>
-<li>この物語は、誰かによって未来に書かれる歴史的な記事と想定されており、ダン・ハルバートの若き時代を描いています。それは「海賊」をプロパガンダとして使う不正な力に制された抑圧的な社会です。ですから、この物語は、その社会の用語を用いています。より明らかに弾圧的な感じがするように、わたしは、描くようにしました。こちらの、<a
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>この物語は、誰かによって未来に書かれる歴史的な記事と想定されており、ダン・ハルバートの若き時代を描いています。それは「海賊」をプロパガンダとして使う不正な力に制された抑圧的な社会です。ですから、この物語は、その社会の用語を用いています。より明らかに弾圧的な感じがするように、わたしは、描くようにしました。こちらの、<a
 
href="/philosophy/words-to-avoid.html#Piracy">「海賊行為」</a>もご覧くã
 ã•ã„。
+</p>
+</div>
+<div class="column-limit"></div>
 </li>
 
 <li>
+<div class="reduced-width">
 <p>コンピュータにより強制された書籍(およびそのほかのå…
¬é–‹ä½œå“)の貸与や読書に対する制限はDRMとして知られますが、これは「ディジタル制限管理」の略です。DRMをなくすために、フリーソフトウェアファウンデーションは<a
 href="http://DefectiveByDesign.org";>Defective by
 
Design</a>(設計から間違っている)キャンペーンを設置しました。皆さんのサポートをお願いします。</p>
-</li>
 
-<li>
 
<p>電子フロンティアファウンデーションも、フリーソフトウェアファウンデーションとは関係ない別の団体ですが、DRMに反対する運動をしています。</p>
+</div>
+<div class="column-limit"></div>
 </li>
+</ul>
 
-<li>
+<blockquote class="info center">
 
<p>この注釈はストーリーの最初の発表から何回か更新されました。</p>
+</blockquote>
 
+<ul class="no-bullet">
+<li>
+<div class="columns">
 <p>
 
読む権利のための戦いは、すでに今日闘われているのです。現在の生活習æ
…
£ãŒæ­´å²ã®å½¼æ–¹ã«æ¶ˆãˆå¤±ã›ã‚‹ã¾ã§ã«ã¯50年かかるかもしれませんが、本文で述べられた特定の抑圧的な法律やæ
…
£è¡Œã®ã»ã¨ã‚“どはすでに提案されており、そのいくつかはアメリカ合衆国や他の国ã€
…
ですでに立法されてしまっています。アメリカでは、1998年ディジタル・ミレニアãƒ
 è‘—作権法(Digital
 Millennium Copyright
@@ -118,15 +170,25 @@
 
 <p>
 WWWコンソーシアムでさえもが著作権業界の影のå…
ƒã«é™¥ã£ã¦ã—まいました。今、DRMシステム
をウェブの仕様のå…
¬å¼éƒ¨åˆ†ã¨ã™ã‚‹æ‰¿èªã®ãã‚ã«ã‚ります。</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
 不自由なソフトウェアは<a 
href="/proprietary/">多種の悪用機能</a>を有する傾向があり、これは、<a
 
href="/philosophy/free-software-even-more-important.html">不自由なプログラãƒ
 ã¯æ±ºã—て信é 
¼ã§ããªã„</a>という結論を導きます。自由(リブレ)ソフトウェアã
 ã‘を主張し、不自由なプログラム
を拒否しなくてはなりません。</p>
 
-<p>
+<p class="inline-block">
 ウィンドウズVistaでマイクロソフトはバックドアを組みå…
¥ã‚ŒãŸã“とを認めました:
 たとえユーザがそれはむしろダウングレードだ
と考えたとしても、マイクロソフトは強制的にソフトウェアの「アップグレード」をインストールできるのです。Vistaを稼働しているすべてのマシンに対して、あるデバイスドライバの実行を拒絶する指令をすることもできます。Vistaのユーザの弾圧の主な目的は、ユーザがå
…
‹æœã§ããªã„DRMの押し付けでした。もちろん、ウィンドウズは決してよくはありません。</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 
このストーリーの中の一つのアイデアは2002年までは現実には提案されませんでした。これは、FBIとマイクロソフトがあなたのパーソナル・コンピュータのルートパスワードを保持し、あなたには持たせないというものです。</p>
 
@@ -140,7 +202,12 @@
 
 <p>
 
セキュア・ブートはユーザが署名鍵を指定し、どのソフトウェアが署名するかを決めることが可能な方法で実è£
…
することができます。実際、ウィンドウズ10のために設計されたPCはマイクロソフトの鍵ã
 ã‘を保持し、そのマシンの所有者
が(GNU/Linuxのような)ほかのシステム
をインストールできるかどうかは、マイクロソフトのコントロール下にあります。これをわたしたちは<em>制限されたブート</em>と呼びます。</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 
1997年、このストーリーが最初に発表されたとき、SPAは小規模なインターネットサービスプロバイダをè„
…
して、彼らがSPAにすべてのユーザを監視することを許可するよう要求していました。ほとんどのISPはè„
…されて屈服しましたが、それは彼らが法廷で反撃するだ
けの資金的余裕がなかったからです。一つのISP、カリフォルニア州オークランドのCommunity
 
ConneXionは要求を拒否し実際に訴えられました。SPAは後に訴訟を取り下げましたが、求めていた力をDMCAが与えてくれたのです。</p>
@@ -148,7 +215,12 @@
 <p>
 SPAは、本当は「ソフトウェア出版業協会(Software
 
Publisher'sAssociation)」の略ですが、BSA(ビジネスソフトウェア同盟)に、その警察のような役割を置き換わられてしまいました。今日、BSAはå
…¬å¼ã®è­¦å¯Ÿæ¨©åŠ›ã¨ã§ã¯ã‚りませんが、非å…
¬å¼ã«ã¯è­¦å¯Ÿã®ã‚ˆã†ã«ãµã‚‹ã¾ã£ã¦ã„ます。かつてのソビエト連邦を思い起こさせるような手法を用い、人ã€
…
がその同僚や友人を密告するよう奨励しているのです。2001年アルゼンチンにおいて展開されたBSAの恐るべきキャンペーンは、ソフトウェアをå
…±æœ‰ã™ã‚‹äººã€…は監獄でレイプされるだ
ろうというようなことを遠回しに述べて脅すような内
容でした。</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="reduced-width">
 <p>
 
本文中にあるような大学のセキュリティポリシーは想像の産物ではありません。たとえば、シカゴ地域にある某大学のコンピュータは、ログインする際に以下のようなメッセージを表示します。</p>
 
@@ -158,12 +230,15 @@
 
 <p>
 
これは多くの人に、彼らが修正第4条の下で保証された権利をあらかじめ放棄することに同意するよう圧力をかけているという点で、憲法修正第4条への興味深いアプローチです。</p>
+</div>
 </li>
 </ul>
+<div class="column-limit"></div>
 </div>
 
 <h3 id="BadNews">悪いニュース</h3>
 
+<div class="columns">
 <p>
 
読む権利の戦いはこれまでわたしたちに不利でした。敵は組織化されていますが、わたしたちはそうではありません。
 </p>
@@ -178,9 +253,9 @@
 
 <li><p>それはDRMを有し、ユーザがコピーをå…
±æœ‰ã™ã‚‹ã“とを阻止することを意図しています。</p></li>
 
-<li><p>それはAmazonが遠
隔操作でいかなる本も削除できるバックドアを有します。2009年、ジョージ・オーウェル著の1984のコピーを何千部も削除しました。</p></li>
+<li><p class="inline-block">それはAmazonが遠
隔操作でいかなる本も削除できるバックドアを有します。2009年、ジョージ・オーウェル著の1984のコピーを何千部も削除しました。</p></li>
 
-<li><p>オーウェルの読者にとってそれでも不十分なå 
´åˆã«ã¯ã€ä¸‡èƒ½ãƒãƒƒã‚¯ãƒ‰ã‚¢ãŒã‚り、Amazonは遠
隔操作でソフトウェアを変更することができ、ほかのあらゆる種類の不快を導å
…¥ã§ãã¾ã™ã€‚</p></li>
+<li><p class="inline-block">オーウェルの読者
にとってそれでも不十分なå 
´åˆã«ã¯ã€ä¸‡èƒ½ãƒãƒƒã‚¯ãƒ‰ã‚¢ãŒã‚り、Amazonは遠
隔操作でソフトウェアを変更することができ、ほかのあらゆる種類の不快を導å
…¥ã§ãã¾ã™ã€‚</p></li>
 </ul>
 
 <p>Amazonの電子書籍のé…
å¸ƒã¯æŠ‘圧的でもあります。ユーザを同定し、ユーザがå…
¥æ‰‹ã—た書籍を記録します。ユーザが反社会的な契約に同意し、他人とコピーをå
…
±æœ‰ã—ないと要請もします。もしそのような契約に同意するのであれば、より邪悪でないのは契約に反抗し、いずれにしろコピーをå
…±æœ‰ã™ã‚‹ã“とだ
と、わたしの良心は言います。しかしながら、å…
¨éƒ¨ãŒã„いのは、最初からわたしは同意しないべきです。ですから、わたしはそういった契約に同意することを拒否します。契約が、ソフトウェア、電子書籍、音楽あるいはほかのもの、何であっても。</p>
@@ -191,6 +266,7 @@
 href="http://www.fsf.org/associate";>FSFに参加
して</a>わたしたちの仕事に一般的に支援できます。<a
 href="/help/help.html">わたしたちの仕事に参加
する方法のリスト</a>もあります。
 </p>
+</div>
 
 <h3 id="References">参考文献</h3>
 
@@ -212,12 +288,7 @@
 
href="https://web.archive.org/web/20151113122141/http://public-domain.org/";>パブリックドメイン連合</a>&mdash;著作権と特許の権力の過剰な拡大に抵抗し、方針を転換させようとする団体。</li>
 </ul>
 
-<hr />
-<blockquote id="fsfs"><p class="big">この小論は<a
-href="http://shop.fsf.org/product/free-software-free-society/";><cite>自由ソフトウェア、自由な社会:
-リチャード・M・ストールマン小論選集</cite></a>に収録され、出版されました。</p></blockquote>
-
-<h5>その他の読みもの</h5>
+<h4>その他の読みもの</h4>
 
 <ul>
        <li><a 
href="/philosophy/philosophy.html">GNUプロジェクトの理念</a></li>
@@ -225,6 +296,12 @@
 
href="http://www.computerworld.com/s/article/2596679/networking/copyprotection--just-say-no.html";
 id="copy-protection">著作権保護: 単にノーと言おう</a>、Computer 
World誌に掲載。</li>
 </ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">この小論は<a
+href="http://shop.fsf.org/product/free-software-free-society/";><cite>自由ソフトウェア、自由な社会:
+リチャード・M・ストールマン小論選集</cite></a>に収録され、出版されました。</p></blockquote>
 
 <div class="translators-notes">
 
@@ -305,7 +382,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2016/10/31 04:28:15 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: right-to-read.ru.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.ru.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- right-to-read.ru.html       18 Oct 2016 16:29:49 -0000      1.39
+++ right-to-read.ru.html       6 Nov 2016 21:28:14 -0000       1.40
@@ -6,30 +6,61 @@
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Право прочесть - Проект GNU - Фонд 
свободного программного обеспечения</title>
 <style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns >
+ p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 -->
 </style>
 
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.ru.html" -->
-<h2>Право прочесть</h2>
+<h2 class="center">Право прочесть</h2>
 
-<p>
+<p class="byline center">
 <a href="http://www.stallman.org/";><strong>Ричард 
Столмен</strong></a></p>
-
-<p>
+<p class="center">
 <em>Эта статья появилась в февральском 
(1997&nbsp;года) выпуске
 <cite>Communications of the ACM</cite> (том 40, номер 2).</em></p>
-<hr />
+<hr class="thin" />
 
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
             Из <cite>Дороги к Тихо</cite>, сборника 
статей о событиях, предшествовавших
 Лунной революции, опубликованного в 
Луна-Сити в 2096&nbsp;году.
 </p></blockquote>
 
+<div class="columns">
 <p>
 Для Дана Хeлберта дорога к Тихо началась в 
училище&nbsp;&mdash; когда
 Мелисса Ленц попросила одолжить ей его 
компьютер. Ее компьютер сломался, и
@@ -67,7 +98,10 @@
 статьи; поскольку Дан метил в ученые, он 
мог надеяться, что его собственные
 научные статьи, если на них будут часто 
ссылаться, принесут достаточно
 денег, чтобы вернуть долг.)</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Впоследствии Дан узнал, что было время, 
когда любой мог зайти в библиотеку и
 почитать статьи в журналах и даже книги, и 
за это не приходилось
@@ -111,7 +145,10 @@
 установить, даже если они у тебя были, если 
ты не знал пароля администратора
 для своего компьютера. А его ты не узнал бы 
ни от ФБР, ни от службы
 поддержки Microsoft.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Дан пришел к заключению, что он просто не 
мог одолжить свой компьютер
 Мелиссе. Но он не мог отказать ей в помощи, 
потому что он любил ее. Каждый
@@ -146,7 +183,10 @@
 пользоваться компьютерами. До этого 
учебные заведения подходили к дисциплине
 студентов по-другому: они наказывали за то, 
что было вредно, а не за то, что
 просто вызывало подозрения.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Мелисса не донесла на Дана в SPA. Его решение 
помочь ей привело к тому, что
 они поженились, а также поставило перед 
ними вопрос о том, что им в детстве
@@ -156,6 +196,7 @@
 людей, которые тоже улетели туда, чтобы 
длинные руки SPA не могли их
 достать. Когда в 2062&nbsp;году началось 
восстание в Тихо, всеобщее право
 прочесть быстро стало одной из его 
основных целей.</p>
+</div>
 
 <div class="announcement">
 <blockquote>
@@ -167,17 +208,23 @@
 <div id="AuthorsNote">
 <h3>Примечания автора</h3>
 
-<ul>
-<li>Этот рассказ&nbsp;&mdash; предположительно 
статья по истории, написанная в
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>Этот рассказ&nbsp;&mdash; предположительно 
статья по истории, написанная в
 будущем кем-то другим и описывающая 
молодость Дана Хелберта в обществе
 угнетения, сформированном темными силами, 
которые употребляют слово
 &ldquo;пират&rdquo; в пропаганде. Статья 
пользуется выражениями этого
 общества. Я попытался развить мысль, чтобы 
это выглядело еще более
 жестко. См. &ldquo;<a
 href="/philosophy/words-to-avoid.html#Piracy">пиратство</a>&rdquo;.
+</p>
+</div>
+<div class="column-limit"></div>
 </li>
 
 <li>
+<div class="reduced-width">
 <p>Компьютерные ограничения на передачу 
или чтение книг (и других видов
 опубликованных работ) известны как DRM, это 
сокращение &ldquo;<span
 lang="en" xml:lang="en">Digital Restrictions Management</span> 
(цифровое
@@ -185,18 +232,23 @@
 программного обеспечения организовал 
кампанию <a
 href="http://DefectiveByDesign.org";>Дефект гарантирован</a>. 
Мы просим вас о
 поддержке.</p>
-</li>
 
-<li>
 <p>Фонд электронных рубежей, отдельная 
организация, не связанная с Фондом
 свободного программного обеспечения, 
также выступает против цифрового
 управления ограничениями.</p>
+</div>
+<div class="column-limit"></div>
 </li>
+</ul>
 
-<li>
+<blockquote class="info center">
 <p>Следующее примечание со времени первой 
публикации рассказа несколько раз
 обновлялось.</p>
+</blockquote>
 
+<ul class="no-bullet">
+<li>
+<div class="columns">
 <p>
 Битва за право прочесть уже идет. Хотя, 
возможно, потребуется 50&nbsp;лет
 для того, чтобы наши прежние свободы ушли в 
небытие, большинство конкретных
@@ -233,8 +285,13 @@
 Даже Консорциум Всемирной паутины попал в 
сети индустрии авторского права;
 он движется к одобрению системы цифрового 
управления ограничениями как
 официальной части спецификаций Всемирной 
паутины.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
 В несвободных программах зачастую бывают <a
 href="/proprietary/">разнообразные несправедливые 
особенности</a>, что
 подводят к заключению о том, что <a
@@ -242,7 +299,7 @@
 программе никогда нельзя доверять</a>.  Мы 
настаиваем исключительно на
 свободных программах и отвергаем 
несвободные.</p>
 
-<p>
+<p class="inline-block">
 Относительно Windows Vista Microsoft признала, что в 
систему встроена
 лазейка: Microsoft может пользоваться ею, чтобы 
принудительно устанавливать
 программные &ldquo;обновления&rdquo;, даже если 
пользователь считает их
@@ -251,7 +308,12 @@
 устройства. Vista зажимала пользователей 
главным образом для того, чтобы
 навязать цифровое управление 
ограничениями, с которым пользователи не 
смогут
 справиться. Windows&nbsp;10, конечно, не лучше.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 Одна из идей рассказа не предлагалась в 
реальности до 2002&nbsp;года. Это
 идея о том, что ФБР и Microsoft будут хранить 
пароли системного
@@ -283,7 +345,12 @@
 есть только ключ Microsoft, и то, может ли 
владелец машины установить любую
 другую операционную систему (такую как 
GNU/Linux), определяет Microsoft. Мы
 называем это <em>ограниченной 
загрузкой</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 В 1997&nbsp;году, когда этот рассказ был 
впервые опубликован, SPA угрожала
 мелким операторам связи, предоставлявшим 
доступ в Интернет, требуя, чтобы
@@ -304,7 +371,12 @@
 сотрудников и знакомых. В ходе кампании 
террора, проводившейся BSA в
 Аргентине в 2001&nbsp;году, выдвигались слегка 
прикрытые угрозы насилия в
 тюрьме над людьми, обменивавшимися 
программами.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="reduced-width">
 <p>
 Правила безопасности учебного заведения, 
описанные выше, не
 выдуманы. Например, компьютер одного из 
университетов в районе Чикаго
@@ -330,12 +402,15 @@
 Это интересный подход к Четвертой 
поправке: оказывать на всех подряд
 давление, чтобы они заранее соглашались 
отказаться от своих прав,
 предоставляемых этой поправкой.</p>
+</div>
 </li>
 </ul>
+<div class="column-limit"></div>
 </div>
 
 <h3 id="BadNews">Плохие новости</h3>
 
+<div class="columns">
 <p>
 Битву за право прочесть мы пока 
проигрываем. Враг организован, а
 мы&nbsp;&mdash; нет.
@@ -359,11 +434,11 @@
 <li><p>В нем есть цифровое управление 
ограничениями, предназначенное для того,
 чтобы не дать пользователям обмениваться 
копиями.</p></li>
 
-<li><p>В нем есть лазейка, с помощью которой 
Amazon может стереть любую книгу по
+<li><p class="inline-block">В нем есть лазейка, с 
помощью которой Amazon может стереть любую 
книгу по
 сети. В&nbsp;2009&nbsp;году компания стерла 
тысячи копий <cite>1984</cite>
 Джорджа Оруэлла.</p></li>
 
-<li><p>Если это еще не достаточно 
по-оруэлловски, там есть универсальная 
закладка,
+<li><p class="inline-block">Если это еще не достаточно 
по-оруэлловски, там есть универсальная 
закладка,
 с помощью которой Amazon может изменять 
программы по сети, вводя какого
 угодно рода гадости.</p></li>
 </ul>
@@ -385,6 +460,7 @@
 гарантирован</a>&rdquo;, чтобы помочь. Есть 
также <a
 href="/help/help.html">список способов принять 
участие в нашей работе</a>.
 </p>
+</div>
 
 <h3 id="References">Ссылки</h3>
 
@@ -415,13 +491,7 @@
 предотвращение и отмена чрезмерного 
усиления авторского права и патентов.</li>
 </ul>
 
-<hr />
-<blockquote id="fsfs"><p class="big">Этот очерк 
публикуется в сборнике <a
-href="http://shop.fsf.org/product/free-software-free-society/";><cite>Свободные
-программы, свободное общество: избранные 
очерки Ричарда
-М. Столмена</cite></a></p></blockquote>
-
-<h5>Другие тексты по теме</h5>
+<h4>Другие тексты по теме</h4>
 
 <ul>
        <li><a href="/philosophy/philosophy.html">Философия 
проекта GNU</a></li>
@@ -430,6 +500,13 @@
 id="copy-protection">Защита от копирования: просто 
скажите
 &ldquo;нет&rdquo;</a>, опубликовано в 
&ldquo;Компьютер уорлд&rdquo;.</li>
 </ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">Этот очерк 
публикуется в сборнике <a
+href="http://shop.fsf.org/product/free-software-free-society/";><cite>Свободные
+программы, свободное общество: избранные 
очерки Ричарда
+М. Столмена</cite></a></p></blockquote>
 
 <div class="translators-notes">
 
@@ -508,7 +585,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2016/10/18 16:29:49 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: right-to-read.uk.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.uk.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- right-to-read.uk.html       31 Oct 2016 22:57:28 -0000      1.14
+++ right-to-read.uk.html       6 Nov 2016 21:28:14 -0000       1.15
@@ -3,7 +3,7 @@
  https://www.gnu.org/philosophy/po/right-to-read.uk.po</a>'
  --><!--#set var="ORIGINAL_FILE" value="/philosophy/right-to-read.html"
  --><!--#set var="DIFF_FILE" value="/philosophy/po/right-to-read.uk-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2016-09-01" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/right-to-read.en.html" -->
+ --><!--#set var="OUTDATED_SINCE" value="2016-09-01" -->
 
 <!--#include virtual="/server/header.uk.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -496,7 +496,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Оновлено:
 
-$Date: 2016/10/31 22:57:28 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: surveillance-vs-democracy.es.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.es.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- surveillance-vs-democracy.es.html   2 Nov 2016 12:57:37 -0000       1.33
+++ surveillance-vs-democracy.es.html   6 Nov 2016 21:28:14 -0000       1.34
@@ -6,20 +6,33 @@
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>¿Cuánta vigilancia puede soportar la democracia? - Proyecto GNU - Free
 Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+-->
+</style>
 
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.es.html" -->
-<h2>¿Cuánta vigilancia puede soportar la democracia?</h2>
+<h2 class="center">¿Cuánta vigilancia puede soportar la democracia?</h2>
 
-<p>por <a href="http://www.stallman.org/";>Richard Stallman</a></p>
+<p class="byline center">por <a href="http://www.stallman.org/";>Richard 
Stallman</a></p>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
-<blockquote><p>Una versión de este artículo se publicó por primera vez en 
octubre de 2013,
+<blockquote class="center"><p>Una versión de este artículo se publicó por 
primera vez en octubre de 2013,
 en Wired.</p></blockquote>
 
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Viñeta de un perro preguntándose por 
los tres anuncios que aparecieron en la
 pantalla de su ordenador..." /></a>
@@ -36,7 +49,8 @@
 vigilancia comienza a interferir con el funcionamiento de la democracia,
 cuando existe la posibilidad de que los denunciantes (como Snowden) sean
 atrapados.</p>
-
+</div>
+<div class="columns" style="clear:both">
 <p>Frente a los secretos del gobierno, nosotros, el pueblo, dependemos de los
 denunciantes para que <a
 href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";>nos informen de
@@ -68,9 +82,11 @@
 virtuales. Esto no será suficiente para proteger al denunciante si «capturar
 al denunciante» es una justificación para acceder a los datos necesarios
 para identificarlo. Tenemos que ir más allá.</p>
+</div>
 
-<h3>El límite máximo de la vigilancia en una democracia</h3>
+<h3 class="subheader" style="clear: both">El límite máximo de la vigilancia 
en una democracia</h3>
 
+<div class="columns">
 <p>Si los denunciantes no se atreven a revelar crímenes y mentiras, perdemos 
lo
 último que nos queda de control efectivo sobre nuestro gobierno e
 instituciones. Por esta razón, la vigilancia que permite al Estado averiguar
@@ -103,9 +119,11 @@
 entre ellos. El punto en el que la vigilancia es excesiva se alcanza cuando
 el Estado puede averiguar quién se comunicó con un periodista o un disidente
 conocidos.</p>
+</div>
 
-<h3>Una vez que se haya obtenido la información, será usada 
incorrectamente</h3>
+<h3 class="subheader">Una vez que se haya obtenido la información, será 
usada incorrectamente</h3>
 
+<div  class="columns">
 <p>Cuando la gente reconoce que el nivel general de vigilancia es excesivo, la
 respuesta inmediata consiste en proponer límites al acceso a los datos
 recopilados. Eso suena bien, pero no  solucionará el problema en lo más
@@ -161,9 +179,11 @@
 garantizar el normal funcionamiento de la actividad periodística y de la
 democracia, debemos limitar la acumulación de datos que son de fácil acceso
 para el Estado.</p>
+</div>
 
-<h3>Para que la protección de la privacidad sea robusta, debe ser 
técnica</h3>
+<h3 class="subheader">Para que la protección de la privacidad sea robusta, 
debe ser técnica</h3>
 
+<div class="columns">
 <p>La <cite>Electronic Frontier Foundation</cite> y otras organizaciones
 proponen una serie de principios jurídicos diseñados para <a
 href="https://en.necessaryandproportionate.org/text";>impedir los abusos de
@@ -193,9 +213,11 @@
 no sea liberal tendría que implementar la vigilancia desde cero, y recoger
 los datos solo a partir de esa fecha. En cuanto a suspender o ignorar
 momentáneamente esta ley, la idea apenas tendría sentido.</p>
+</div>
 
-<h3>En primer lugar, no sea incauto</h3>
+<h3 class="subheader">En primer lugar, no sea incauto</h3>
 
+<div class="columns">
 <p>Para preservar la privacidad, no debe descuidarla: es usted mismo el primero
 que tiene que salvaguardar su propia privacidad.  Evite identificarse en los
 sitios web, acceda a los sitios con Tor y utilice navegadores que bloqueen
@@ -240,9 +262,11 @@
 desplazamientos, pero no todos. Está claro que la mejor solución es lograr
 que todos estos sistemas dejen de vigilar a las personas que no sean
 legítimamente sospechosas.</p>
+</div>
 
-<h3>Debemos diseñar todos los sistemas de modo que respeten la privacidad</h3>
+<h3 class="subheader">Debemos diseñar todos los sistemas de modo que respeten 
la privacidad</h3>
 
+<div class="columns">
 <p>Si no deseamos vivir en una sociedad de vigilancia total, debemos considerar
 la vigilancia como un tipo de contaminación social y limitar el impacto que
 cada nuevo sistema digital podría tener sobre la vigilancia, de la misma
@@ -262,9 +286,11 @@
 
 <p>Debemos incorporar la privacidad en el diseño de todos nuestros sistemas
 digitales.</p>
+</div>
 
-<h3>Remedio para la recolección de datos: dejarlos dispersos</h3>
+<h3 class="subheader">Remedio para la recolección de datos: dejarlos 
dispersos</h3>
 
+<div class="columns">
 <p>Una manera de hacer que el monitoreo no invada la privacidad es <a
 name="dispersal">mantener los datos dispersos y de difícil acceso</a>. Las
 viejas cámaras de seguridad no representaban ninguna amenaza para la
@@ -300,9 +326,11 @@
 calle. Toda  cámara dirigida por alguien hacia el espacio privado de otra
 persona constituye una violación de la privacidad, pero esa es otra
 cuestión.</p>
+</div>
 
-<h3 id="digitalcash">Remedio para la vigilancia del comercio en Internet</h3>
+<h3 id="digitalcash" class="subheader">Remedio para la vigilancia del comercio 
en Internet</h3>
 
+<div class="columns">
 <p>La mayor parte de los datos recogidos proviene de la actividad digital de
 las personas. Normalmente los datos son recolectados primero por
 compañías. Pero cuando lo que está en juego es la privacidad y la
@@ -361,9 +389,11 @@
 de los usuarios. Un sistema anónimo de pago terminaría con este problema:
 una falla de seguridad en el sitio no puede hacer daño si el sitio no sabe
 nada de nosotros.</p>
+</div>
 
-<h3>Remedio para la vigilancia en los viajes</h3>
+<h3 class="subheader">Remedio para la vigilancia en los viajes</h3>
 
+<div class="columns">
 <p>Debemos hacer que los pagos mediante telepeaje sean anónimos (con dinero
 digital, por ejemplo). Los sistemas de reconocimiento de matrículas
 reconocen todas las placas y <a
@@ -425,9 +455,11 @@
 vehículo demora demasiado, la estación donde inicialmente se retiró puede
 informar a la oficina principal, y en ese caso podría también enviar
 inmediatamente los datos del prestatario.</p>
+</div>
 
-<h3>Remedio para los expedientes de comunicaciones</h3>
+<h3 class="subheader">Remedio para los expedientes de comunicaciones</h3>
 
+<div class="columns">
 <p>Los proveedores del servicio de Internet <abbr title="Internet Service
 Provider">ISP</abbr> y las compañías telefónicas conservan mucha 
información
 de los contactos de sus usuarios (navegación, llamadas telefónicas,
@@ -472,9 +504,11 @@
 y mi servicio sabría únicamente que he recibido un correo que proviene de su
 servicio, pero sería difícil determinar que usted es el remitente y yo el
 destinatario.</p>
+</div>
 
-<h3>Pero algo de vigilancia es necesaria</h3>
+<h3 class="subheader">Pero algo de vigilancia es necesaria</h3>
 
+<div class="columns">
 <p>Para que el Estado pueda encontrar a los delincuentes tiene que tener la
 posibilidad de investigar delitos específicos, o sospechas de presuntos
 delitos específicos, por orden judicial. Con Internet, el poder de pinchar
@@ -511,9 +545,10 @@
 
 <p>De todos modos, el periodismo debe ser protegido de la vigilancia incluso
 cuando se lleva a cabo como parte de una actividad empresarial.</p>
+</div>
+<div class="column-limit"></div>
 
-<hr />
-
+<div class="reduced-width">
 <p>La tecnología digital ha ocasionado un inmenso incremento de los niveles de
 vigilancia sobre nuestros movimientos, acciones y comunicaciones. Ha ido
 mucho más allá de lo que experimentamos en la década de los noventa, y <a
@@ -536,6 +571,8 @@
 lo fueron las poblaciones de la Unión Soviética y Alemania del Este, debemos
 revertir ese incremento. Para ello es necesario detener la recopilación de
 grandes cantidades de datos sobre los ciudadanos.</p>
+</div>
+</div>
 
 <div class="translators-notes">
 
@@ -611,7 +648,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2016/11/02 12:57:37 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: surveillance-vs-democracy.fr.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.fr.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- surveillance-vs-democracy.fr.html   22 Oct 2016 19:28:26 -0000      1.35
+++ surveillance-vs-democracy.fr.html   6 Nov 2016 21:28:14 -0000       1.36
@@ -6,20 +6,33 @@
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Quel niveau de surveillance la démocratie peut-elle endurer ? - 
Projet GNU -
 Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+-->
+</style>
 
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.fr.html" -->
-<h2>Quel niveau de surveillance la démocratie peut-elle endurer ?</h2>
+<h2 class="center">Quel niveau de surveillance la démocratie peut-elle 
endurer ?</h2>
 
-<p>par <a href="http://www.stallman.org/";>Richard Stallman</a></p>
+<p class="byline center">par <a href="http://www.stallman.org/";>Richard 
Stallman</a></p>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
-<blockquote><p>Une version de cet article a été initialement publiée dans 
Wired en octobre
+<blockquote class="center"><p>Une version de cet article a été initialement 
publiée dans Wired en octobre
 2013.</p></blockquote>
 
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Dessin d'un chien que trois pop-ups 
publicitaires sur son écran d'ordinateur
 rendent perplexe..." /></a>
@@ -36,7 +49,8 @@
 niveau au delà duquel la surveillance commence à interférer avec le
 fonctionnement de la démocratie : lorsque des lanceurs d'alerte comme
 Snowden sont susceptibles d'être arrêtés.</p>
-
+</div>
+<div class="columns" style="clear:both">
 <p>Face à la culture du secret des gouvernements, nous, le peuple,<a
 id="TransNote1-rev" href="#TransNote1"><sup>1</sup></a> devons compter sur
 les lanceurs d'alerte pour <a
@@ -71,9 +85,11 @@
 d'alerte si « capturer le lanceur d'alerte » est un motif valable pour
 accéder à des données permettant de l'identifier. Nous devons aller plus
 loin encore.</p>
+</div>
 
-<h3>Le niveau de surveillance à ne pas dépasser dans une démocratie</h3>
+<h3 class="subheader" style="clear: both">Le niveau de surveillance à ne pas 
dépasser dans une démocratie</h3>
 
+<div class="columns">
 <p>Si les lanceurs d'alerte n'osent pas révéler les crimes, délits et
 mensonges, nous perdons le dernier lambeau de contrôle réel qui nous reste
 sur nos gouvernements et institutions. C'est pourquoi une surveillance qui
@@ -106,9 +122,11 @@
 pouvait y avoir des terroristes parmi eux. La surveillance devient trop
 importante quand l'État peut trouver qui a parlé à une personne connue comme
 journaliste ou comme opposant.</p>
+</div>
 
-<h3>L'information, une fois collectée, sera utilisée à de mauvaises 
fins</h3>
+<h3 class="subheader">L'information, une fois collectée, sera utilisée à de 
mauvaises fins</h3>
 
+<div  class="columns">
 <p>Quand les gens reconnaissent que la surveillance généralisée atteint un
 niveau trop élevé, la première réponse est de proposer d'encadrer l'accès
 aux données accumulées. Cela semble sage, mais cela ne va pas corriger le
@@ -166,9 +184,11 @@
 personne. Pour mettre le journalisme et la démocratie en sécurité, nous
 devons limiter l'accumulation des données qui sont facilement accessibles à
 l'État.</p>
+</div>
 
-<h3>Une protection solide de la vie privée doit être technique</h3>
+<h3 class="subheader">Une protection solide de la vie privée doit être 
technique</h3>
 
+<div class="columns">
 <p>L'Electronic Frontier Foundation ainsi que d'autres structures propose un
 ensemble de principes juridiques destinés à <a
 
href="https://fr.necessaryandproportionate.org/content/principes-internationaux-sur-l%E2%80%99application-des-droits-de-l%E2%80%99homme-%C3%A0-la-surveillance-des";>
@@ -198,9 +218,11 @@
 mettre en place de nouvelles méthodes de surveillance, et recueillerait des
 données à partir de ce moment-là seulement. Quant à suspendre cette loi ou
 ne pas l'appliquer momentanément, cela n'aurait presque aucun sens.</p>
+</div>
 
-<h3>En premier lieu, ne soyez pas imprudent</h3>
+<h3 class="subheader">En premier lieu, ne soyez pas imprudent</h3>
 
+<div class="columns">
 <p>Pour conserver une vie privée, il ne faut pas la jeter aux orties : le
 premier concerné par la protection de votre vie privée, c'est vous. Évitez
 de vous identifier sur les sites web, contactez-les avec Tor, et utilisez
@@ -245,9 +267,11 @@
 communications et nos mouvements, mais pas tous. Il est évident que la
 meilleure solution est d'obliger ces systèmes à cesser de surveiller les
 gens qui sont pas légitimement suspects.</p>
+</div>
 
-<h3>Nous devons intégrer à chaque système le respect de la vie privée</h3>
+<h3 class="subheader">Nous devons intégrer à chaque système le respect de 
la vie privée</h3>
 
+<div class="columns">
 <p>Si nous ne voulons pas d'une société de surveillance totale, nous devons
 envisager la surveillance comme une sorte de pollution de la société et
 limiter l'impact de chaque nouveau système numérique sur la surveillance, de
@@ -267,9 +291,11 @@
 
 <p>Il nous faut intégrer le respect de la vie privée à tous nos systèmes
 numériques, dès leur conception.</p>
+</div>
 
-<h3>Remède à la collecte de données : les garder dispersées</h3>
+<h3 class="subheader">Remède à la collecte de données : les garder 
dispersées</h3>
 
+<div class="columns">
 <p>Pour rendre la surveillance possible sans porter atteinte à la vie privée,
 l'un des moyens est de <a name="dispersal">conserver les données de manière
 dispersée</a> et d'en rendre la consultation malaisée. Les caméras de
@@ -306,9 +332,11 @@
 sécurité est dirigée vers l'intérieur d'un magasin ou vers la rue. Toute
 caméra pointée par quelqu'un vers l'espace privé de quelqu'un d'autre viole
 sa vie privée, mais c'est une autre question.</p>
+</div>
 
-<h3 id="digitalcash">Remède à la surveillance du commerce sur Internet</h3>
+<h3 id="digitalcash" class="subheader">Remède à la surveillance du commerce 
sur Internet</h3>
 
+<div class="columns">
 <p>La collecte de données provient essentiellement des activités numériques
 personnelles des gens. D'ordinaire, ces sont d'abord les entreprises qui
 recueillent ces données. Mais lorsqu'il est question de menaces pour la vie
@@ -371,9 +399,11 @@
 cartes de crédit. Un système de paiement anonyme éliminerait ce danger : 
une
 faille de sécurité du site ne peut pas vous nuire si le site ne sait rien de
 vous.</p>
+</div>
 
-<h3>Remède à la surveillance des déplacements</h3>
+<h3 class="subheader">Remède à la surveillance des déplacements</h3>
 
+<div class="columns">
 <p>Nous devons convertir la collecte numérique de péage en paiement anonyme
 (par l'utilisation de monnaie électronique, par exemple). Les système de
 reconnaissance de plaques minéralogiques reconnaissent toutes les plaques,
@@ -433,9 +463,11 @@
 le vélo restait « sorti » trop longtemps, la station d'origine pourrait en
 informer le siège social et, dans ce cas, lui envoyer immédiatement
 l'identité du client.</p>
+</div>
 
-<h3>Remède aux dossiers sur les communications</h3>
+<h3 class="subheader">Remède aux dossiers sur les communications</h3>
 
+<div class="columns">
 <p>Les fournisseurs de services Internet et les compagnies de téléphone
 enregistrent une masse de données sur les contacts de leurs utilisateurs
 (navigation, appels téléphoniques, etc.) Dans le cas du téléphone mobile, 
<a
@@ -481,9 +513,11 @@
 saurait seulement que j'ai reçu un message d'un utilisateur de votre service
 de courriel, mais il serait difficile de déterminer que c'était moi le
 destinataire.</p>
+</div>
 
-<h3>Mais un minimum de surveillance est nécessaire.</h3>
+<h3 class="subheader">Mais un minimum de surveillance est nécessaire.</h3>
 
+<div class="columns">
 <p>Pour que l'État puisse identifier les auteurs de crimes ou délits, il doit
 avoir la capacité d'enquêter sur un délit déterminé, commis ou en
 préparation, sur ordonnance du tribunal. À l'ère d'Internet, il est naturel
@@ -522,9 +556,10 @@
 
 <p>Cependant, le journalisme doit être protégé contre la surveillance, même
 s'il est réalisé dans un cadre commercial.</p>
+</div>
+<div class="column-limit"></div>
 
-<hr />
-
+<div class="reduced-width">
 <p>La technologie numérique a entraîné un accroissement énorme du niveau de
 surveillance de nos déplacements, de nos actions et de nos
 communications. Ce niveau est bien supérieur à ce que nous avons connu dans
@@ -548,6 +583,8 @@
 plus que ne le furent jadis l'Union soviétique et l'Allemagne de l'Est, ils
 nous faut inverser cette progression. Cela requiert de mettre fin à
 l'accumulation en masse de données sur la population.</p>
+</div>
+</div>
 
 <div class="translators-notes">
 
@@ -644,7 +681,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2016/10/22 19:28:26 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: surveillance-vs-democracy.it.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.it.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- surveillance-vs-democracy.it.html   27 Oct 2016 20:58:40 -0000      1.23
+++ surveillance-vs-democracy.it.html   6 Nov 2016 21:28:14 -0000       1.24
@@ -6,20 +6,33 @@
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Quanta sorveglianza può sostenere una democrazia? - Progetto GNU - Free
 Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+-->
+</style>
 
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
-<h2>Quanta sorveglianza può sostenere una democrazia?</h2>
+<h2 class="center">Quanta sorveglianza può sostenere una democrazia?</h2>
 
-<p>di <a href="http://www.stallman.org/";>Richard Stallman</a></p>
+<p class="byline center">di <a href="http://www.stallman.org/";>Richard 
Stallman</a></p>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
-<blockquote><p>La prima versione di questo articolo è stata pubblicata su 
Wired nel mese di
+<blockquote class="center"><p>La prima versione di questo articolo è stata 
pubblicata su Wired nel mese di
 ottobre 2013.</p></blockquote>
 
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Vignetta: un cane che si sorprende a 
vedere comparire tre annunci
 pubblicitari sul suo monitor..." /></a>
@@ -35,7 +48,8 @@
 oppressione? Ciò accade quando la sorveglianza interferisce con il
 funzionamento della democrazia: quando gli informatori (come Snowden)
 possono essere scoperti.</p>
-
+</div>
+<div class="columns" style="clear:both">
 <p>Di fronte alla segretezza dei governi, dipendiamo dagli informatori per
 sapere <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";>cosa
 fa lo stato</a>. Tuttavia la sorveglianza di oggi minaccia gli informatori,
@@ -61,9 +75,11 @@
 consiste nel limitare l’uso da parte del governo dei nostri dossier
 virtuali. Ciò non basterà a proteggere gli informatori se “beccarli” è
 motivo sufficiente a identificarli. Dobbiamo spingerci oltre.</p>
+</div>
 
-<h3>Il limite massimo di sorveglianza in una democrazia</h3>
+<h3 class="subheader" style="clear: both">Il limite massimo di sorveglianza in 
una democrazia</h3>
 
+<div class="columns">
 <p>Se gli informatori non osano svelare menzogne e reati, allora perdiamo
 l’ultimo briciolo di controllo efficace sui nostri governi e le nostre
 istituzioni. È per questo che la sorveglianza che permette allo stato di
@@ -93,9 +109,11 @@
 terroristi. Il punto in cui la sorveglianza diventa eccessiva è quello in
 cui lo stato può scoprire chi ha parlato con un certo giornalista o
 dissidente noto.</p>
+</div>
 
-<h3>Una volta raccolte, le informazioni saranno usate in modi impropri</h3>
+<h3 class="subheader">Una volta raccolte, le informazioni saranno usate in 
modi impropri</h3>
 
+<div  class="columns">
 <p>Quando ci si accorge che il livello di sorveglianza diffusa è troppo alto,
 la prima reazione è quella di proporre dei limiti all’accesso ai dati
 accumulati. Sembra una bella cosa, ma non risolve il problema, neanche
@@ -145,9 +163,11 @@
 di una imponente raccolta di informazioni su chiunque. Per mettere al sicuro
 il giornalismo e la democrazia, dobbiamo limitare l’accumulazione di dati
 facilmente accessibili allo stato.</p>
+</div>
 
-<h3>Una forte tutela della privacy dev’essere tecnica</h3>
+<h3 class="subheader">Una forte tutela della privacy dev’essere tecnica</h3>
 
+<div class="columns">
 <p>La Electronic Frontier Foundation e altre organizzazioni propongono una
 serie di principi legali mirati a <a
 href="https://en.necessaryandproportionate.org/text";>prevenire l’abuso</a>
@@ -175,9 +195,11 @@
 istituire la sorveglianza da capo, e raccoglierebbe solo dei dati a partire
 da quel momento. Quanto a sospendere o ignorare temporaneamente questa
 legge, l’idea sarebbe priva di senso.</p>
+</div>
 
-<h3>Primo, non essere sciocchi</h3>
+<h3 class="subheader">Primo, non essere sciocchi</h3>
 
+<div class="columns">
 <p>Se si desidera avere privacy non bisogna mai rinunciarvi: la protezione
 della privacy dipende innanzitutto da se stessi. Non bisogna fornire i
 propri dati a siti web, si deve utilizzare Tor e usare un browser che
@@ -219,9 +241,11 @@
 sorvegliano le nostre comunicazioni e spostamenti, ma non tutti. Chiaramente
 la migliore soluzione sarebbe che tutti questi sistemi smettessero di
 sorvegliare persone non sospette.</p>
+</div>
 
-<h3>Dobbiamo progettare tutti i sistemi tenendo a mente la privacy</h3>
+<h3 class="subheader">Dobbiamo progettare tutti i sistemi tenendo a mente la 
privacy</h3>
 
+<div class="columns">
 <p>Se non vogliamo una società a sorveglianza totale, dobbiamo considerare la
 sorveglianza come una sorta d’inquinamento sociale, e limitare l’impatto di
 ogni nuovo sistema digitale proprio come limitiamo l’impatto ambientale
@@ -240,9 +264,11 @@
 
 <p>Dobbiamo incorporare la privacy in questo modo in tutti i nostri sistemi
 digitali.</p>
+</div>
 
-<h3>Un rimedio alla raccolta dei dati: lasciarli dispersi</h3>
+<h3 class="subheader">Un rimedio alla raccolta dei dati: lasciarli 
dispersi</h3>
 
+<div class="columns">
 <p>Un modo per rendere il monitoraggio sicuro dal punto di vista della privacy
 è quello di <a name="dispersal">tenere i dati dispersi e rendere scomodo il
 loro accesso</a>. Le vecchie telecamere di sicurezza non costituivano una
@@ -274,9 +300,11 @@
 di sorveglianza sia puntata verso l'interno di un negozio, o verso la
 strada. Qualsiasi telecamera puntata da qualcuno verso lo spazio privato di
 qualcun altro viola la privacy, ma questa è un'altra questione.</p>
+</div>
 
-<h3 id="digitalcash">Un rimedio alla sorveglianza dell’e-commerce</h3>
+<h3 id="digitalcash" class="subheader">Un rimedio alla sorveglianza 
dell’e-commerce</h3>
 
+<div class="columns">
 <p>Quasi tutte le raccolte di dati provengono dalle attività degli utenti
 stessi. In genere i dati sono raccolti inizialmente dalle società. Ma dal
 punto di vista del rischio per la privacy e la democrazia, non fa differenza
@@ -331,9 +359,11 @@
 e abusarne. Ciò include i numeri di carte di credito dei clienti. Un sistema
 di pagamenti anonimi porrebbe fine a questo rischio: una falla di sicurezza
 in un sito non può danneggiarvi se il sito non sa niente di voi.</p>
+</div>
 
-<h3>Un rimedio alla sorveglianza dei trasporti</h3>
+<h3 class="subheader">Un rimedio alla sorveglianza dei trasporti</h3>
 
+<div class="columns">
 <p>Dobbiamo trasformare la riscossione di pedaggi digitali in pagamento anonimo
 (per esempio usando una moneta digitale). I sistemi di riconoscimento targhe
 identificano tutte le targhe, e <a
@@ -390,9 +420,11 @@
 rimane “fuori” troppo a lungo, la stazione in cui è avvenuto il prestito 
può
 informare la sede centrale; in quel caso potrebbe inviare immediatamente
 l’identità dell’utente.</p>
+</div>
 
-<h3>Un rimedio ai dossier sulle comunicazioni</h3>
+<h3 class="subheader">Un rimedio ai dossier sulle comunicazioni</h3>
 
+<div class="columns">
 <p>I fornitori di servizi Internet e le compagnie telefoniche conservano grandi
 quantità di dati sui contatti dei loro utenti (cronologia di navigazione,
 telefonate, etc). Grazie ai cellulari <a
@@ -432,9 +464,11 @@
 un utente del servizio utilizzato dall'utente B, e analogamente per l'utente
 B, ma sarebbe difficile per chi intercetta capire che le persone A e B si
 sono scambiate messaggi.</p>
+</div>
 
-<h3>Ma una certa dose di sorveglianza è necessaria</h3>
+<h3 class="subheader">Ma una certa dose di sorveglianza è necessaria</h3>
 
+<div class="columns">
 <p>Per poter scovare i criminali, lo stato deve poter indagare su reati
 specifici, o sospetti specifici, dietro mandato di un tribunale. Con
 Internet il potere d’intercettare conversazioni telefoniche si estende
@@ -469,9 +503,10 @@
 
 <p>Il giornalismo, però, dev’essere protetto dalla sorveglianza anche 
quando è
 condotto nell’ambito di un’impresa.</p>
+</div>
+<div class="column-limit"></div>
 
-<hr />
-
+<div class="reduced-width">
 <p>La tecnologia digitale ha prodotto un enorme aumento del livello di
 sorveglianza dei nostri movimenti, delle nostre azioni e comunicazioni. È
 molto più alto di quello che sperimentavamo negli anni Novanta, e <a
@@ -492,6 +527,8 @@
 quanto lo fossero l’Unione sovietica e la Germania dell’Est, dobbiamo
 invertire questa tendenza. Ciò richiede l’interruzione dell’accumulo di 
big
 data sui cittadini.</p>
+</div>
+</div>
 
 <div class="translators-notes">
 
@@ -568,7 +605,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/10/27 20:58:40 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: surveillance-vs-democracy.ja.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.ja.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- surveillance-vs-democracy.ja.html   31 Oct 2016 04:28:15 -0000      1.14
+++ surveillance-vs-democracy.ja.html   6 Nov 2016 21:28:14 -0000       1.15
@@ -5,19 +5,32 @@
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>民主主義はどれくらい監視に耐え得るか? - 
GNUプロジェクト - 
フリーソフトウェアファウンデーション</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+-->
+</style>
 
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.ja.html" -->
-<h2>民主主義はどれくらい監視に耐え得るか?</h2>
+<h2 class="center">民主主義はどれくらい監視に耐え得るか?</h2>
 
-<p><a 
href="http://www.stallman.org/";>リチャード・ストールマン</a>著</p>
+<p class="byline center"><a 
href="http://www.stallman.org/";>リチャード・ストールマン</a>著</p>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
-<blockquote><p>この小論の版は最初にWiredで013年10月に発表されました。</p></blockquote>
+<blockquote 
class="center"><p>この小論の版は最初にWiredで013年10月に発表されました。</p></blockquote>
 
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" 
alt="コンピュータの画面に現れた三つの広告を訝る犬の漫画..."
 /></a>
 <p>「どうやって、わたしが犬だとわかったんだろう?」</p>
@@ -26,7 +39,8 @@
 
<p>エドワード・スノーデンの暴露のおかげで、わたしたちは、社会における現在の一般監視のレベルは人権と両立しないことを知りました。合衆国あるいはほかでの、反体制の人ã€
…、情å 
±æºã€ãã—てジャーナリストへ繰り返されるハラスメントと刑事訴追は、これを裏付けています。わたしたちは一般監視のレベルを削減するå¿
…要がありますが、いったいどこまで必要でしょうか?
 
これを越えてはならないと保証すべき<em>最大限、認められる監視のレベル</em>は一体どこにあるでしょうか?
 
(今のままでは)それは民主主義の機能と干渉し始める監視のレベルを越えたもので、(スノーデンのような)告発è€
…が捕まってしまうようなものでしょう。</p>
-
+</div>
+<div class="columns" style="clear:both">
 <p>政府の秘密厳守に対して、わたしたち市民は<a
 
href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";>国が何をしているのかを伝えてくれる</a>告発è€
…に依拠しています。しかし、今日の監視は潜在的な告発者
を脅
かしており、これは監視が程度を越えていることを意味します。国に対する民主的な制御を回復するには、告発è€
…が自分が安全だ
とわかる点まで監視を削減しなければなりません。</p>
 
@@ -38,9 +52,11 @@
 
 <p>合衆国では<a
 
href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>二大政å
…
šææºã®ã€Œè‡ªå›½ã®ç›£è¦–の力を削減する」法案</a>が作成されるところですが、これは、わたしたちのネットの記録に対する政府の利用の制限に依存しています。もし、「告発è€
…を捕まえる」ことを根拠として、告発者を同定するのに充
分なアクセスが許されるとすれば、この法案は告発者
を守るのに充分ではないでしょう。もっと先に行く必
要があります。</p>
+</div>
 
-<h3>民主主義における監視の上限</h3>
+<h3 class="subheader" style="clear: 
both">民主主義における監視の上限</h3>
 
+<div class="columns">
 <p>もし、告発者
が犯罪と虚偽を明かにしなければ、わたしたちの政府と機関を効果的にコントロールする最後の断片を失うでしょう。誰が記è€
…
に話したのかを国が見つけ出すことを可能とするような監視はやりすぎで、民主主義が耐え得る度を越しているのです。</p>
 
 <p>匿名の合衆国政府のå…
¬å‹™å“¡ã¯ä¸æ°—味に2011年、ジャーナリストにこう言いました。<a
@@ -51,9 +67,11 @@
 
 <p>反対と反体制の活動は国から秘匿される必
要があります。国はそういった活動に対し、卑劣な企みをするものã
 ã‹ã‚‰ã§ã™ã€‚ACLUは合衆国政府の<a
 
href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>平和的な反体制のグループに潜å
…¥ã™ã‚‹ã‚·ã‚¹ãƒ†ãƒžãƒãƒƒã‚¯ãªæ…
£ç¿’</a>を示しました。それは、グループの中にテロリストがいるかもしれないという口実で行われるのです。監視がやりすぎであるという点は、国が知られているジャーナリストや知られている反体制派と話した人を探し出せるという点です。</p>
+</div>
 
-<h3>情報は一度集積されれば悪用される</h3>
+<h3 class="subheader">情報は一度集積されれば悪用される</h3>
 
+<div  class="columns">
 <p>人々
が一般監視のレベルがとても高いと認識するとき、最初の反応は集積されたデータへのアクセスの制限を提案することです。これは聞こえはいいですが、ほんの少しでさえ問題を解決しません。政府がルールにしたがうと思っているわけですから。(NSAはFIFA法廷を誤解させ、FIFAは、<a
 
href="http://www.wired.com/threatlevel/2013/09/nsa-violations/";>NSAに実質の説明責任があるとはみなせない</a>と言いました。)犯罪の容疑がアクセスへのæ
 ¹æ‹ ã¨ãªã‚‹ã§ã—ょうから、一旦、告発者
が「スパイ活動」と訴えられれば、「スパイ」を探すという言い訳で、集積されたデータへのアクセスすることになるでしょう。</p>
 
@@ -74,9 +92,11 @@
 
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html";>民主主義を直接転覆させる</a>ことができます。</p>
 
 <p>国によってアクセスされうるå…
¨ä½“監視は、誰に対してでも、国家が大量の情å 
±èª¿æŸ»ã‚’始めることを可能とします。ジャーナリズム
と民主主義を安å…
¨ã«ã™ã‚‹ãŸã‚ã«ã¯ã€å›½ã«ã‚ˆã£ã¦ç°¡å˜ã«ã‚¢ã‚¯ã‚»ã‚¹å¯èƒ½ãªãƒ‡ãƒ¼ã‚¿ã®é›†ç©ã‚’制限をしなければなりません。</p>
+</div>
 
-<h3>プライバシの堅
牢な保護は技術的でなければならない</h3>
+<h3 class="subheader">プライバシの堅
牢な保護は技術的でなければならない</h3>
 
+<div class="columns">
 <p>電子フロンティアファウンデーションとほかの団体は<a
 
href="https://en.necessaryandproportionate.org/text";>大量監視の悪用を禁止する</a>ように設計された法的な原則を提案しています。この原則は、告発è€
…の明確な法的保護を必é 
ˆã®ã‚‚のとして含みます。ですから、結果として、民主主義の自由を保護するにå
……分となるでしょう。もし、完å…
¨ã«æŽ¡æŠžã•ã‚Œã€ä¾‹å¤–なしに永久に実施されるのであれば。</p>
 
@@ -87,9 +107,11 @@
 
 <p>別にデータへのアクセスの制限が設定されたå 
´åˆã€ã¾ã£ãŸããã†ã„った制限が存在しないかのようになるでしょう:
 年々
もの価値がある記録が突然に国とその機関の誤用により利用可能となり、企業によって集積されるのであれば、私的な誤用もありえます。もし、しかしながら、わたしたちがå
…
¨å“¡ã®è¨˜éŒ²ã®é›†ç©ã‚’禁止すれば、この様な記録は存在し得ず、遡ってまとめる方法はないのです。新しい非自由な政権が監視を再び実è£
…
しなければならなくなるかも知れませんが、それでも、その時点から始めてデータを集積するã
 
けです。この法律を停止したり一時的に無視するに関する限り、この考えは意味を持つとは言い難いものでしょう。</p>
+</div>
 
-<h3>まず、バカなことはおやめなさい</h3>
+<h3 class="subheader">まず、バカなことはおやめなさい</h3>
 
+<div class="columns">
 
<p>プライバシを有するには、それを放り投げてはいけません:
 
第一にプライバシを守るべきなのはあなたです。ウェブサイトであなた自身を同定されることを避け、Torを使って通信し、訪問è€
…
を追跡するかれらの仕組みをブロックするブラウザを使いましょう。GNUプライバシ・ガードを使って、メールの中身を暗号化しましょう。現金で買い物をしましょう。</p>
 
@@ -103,17 +125,21 @@
 
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>友人知人の個人æƒ
…å 
±ã‚’渡さないようにしましょう</a>、そして電子メールや電話番号のリストを決してどんなウェブサイトにも渡さないように。Facebookのような会社に、友人の新聞に発表されたくないようなことについて、伝えないようにしましょう。より良くは、Facebookをå
…¨ãä½¿ã‚ãªã„ことです。本名をユーザに必é 
ˆã¨ã™ã‚‹é€šä¿¡ã‚·ã‚¹ãƒ†ãƒ 
を拒否しましょう。たとえ、あなたが自分の本名を使うとしても、そのシステãƒ
 ã¯ã»ã‹ã®äººã€…
にかれらのプライバシを諦める圧力となりますから。</p>
 
 <p>自己防衛が重要ですが、もっともé 
‘丈な自己防衛であったとしてもあなたのものではないシステãƒ
 
、で/から、プライバシを守るには不十分です。ほかの人と通信したり、都市を移動したりするとき、わたしたちのプライバシは社会のæ
…£ç¿’に依存します。通信や移動を監視するあるシステム
を避けることはできますが、すべてを避けることはできません。明らかに、すべてのこういったシステãƒ
 ã‚’(妥当な容疑がある場合以外は)人々
を監視しないように停止するのがもっともよい解決策です。</p>
+</div>
 
-<h3>プライバシのためにすべてのシステム
を設計しなければならない</h3>
+<h3 class="subheader">プライバシのためにすべてのシステム
を設計しなければならない</h3>
 
+<div class="columns">
 <p>全体監視社会を望まないのであれば、監視をå…
¬å®³ã®ä¸€ç¨®ã¨è€ƒãˆãªãã¦ã¯ãªã‚Šã¾ã›ã‚“。そして、それぞれの新しいディジタルシステãƒ
 
の監視の影響を限定しなくてはなりません。ちょうど、建築物の環境への影響を限定するように。</p>
 
 
<p>たとえば、電気の「スマート」メータは、通常のユーザと比較して使い方がどうかなど、個ã€
…の顧客の電気の使用についてのデータを刻々
と電力会社に送信するとして、勧誘されます。これは一般監視にもとづいて実è£
…されますが、監視は必
要ではありません。近隣の平均使用は全体使用を利用者
数で割算すれば電力会社は簡単に計算でき、メータに送信できます。個ã€
…
の顧客は任意の指定された期間で自分の使用を平均使用のパターンと比較できます。同じ利便性を監視なしでできるのです!</p>
 
 <p>すべてのわたしたちのディジタル・システム
で、このようなプライバシを設計する必要があります。</p>
+</div>
 
-<h3>データの集積に対する対策: 
まき散らしたままにする</h3>
+<h3 class="subheader">データの集積に対する対策: 
まき散らしたままにする</h3>
 
+<div class="columns">
 <p><a
 
name="dispersal">データをまき散らし続け、アクセスを難しくする</a>のが、プライバシに対するモニタリングから安å
…
¨ã«ã™ã‚‹æ–¹ç­–の一つです。古いスタイルのセキュリティ・カメラはプライバシに対するè„
…威ではありませんでした(<a
 href="#privatespace">*</a>)。記録は構内
に保存され、保管期限は最大でも数週間でした。こういった記録へのアクセスの不便から、大量に行われることはなく、犯罪として通å
 ±ã•ã‚ŒãŸå ´æ‰€ã 
けでアクセスされました。毎日数百万本のテープを物理的に集積し、視聴したりコピーすることは不可能でした。</p>
@@ -126,9 +152,11 @@
 
 <p><a
 
name="privatespace"><b>*</b></a>ここで、セキュリティカメラが店の中で、あるいは街角で向けられていることを、仮定しています。誰かのプライベートな空間にほかの誰かによって向けられているどんなカメラもプライバシを侵害しますが、これは別の問題です。</p>
+</div>
 
-<h3 
id="digitalcash">インターネット・コマースの監視の対策</h3>
+<h3 id="digitalcash" 
class="subheader">インターネット・コマースの監視の対策</h3>
 
+<div class="columns">
 <p>ほとんどのデータの集積は人々
自身のディジタルな活動から行われます。通常、データはまず会社によって集められます。しかし、プライバシと民主主義のè„
…
威について考える際、監視が直接に国によって行われるか、ビジネスにé
 
ã‘られるかには、違いがありません。なぜなら、会社によって集積されたデータはシステマチックに国に利用可能ã
 ã‹ã‚‰ã§ã™ã€‚</p>
 
 <p>PRISMを通じて、NSAは<a
@@ -148,9 +176,11 @@
 
 <p>サイトの個人情報の集積からのさらなる脅
威は、セキュリティ破壊者が侵å…
¥ã—、それを取得して悪用することです。顧客のクレジットカードの詳細がこれに含まれます。匿名の支払いシステãƒ
 ãŒã“の危険をおしまいにするかもしれません:
 
サイトのセキュリティ・ホールは、サイトがあなたについてなにも知らなければ、あなたを害することはできません。</p>
+</div>
 
-<h3>旅行の監視の対策</h3>
+<h3 class="subheader">旅行の監視の対策</h3>
 
+<div class="columns">
 
<p>わたしたちはディジタルの料金徴収を匿名支払い(たとえば、ディジタル現金を使って)に変換しなければいけません。車のナンバー認識システãƒ
 ã¯ã™ã¹ã¦ã®ãƒŠãƒ³ãƒãƒ¼ã‚’認識し、<a
 
href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm";>そのデータは期限なしに保管されます</a>。裁判所の命令による捜査の車のリストに載っているナンバーã
 
けの通知と記録にとどめるよう法律で要請されるべきです。それよりもセキュアでない代替はすべての車について、数日間ã
 ã‘ローカルに保管し、å…
¨éƒ¨ã®ãƒ‡ãƒ¼ã‚¿ã‚’インターネット上で利用可能とするのではない、というものです。そして、データへのアクセスは裁判所の令状にあるナンバーのリストに限って探索されるべきです。</p>
 
@@ -165,9 +195,11 @@
 
<p>ナビゲーション・サービスは監視を行います。ユーザのコンピュータは地図サービスにユーザの位置とどこへ行きたいかを伝え、サーバは経路を決めてユーザのコンピュータに送り返し、表示されます。今日では、サーバはおそらくユーザの位置を記録するでしょう。なにもそれを止めるものがないのですから。監視は本質的にはå¿
…
要ではなく、再設計で避けることができます。ユーザのコンピュータの自由ソフトウェアは適切な部分の地図データを(以前にそうしてなければ)ダウンロードし、経路を計算し、表示できます。ユーザがどこにいてどこに行きたいかを誰にも伝えることなく、です。</p>
 
 <p>自転車のレンタルのシステム
等は、自転車が貸与されたステーション内でだ
け、借りた人のアイデンティティが知られている、というように設計できます。貸出の際、すべてのステーションにどのステーションから「貸出中」となったかを伝えれば、ユーザがどのステーション(一般的には異なるステーション)に返却しても、そのステーションは、どこでいつ自転車が貸与されたかわかります。そして、å
…
ƒã®ã‚¹ãƒ†ãƒ¼ã‚·ãƒ§ãƒ³ã«è‡ªè»¢è»ŠãŒã€Œè²¸å‡ºä¸­ã€ã§ã¯ãªã„と伝えます。ユーザへの請求を計算し、ステーションの輪にそって、(ランダãƒ
 ãªåˆ†ã®é–“å¾…
った後に)本店に送ります。これで、本店はどのステーションから請求書が来たか分からないでしょう。いったんこれがなされれば、(自転車が)返却されたステーションは、トランザクションã
 
«ã¤ã„てすべて忘れるでしょう。自転車が長い間「貸出中」のままのå
 ´åˆã€è²¸ä¸Žã—たステーションは本店に伝えられます。このå 
´åˆã«ã¯ã€ã‚¹ãƒ†ãƒ¼ã‚·ãƒ§ãƒ³ã‹ã‚‰å€Ÿã‚ŠãŸäººã®ã‚¢ã‚¤ãƒ‡ãƒ³ãƒ†ã‚£ãƒ†ã‚£ãŒç›´ã¡ã«é€ã‚‰ã‚Œã‚‹ã§ã—ょう。</p>
+</div>
 
-<h3>通信の記録の対策</h3>
+<h3 class="subheader">通信の記録の対策</h3>
 
+<div class="columns">
 
<p>インターネットサービスプロバイダと電話会社はユーザとの契約で大量のデータ(ブラウズ、電話会話、そのほか)を保管しています。携帯電話では、<a
 
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>ユーザの物理的位置</a>まで記録しています。企業は、こういった記録を長い間保持します:
 AT&amp;Tの場合、30年以上です。すぐに、企業は<a
@@ -182,9 +214,11 @@
 
 
<p>誰と電子メールをやりとりしたかのプライバシは、単純な部分的な解決策は、あなたとほかの人が、あなた自身の政府と決して協力しないような国の電子メールサービスで、暗号を使ってそれぞれが通信する、というものです。しかし、Lader
 Levison(合衆国政府の監視が完å…
¨ã«è»¢è½ã•ã›ã‚ˆã†ã¨ã—たメールサービスLavabitのオーナー)はもっと洗練された暗号システãƒ
 
の考えを持っています。それでは、あなたの電子メールサービスは、わたしの電子メールサービスのあるユーザへあなたがメールを送った事ã
 
けがわかり、わたしの電子メールサービスは、あなたの電子メールサービスのあるユーザからわたしがメールを受け取ったことã
 
けがわかり、しかし、あなたがわたしにメールを送ったことを確定させるのは困難である、というシステãƒ
 ã§ã™ã€‚</p>
+</div>
 
-<h3>しかし、ある監視は必要だ</h3>
+<h3 class="subheader">しかし、ある監視は必要だ</h3>
 
+<div class="columns">
 <p>犯罪者を見つけ出すために国は、裁判所の命令のå…
ƒã€ç‰¹å®šã®çŠ¯ç½ªã‚‚しくは特定の計画されている犯罪の容疑を捜査できることがå¿
…
要です。インターネットでは電話の会話の傍受の権限は、インターネットの接続の傍受の権限に自然に拡張されるでしょう。幸運なことに、これは事後に告発è€
…
を見つけることを可能としないでしょう。もし、(わたしが推奨するように)わたしたちが事前に大量の書類を集積するディジタル・システãƒ
 ã‚’禁止すれば。</p>
 
 <p>警察のような国が与えた力を持つ個々
人は、代償としてプライバシの権利を差しだ
し、監督されねばされません。(実際、警察では自身の隠
語では、偽証が「<a
@@ -199,9 +233,10 @@
 
href="http://DefectiveByDesign.org";>DRM</a>)、もしくは政治的(たとえば、ロビーイング)な、社会の危険をもたらすであろうプロセスの詳細について、å
…¬å…±ã®ç¦ç¥‰ã«å¿…要とされるレベルでå…
¬é–‹ã—べし、と、ビジネスに課すことは妥当です。こういった行為の危険(BP社の原油流出事æ•
…
、福島の原子炉溶融、2008年の世界金融危機を考えてみてくã
 ã•ã„)は、テロリズムによる危険を小さく見せます。</p>
 
 <p>しかしながら、ジャーナリズム
は監視から守られるべきです。たとえ、それが、ビジネスの一部として実施されている時でも。</p>
+</div>
+<div class="column-limit"></div>
 
-<hr />
-
+<div class="reduced-width">
 
<p>ディジタル技術はわたしたちの運動、行動、そして通信の監視のレベルを膨大に増長させました。それは、1990年代にわたしたちが経験したよりもとても多く、そして1980年代の<a
 
href="https://hbr.org/2013/06/06/your-iphone-works-for-the-secret-police";>鉄のカーテンの向こうの人ã€
…
よりもとても多く</a>となっており、集積されたデータの国による使用に関して提案されている法的制限では、それを変えられないでしょう。</p>
 
@@ -209,6 +244,8 @@
 
href="https://www.theguardian.com/technology/2015/aug/10/internet-of-things-predictable-people";>人ã€
…
がどのように考えるか</a>に深刻な影響を与えることがありえます。このような可能性は計量不可能ですが、民主主義へのè„
…
威は憶測ではありません。それは現に有り、見えているのです。</p>
 
 <p>わたしたちの自由な国々
が重大な監視の不足によって以前に被害を被り、かつてソ連と東ドイツがそうであったよりも監視されるべきであるのでなければ、わたしたちはこの増åŠ
 ã‚’ひっくり返さなければなりません。これには、人々
についてのビッグデータの集積を止めることが必
要です。</p>
+</div>
+</div>
 
 <div class="translators-notes">
 
@@ -277,7 +314,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2016/10/31 04:28:15 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: surveillance-vs-democracy.ru.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.ru.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- surveillance-vs-democracy.ru.html   23 Oct 2016 10:58:35 -0000      1.24
+++ surveillance-vs-democracy.ru.html   6 Nov 2016 21:28:14 -0000       1.25
@@ -6,20 +6,33 @@
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Сколько слежки может выдержать 
демократия? - Проект GNU - Фонд свободного
 программного обеспечения</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+-->
+</style>
 
 <!-- GNUN: localize URL /graphics/dog.small.ru.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.ru.html" -->
-<h2>Сколько слежки может выдержать 
демократия?</h2>
+<h2 class="center">Сколько слежки может выдержать 
демократия?</h2>
 
-<p><a href="http://www.stallman.org/";>Ричард Столмен</a></p>
+<p class="byline center"><a href="http://www.stallman.org/";>Ричард 
Столмен</a></p>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
-<blockquote><p>Первая версия этой статьи была 
опубликована в октябре 2013&nbsp;года в
+<blockquote class="center"><p>Первая версия этой статьи 
была опубликована в октябре 2013&nbsp;года в
 &ldquo;Уайеред&rdquo;.</p></blockquote>
 
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.ru.jpg" alt="Карикатура: собака 
с удивлением смотрит на рекламу, 
выскочившую на экране ее
 компьютера" /></a>
@@ -35,7 +48,8 @@
 гарантированно не должны выходить? Это 
уровень, при превышении которого
 слежка начинает вмешиваться в 
функционирование демократии, когда
 осведомителей (таких как Сноуден), как 
правило, отлавливают.</p>
-
+</div>
+<div class="columns" style="clear:both">
 <p>В условиях государственной тайны мы, 
народ, зависим от возможности
 осведомителей <a
 href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";> 
рассказывать
@@ -67,9 +81,11 @@
 того, чтобы защитить осведомителей, если 
&ldquo;поимка осведомителя&rdquo;
 становится основанием для доступа к 
данным, позволяющим идентифицировать
 его. Нам нужно идти дальше.</p>
+</div>
 
-<h3>Верхний предел слежки при демократии</h3>
+<h3 class="subheader" style="clear: both">Верхний предел 
слежки при демократии</h3>
 
+<div class="columns">
 <p>Если осведомители не смеют пролить свет 
на преступления и ложь, мы теряем
 последний кусок фактического контроля над 
своим правительством и
 государственными учреждениями. Вот почему 
слежка, которая позволяет
@@ -99,9 +115,11 @@
 террористы. Точка, в которой слежка 
становится слишком велика&nbsp;&mdash;
 это точка, в которой государство может 
узнать, кто говорил с известным
 журналистом или известным диссидентом.</p>
+</div>
 
-<h3>Однажды собранными сведениями будут 
злоупотреблять</h3>
+<h3 class="subheader">Однажды собранными сведениями 
будут злоупотреблять</h3>
 
+<div  class="columns">
 <p>Когда люди признают, что уровень общей 
слежки слишком высок, само собой
 напрашивается предложить ограничения на 
доступ к собранным данным. Это
 звучит неплохо, но проблемы это не решит, 
ни на йоту, даже в предположении,
@@ -153,9 +171,11 @@
 массированную экспедицию для травли 
любого человека. Чтобы обезопасить
 журналистику и демократию, мы должны 
ограничить сбор данных, которые будут
 легко доступны государству.</p>
+</div>
 
-<h3>Стойкая защита личной жизни должна быть 
технической</h3>
+<h3 class="subheader">Стойкая защита личной жизни 
должна быть технической</h3>
 
+<div class="columns">
 <p>Фонд электронных рубежей и другие 
организации предлагают ряд юридических
 принципов, составленных для <a
 href="https://en.necessaryandproportionate.org/text";> 
предотвращения
@@ -182,9 +202,11 @@
 реализовывать слежку заново, и данные 
собирались бы только начиная с этого
 момента. Что касается приостановки 
действия или игнорирования этого закона,
 то эта идея едва ли имеет смысл.</p>
+</div>
 
-<h3>Во-первых, не быть дураками</h3>
+<h3 class="subheader">Во-первых, не быть дураками</h3>
 
+<div class="columns">
 <p>Чтобы у нас была конфиденциальность, мы 
не должны отбрасывать ее: первый,
 кто должен защищать вашу 
конфиденциальность&nbsp;&mdash; это вы. 
Избегайте
 идентифицировать себя на сайтах 
Интернета, связывайтесь с ними по Tor и
@@ -224,9 +246,11 @@
 избегать некоторых систем, которые 
отслеживают наши сообщения и перемещения,
 но не все их. Ясно, что лучше было бы 
заставить все эти системы прекратить
 слежку за людьми, за исключением законно 
подозреваемых.</p>
+</div>
 
-<h3>Каждую систему нужно проектировать с 
учетом конфиденциальности</h3>
+<h3 class="subheader">Каждую систему нужно 
проектировать с учетом 
конфиденциальности</h3>
 
+<div class="columns">
 <p>Если мы не хотим жить в обществе 
тотальной слежки, мы должны рассматривать
 слежку как своего рода социальное 
загрязнение и ограничивать вклад в слежку
 каждой новой цифровой системы точно так 
же, как мы ограничиваем воздействие
@@ -244,9 +268,11 @@
 же самое, только без слежки!</p>
 
 <p>Нам надо встраивать такую 
конфиденциальность во все наши цифровые 
системы.</p>
+</div>
 
-<h3>Мера против сбора данных: оставлять их 
рассредоточенными</h3>
+<h3 class="subheader">Мера против сбора данных: 
оставлять их рассредоточенными</h3>
 
+<div class="columns">
 <p><a name="dispersal"></a>Один из способов сделать 
наблюдение безопасным для
 конфиденциальности&nbsp;&mdash; оставлять 
данные  рассредоточенными, без
 удобного доступа. Старомодные камеры 
видеонаблюдения не представляли угрозы
@@ -278,9 +304,11 @@
 безопасности направлена в зал магазина 
или на улицу. Любая камера,
 направленная в чье-то личное пространство 
кем-то другим, вторгается в личную
 жизнь, но это другой вопрос.</p>
+</div>
 
-<h3 id="digitalcash">Меры против коммерческой 
слежки в Интернете</h3>
+<h3 id="digitalcash" class="subheader">Меры против 
коммерческой слежки в Интернете</h3>
 
+<div class="columns">
 <p>Большинство собираемых данных возникает 
в результате собственной цифровой
 деятельности людей. Обычно данные сначала 
собираются компаниями. Но когда
 речь идет об угрозе конфиденциальности и 
демократии, совершенно безразлично,
@@ -336,9 +364,11 @@
 том числе данными о кредитных картах 
клиентов. Система анонимных платежей
 покончила бы с этой угрозой: брешь в защите 
сайта не может повредить вам,
 когда сайт ничего о вас не знает.</p>
+</div>
 
-<h3>Меры против слежки за передвижениями</h3>
+<h3 class="subheader">Меры против слежки за 
передвижениями</h3>
 
+<div class="columns">
 <p>Мы должны преобразовать цифровые 
системы сбора платежей в анонимные
 (например, с помощью цифровой наличности). 
Системы распознавания номеров
 машин распознают все номера, и <a
@@ -391,9 +421,11 @@
 операции. Если единица остается 
&ldquo;занятой&rdquo; слишком долго,
 станция, на которой ее взяли, может 
проинформировать центр; в этом случае
 она могла бы немедленно сообщить о 
личности того, кто взял эту единицу.</p>
+</div>
 
-<h3>Меры против коммуникационных досье</h3>
+<h3 class="subheader">Меры против коммуникационных 
досье</h3>
 
+<div class="columns">
 <p>Поставщики услуг Интернета и телефонные 
компании хранят обширные сведения о
 контактах своих пользователей (просмотр 
страниц Интернета, телефонные вызовы
 и т.д.). Для сотовых телефонов они <a
@@ -433,9 +465,11 @@
 электронной почты было бы известно только 
то, что вы послали сообщение
 какому-то пользователю моей службы 
электронной почты, но было бы трудно
 определить, что вы послали сообщение мне.</p>
+</div>
 
-<h3>Но иногда слежка необходима</h3>
+<h3 class="subheader">Но иногда слежка необходима</h3>
 
+<div class="columns">
 <p>Для розыска преступников государству 
необходима возможность расследовать
 конкретные преступления или конкретные 
покушения по ордеру из суда. С
 приходом Интернета полномочие 
прослушивать телефонные переговоры 
естественно
@@ -473,9 +507,10 @@
 
 <p>Однако журналистику нужно защищать от 
наблюдения, даже если она ведется в
 ходе предпринимательской деятельности.</p>
+</div>
+<div class="column-limit"></div>
 
-<hr />
-
+<div class="reduced-width">
 <p>Цифровая техника принесла с собой 
умопомрачительный рост уровня слежки за
 нашими передвижениями, действиями и 
переговорами. Он гораздо выше уровня той
 слежки, которую мы испытывали на себе в 
девяностые годы XX&nbsp;века, <a
@@ -496,6 +531,8 @@
 нехватки слежки и должны быть под более 
строгим надзором, чем Советский Союз
 и Восточная Германия, нам нужно вернуть 
этот уровень на прежние позиции. Для
 этого требуется остановить массовый сбор 
данных о людях.</p>
+</div>
+</div>
 
 <div class="translators-notes">
 
@@ -571,7 +608,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2016/10/23 10:58:35 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: surveillance-vs-democracy.sq.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.sq.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- surveillance-vs-democracy.sq.html   1 Nov 2016 17:27:59 -0000       1.19
+++ surveillance-vs-democracy.sq.html   6 Nov 2016 21:28:14 -0000       1.20
@@ -6,19 +6,32 @@
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Sa Mbikëqyrje Mund të Përballojë Demokracia? - Projekti GNU - Free 
Software
 Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+-->
+</style>
 
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.sq.html" -->
-<h2>Sa Mbikëqyrje Mund të Përballojë Demokracia?</h2>
+<h2 class="center">Sa Mbikëqyrje Mund të Përballojë Demokracia?</h2>
 
-<p>nga <a href="http://www.stallman.org/";>Richard Stallman</a></p>
+<p class="byline center">nga <a href="http://www.stallman.org/";>Richard 
Stallman</a></p>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
-<blockquote><p>Një version i këtij artikulli u botua së pari në Wired, në 
Tetor 2013.</p></blockquote>
+<blockquote class="center"><p>Një version i këtij artikulli u botua së pari 
në Wired, në Tetor 2013.</p></blockquote>
 
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Karikaturë e një qeni që hap sytë 
i çuditur para tre reklamave që u shfaqën
 në ekranin e tij të kompjuterit..." /></a>
@@ -34,7 +47,8 @@
 duhet të sigurohemi të mos tejkalohet? Është niveli përtej të cilit
 mbikëqyrja fillon e plekset me funksionimin e demokracisë, pra kur
 nxjerrësit e sekreteve (të tillë si Snowden-i) ka shumë gjasa të 
zbulohen.</p>
-
+</div>
+<div class="columns" style="clear:both">
 <p>Të përballur me fshehtësinë e qeverive, ne populli varemi nga 
nxjerrësit e
 sekreteve <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";>të
 na rrëfejnë se çfarë po bën shteti</a>.  Por mbikëqyrja e sotme i tremb
@@ -64,9 +78,11 @@
 mjaftojë për të mbrojtur nxjerrësit e sekreteve, nëse &ldquo;kapja e
 nxjerrësit të sekreteve&rdquo; është përligjje për të patur akses të
 mjaftueshëm për identifikimin e tyre.  Na duhet të shkojmë më tej.</p>
+</div>
 
-<h3>Kufiri i Sipërm i Mbikëqyrjes në një Demokraci</h3>
+<h3 class="subheader" style="clear: both">Kufiri i Sipërm i Mbikëqyrjes në 
një Demokraci</h3>
 
+<div class="columns">
 <p>Nëse nxjerrësit e sekreteve nuk guxojnë të bëjnë të njohura krime dhe
 gënjeshtra, humbasim grimën e fundit të kontrollit të efektshëm mbi 
qeverinë
 dhe institucionet tona.  Ky është shpjegimi pse mbikëqyrja që i bën të
@@ -95,9 +111,11 @@
 qeverive të ShBA-ve, me pretekstin se mes tyre mund të ketë terroristë.
 Pika ku mbikëqyrja bëhet e tepruar është pika kur shteti mund të gjejë se
 kush ka folur me një gazetar të njohur ose me një disident të njohur.</p>
+</div>
 
-<h3>Informacioni, Pasi Mblidhet, Do Të Keqpërdoret</h3>
+<h3 class="subheader">Informacioni, Pasi Mblidhet, Do Të Keqpërdoret</h3>
 
+<div  class="columns">
 <p>Kur njerëzit e pranojnë se niveli i mbikëqyrjes së përgjithshme 
është shumë
 i lartë, përgjigja e parë është të propozojnë kufij për hyrjen në të 
dhënat
 e grumbulluara.  Kjo duket gjë e mirë, por nuk do ta zgjidhë problemin, as
@@ -150,9 +168,11 @@
 ekspedita masive peshkimi kundër cilitdo person.  Që gazetaria dhe
 demokracia të jenë të parrezikuara, na duhet të kufizojmë grumbullimin e 
të
 dhënave në të cilat shteti futet lehtësisht.</p>
+</div>
 
-<h3>Mbrojtja e Fuqishme Për Privatësinë Duhet Të Jetë Teknike</h3>
+<h3 class="subheader">Mbrojtja e Fuqishme Për Privatësinë Duhet Të Jetë 
Teknike</h3>
 
+<div class="columns">
 <p>Electronic Frontier Foundation dhe të tjera organizma propozojnë një grup
 parimesh ligjore të konceptuara për <a
 href="https://en.necessaryandproportionate.org/text";>parandalimin e
@@ -181,9 +201,11 @@
 e para mbikëqyrjen, dhe do të mblidhte të dhëna duke u nisur nga ajo datë.
 Sa për pezullimin ose shpërfilljen përkohësisht të këtij ligji, ideja 
zor se
 do të kish kuptim.</p>
+</div>
 
-<h3>Së Pari, Mos u Bëni të Marrë</h3>
+<h3 class="subheader">Së Pari, Mos u Bëni të Marrë</h3>
 
+<div class="columns">
 <p>Që të keni privatësi, nuk duhet ta hidhni tej: i pari që duhet të 
mbrojë
 privatësinë tuaj jeni ju vetë.  Shmangni identifikimin e vetes në sajte,
 përdorini ata përmes Tor-it, dhe përdorni shfletues që i bllokojnë skemat 
që
@@ -224,9 +246,11 @@
 gjithëve.  Pa mëdyshje, zgjidhja më e mirë është të bëhen tërë këta 
sisteme
 të reshtin mbikëqyrjen e njerëzve për krejt rastet e tjera, hiq ato për
 dyshime të përligjura.</p>
+</div>
 
-<h3>Çdo Sistem Duhet Ta Hartojmë Me Privatësinë Në Mendje</h3>
+<h3 class="subheader">Çdo Sistem Duhet Ta Hartojmë Me Privatësinë Në 
Mendje</h3>
 
+<div class="columns">
 <p>Nëse nuk duam një shoqëri mbikëqyrjeje tërësore, duhet ta 
konsiderojmë
 mbikëqyrjen një lloj ndotjeje sociale, dhe ta kufizojmë ndikimin e
 mbikëqyrjes prej çdo sistemi të ri dixhital po njësoj siç kufizojmë 
ndikimin
@@ -245,9 +269,11 @@
 mbikëqyrje!</p>
 
 <p>Na duhet të hartojmë të tillë privatësi në krejt sistemet tona 
dixhitale.</p>
+</div>
 
-<h3>Kurë për Grumbullimin e të Dhënave: Të Lihen të Hapërdara</h3>
+<h3 class="subheader">Kurë për Grumbullimin e të Dhënave: Të Lihen të 
Hapërdara</h3>
 
+<div class="columns">
 <p>Një rrugë për ta bërë mbikëqyrjen të parrezikshme për privatësinë 
është të
 <a name="dispersal">mbahen të dhënat të shpërndara dhe në mënyrë të 
tillë që
 hyrja në to të jetë e paleverdishme</a>.  Kamerat e dikurshme të sigurisë
@@ -282,9 +308,11 @@
 sigurisë sheh brenda një dyqani, ose mbi një rrugë. Cilado kamera e 
drejtuar
 mbi hapësirën private të dikujt, nga dikush tjetër, cenon privatësinë, 
por
 ky është problem tjetër.</p>
+</div>
 
-<h3 id="digitalcash">Kurë për Mbikëqyrje Internet Nga Tregtia</h3>
+<h3 id="digitalcash" class="subheader">Kurë për Mbikëqyrje Internet Nga 
Tregtia</h3>
 
+<div class="columns">
 <p>Shumica e të dhënave vjen nga veprimtaritë dixhitale të vetë njerëzve.
 Zakonisht të dhënat grumbullohen së pari nga kompanitë.  Por kur vjen fjala
 për kërcënimin e privatësisë dhe demokracisë, nuk ka dallim mes 
mbikëqyrjes
@@ -341,9 +369,11 @@
 keqpërdorin.  Kjo përfshin hollësi kartash krediti të konsumatorëve.  Një
 sistem pagesash anonime do t’i jepte fund këtij rreziku: një e çarë 
sigurie
 te sajti nuk do t’ju bënte dëm, nëse sajti nuk di asnjë gjë rreth 
jush.</p>
+</div>
 
-<h3>Kurë për Mbikëqyrjen e Udhëtimeve</h3>
+<h3 class="subheader">Kurë për Mbikëqyrjen e Udhëtimeve</h3>
 
+<div class="columns">
 <p>Duhet ta shndërrojmë mbledhjen e pagesave dixhitale të lidhura me 
udhëtimet
 në mbledhje pagesash anonime (duke përdorur para dixhitale, për shembull).
 Sistemet e leximit të targave regjistrojnë të tëra targat, dhe <a
@@ -399,9 +429,11 @@
 gjithçka rreth transaksionit.  Nëse një objekt mbetet &ldquo;i 
dhënë&rdquo;
 për një kohë të gjatë, stacioni nga u mor me qira mund të njoftojë 
qendrën;
 në këtë rast, mund ta dërgojë identitetin e qiramarrësit menjëherë.</p>
+</div>
 
-<h3>Kurë për Dosjet e Komunikimeve</h3>
+<h3 class="subheader">Kurë për Dosjet e Komunikimeve</h3>
 
+<div class="columns">
 <p>Mundësuesit e shërbimeve Internet dhe kompanitë telefonike ruajnë të 
dhëna
 të zgjeruara mbi kontaktet e përdoruesve të tyre (shfletim, thirrje
 telefonike, etj).  Me telefonat celularë, ata <a
@@ -443,9 +475,11 @@
 email do të dinte vetëm se unë kam marrë email prej një përdoruesi të
 shërbimit tuaj email, por do të ishte e vështirë të përcaktohej se 
email-in
 ma keni dërguar mua.</p>
+</div>
 
-<h3>Ca Mbikëqyrje Ama Është e Nevojshme</h3>
+<h3 class="subheader">Ca Mbikëqyrje Ama Është e Nevojshme</h3>
 
+<div class="columns">
 <p>Që shteti të gjejë keqbërësit, lypset të jetë në gjendje të 
hetojë krime
 specifike, ose dyshime për krime specifike të planifikuara, me një urdhër
 gjykate.  Me Internetin, aftësia për të përgjuar bashkëbisedimet 
telefonike
@@ -480,9 +514,10 @@
 
 <p>Sido që të jetë, gazetaria duhet të mbrohet nga mbikëqyrja edhe kur 
kryhet
 si pjesë e një biznesi.</p>
+</div>
+<div class="column-limit"></div>
 
-<hr />
-
+<div class="reduced-width">
 <p>Teknologjia dixhitale ka sjellë një rritje të tmerrshme të nivelit të
 mbikëqyrjes së lëvizjeve, veprimeve dhe komunikimeve tona.  Bëhet fjalë 
për
 shumë më tepër se sa patëm provuar në vitet ’90, dhe <a
@@ -503,6 +538,8 @@
 lira kanë vuajtur dikur nga deficite të rënda të mbikëqyrjes, dhe se duhej
 të përgjoheshin më shumë se sa qenë përgjuar Bashkimi Sovjetik dhe 
Gjermania
 Lindore.  Kjo lyp ndaljen e grumbullimit masiv të të dhënave rreth 
njerëzve.</p>
+</div>
+</div>
 
 <div class="translators-notes">
 
@@ -578,7 +615,7 @@
 <p class="unprintable"><!-- timestamp start -->
 U përditësua më:
 
-$Date: 2016/11/01 17:27:59 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: surveillance-vs-democracy.uk.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.uk.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- surveillance-vs-democracy.uk.html   24 Oct 2016 08:58:31 -0000      1.17
+++ surveillance-vs-democracy.uk.html   6 Nov 2016 21:28:14 -0000       1.18
@@ -3,7 +3,7 @@
  https://www.gnu.org/philosophy/po/surveillance-vs-democracy.uk.po</a>'
  --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/surveillance-vs-democracy.html"
  --><!--#set var="DIFF_FILE" 
value="/philosophy/po/surveillance-vs-democracy.uk-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2016-08-25" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/surveillance-vs-democracy.en.html" -->
+ --><!--#set var="OUTDATED_SINCE" value="2016-08-25" -->
 
 <!--#include virtual="/server/header.uk.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -557,7 +557,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Оновлено:
 
-$Date: 2016/10/24 08:58:31 $
+$Date: 2016/11/06 21:28:14 $
 
 <!-- timestamp end -->
 </p>

Index: po/right-to-read.ar.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ar.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- po/right-to-read.ar.po      18 Oct 2016 16:29:49 -0000      1.54
+++ po/right-to-read.ar.po      6 Nov 2016 21:28:14 -0000       1.55
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2011-01-21 13:51+0200\n"
 "Last-Translator: Hicham <address@hidden>\n"
 "Language-Team: Arabic <>\n"
@@ -52,7 +52,7 @@
 "<strong>Communications of the ACM</strong> (المجلد 40، رقم 2).</em> 
"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -61,7 +61,7 @@
 "مجموعة مقالات تتناول بدايات الثورة 
التحررية، نُشرت في مدينة القمر عام 2096."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -73,7 +73,7 @@
 "منتصف العام. لم تجرؤ على الطلب من أحد سوى 
دان."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -89,7 +89,7 @@
 "وخاطئ، تصرف لا يفعله إلا القراصنة."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -109,7 +109,7 @@
 "يكابد الصعاب لمنع وقوع الجريمة."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -129,7 +129,7 @@
 "تساعده أوراقه البحثية -إذا كثر الاستشهاد 
بها- في تسديد القرض). "
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -146,7 +146,7 @@
 "الوصول المجاني إلى المؤلفات العلمية أن 
تزول من الذاكرة."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -164,7 +164,7 @@
 "عام 2047، كان فرانك في السجن، لا لأجل قرصنة 
القراءة، بل لاستخدام المنقح."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -180,7 +180,7 @@
 "قانونية؛ وأرسل مطوروا المنقحات إلى السجن."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -193,7 +193,7 @@
 "استخدامه فيما عدا تدريبات الحصة."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "It was also possible to bypass the copyright monitors by installing a "
@@ -221,7 +221,7 @@
 "بها."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -233,7 +233,7 @@
 "طلبت منه المساعدة، فقد يعني هذا أنها تحبه 
أيضًا."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -247,7 +247,7 @@
 "بلّغت ليزا عنه."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -265,7 +265,7 @@
 "عليك. لقد افترضوا أنك تقوم بشيء ممنوع، ولا 
يهمهم معرفة ما هو."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -275,7 +275,7 @@
 "أنظمة الجامعة الحاسوبية، فيخفقون حتمًا في 
كل موادهم."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -289,7 +289,7 @@
 "من يُشك بهم."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -307,20 +307,20 @@
 "أبعدتهم يد SPA الممتدة. عندما بدأت ثورة تيخو 
عام 2062، أصبح حق القراءة "
 "العامة أحد ركائزها."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list "
 "about the dangers of e-books</a>."
 msgstr ""
 
 # type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 #, fuzzy
 #| msgid "Author's Note"
 msgid "Author's Notes"
 msgstr "تعليق المؤلف"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -330,7 +330,7 @@
 "philosophy/words-to-avoid.html#Piracy\">&ldquo;Piracy&rdquo;</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -339,14 +339,14 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "[This note has been updated several times since the first publication of "
@@ -357,7 +357,7 @@
 msgstr "[تم تحديت هذه الملاحظة عدة مرت منذ أول 
نشر للقصة..]"
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The right to read is a battle being fought today.  Although it may take "
@@ -390,7 +390,7 @@
 "تعليمات تتعلق بحقوق النشر عام 2001. يُعتبر ام
تلاك نسخة من برنامج DeCSS الحر "
 "لفك تعمية الديفيديات جريمة في فرنسا تحت 
قانون DADVSI الذي اعتمد عام 2006."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -401,7 +401,7 @@
 "these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -412,14 +412,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -429,7 +429,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -455,7 +455,7 @@
 "DefectiveByDesign.org\">دمّرها تصميمها</a>."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "One of the ideas in the story was not proposed in reality until 2002.  "
@@ -470,7 +470,7 @@
 "<abbr>FBI</abbr> ومايكروسوفت بكلمات سر الجذر على 
حواسيبك الشخصية وعدم "
 "إعطائها لك."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
@@ -478,7 +478,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -502,7 +502,7 @@
 "الذي يُمكّن مايكروسوفت (وأي موقع وب يتعاون 
مع مايكروسوفت) من التحكم الكامل بما "
 "يمكن للمستخدمه فعله بالحاسوب الذي يملكه."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -512,7 +512,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "When this story was first written, the SPA was threatening small Internet "
@@ -537,7 +537,7 @@
 "إلا أن SPA سحبت القضية لاحقًا، لكن DMCA أعطاهم 
القوة التي كانوا يسعون إليها."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The SPA, which actually stands for Software Publishers Association, has "
@@ -564,7 +564,7 @@
 "التخويفية في الأرجتنين إلى تهديدات ضمنية 
بانتهاك عرض من يتشارك البرمجيات. "
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -574,7 +574,7 @@
 "هذه الرسالة عند الدخول:"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -597,7 +597,7 @@
 "أو السلطات القانونية."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -605,11 +605,11 @@
 "إن هذا للالتزام رائع بالتعديل الرابع<sup><a 
href=\"#fourth\">3</a></sup>: "
 "اضغط على الجميع ليوافقوا مسبقا على 
التنازل عن كل حقوقهم تحته."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The battle for the right to read is already in progress, The enemy is "
@@ -624,7 +624,7 @@
 "والرقابة الإلكترونية. لقد بدأت المعركة 
الآن؛ هنا وصلتين لمقالتين عن التقنيات "
 "التي يجري تطويرها لحرمانك من حقك في 
القراءة."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -635,31 +635,31 @@
 "for rejecting the product completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -671,7 +671,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we want to stop the bad news and create some good news, we need to "
 "organize and fight.  Subscribe to the FSF's <a href=\"http://";
@@ -682,12 +682,12 @@
 msgstr ""
 
 # type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "مراجع"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -701,7 +701,7 @@
 "[sic] Rights (1995)</span>"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -712,7 +712,7 @@
 "Wired, Jan. 1996"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -720,7 +720,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -731,7 +731,7 @@
 "Private Data</a>, Washington Post, 4 Nov 1996"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.public-domain.org/\";>Union for the Public Domain</"
@@ -746,30 +746,19 @@
 "a>&mdash;منظمة تهدف إلى مقاومة واستعادة توسيع 
قوة حقوق النشر وبراءة الاختراع "
 "الزائد عن حده."
 
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"هذه النصيحة نُشرت في <a 
href=\"http://shop.fsf.org/product/free-software-free-";
-"society/\"><cite>مجتمع البرمجيات الحرة: نصائح م
نتقاة من ريتشارد إم. ستولمن</"
-"cite></a>."
-
 # type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "نصوص أخرى"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">فلسفة مشروع 
غنو</a>"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.computerworld.com/s/article/49358/";
@@ -784,6 +773,17 @@
 "Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">Copy Protection: Just "
 "Say No</a>، منشروة في Computer World."
 
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"هذه النصيحة نُشرت في <a 
href=\"http://shop.fsf.org/product/free-software-free-";
+"society/\"><cite>مجتمع البرمجيات الحرة: نصائح م
نتقاة من ريتشارد إم. ستولمن</"
+"cite></a>."
+
 # type: Content of: <div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>

Index: po/right-to-read.bg.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.bg.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- po/right-to-read.bg.po      18 Oct 2016 16:29:49 -0000      1.53
+++ po/right-to-read.bg.po      6 Nov 2016 21:28:14 -0000       1.54
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2009-10-28 15:33+0200\n"
 "Last-Translator: Yavor Doganov <address@hidden>\n"
 "Language-Team: Bulgarian <address@hidden>\n"
@@ -49,7 +49,7 @@
 "списанието <strong>Communications of the ACM</strong> (том 40, 
брой 2).</em>"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -59,7 +59,7 @@
 "през 2096 г."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -72,7 +72,7 @@
 "Дан, който тя да се осмели да помоли за 
това."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -90,7 +90,7 @@
 "пиратите правят."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -112,7 +112,7 @@
 "силите си да предотврати престъплението."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -137,7 +137,7 @@
 "заема си.)"
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -156,7 +156,7 @@
 "превърнали в далечен спомен."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -176,7 +176,7 @@
 "заради пиратско четене, а заради 
притежанието на дебъгер."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -194,7 +194,7 @@
 "дебъгерите били незаконни, а 
разработчиците им били пратени в затвора."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -210,7 +210,7 @@
 "университета."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "It was also possible to bypass the copyright monitors by installing a "
@@ -240,7 +240,7 @@
 "щяха да ти я дадат."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -253,7 +253,7 @@
 "значеше, че и тя го обича."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -268,7 +268,7 @@
 "Единственият начин да узнаят беше, ако 
Лиса докладва за него."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -289,7 +289,7 @@
 "какво точно е."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -300,7 +300,7 @@
 "неизменно се проваляха по всички 
предмети."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -315,7 +315,7 @@
 "вредни, а не просто тези, които 
предизвикват съмнение."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -336,20 +336,20 @@
 "на АПС.  Когато през 2062 г. се вдигна бунта 
на Тихо, всеобщото право да "
 "четеш скоро се превърна в една от 
основните му цели."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list "
 "about the dangers of e-books</a>."
 msgstr ""
 
 # type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 #, fuzzy
 #| msgid "Author's Note"
 msgid "Author's Notes"
 msgstr "Бележка на автора"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -359,7 +359,7 @@
 "philosophy/words-to-avoid.html#Piracy\">&ldquo;Piracy&rdquo;</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -368,13 +368,13 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid "This note was updated in 2007."
 msgid ""
@@ -383,7 +383,7 @@
 msgstr "Тази бележка бе обновена през 2007 г."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The right to read is a battle being fought today.  Although it may take "
@@ -419,7 +419,7 @@
 "през 2006 г., самото притежание на копие на 
DeCSS (свободната програма за "
 "дешифриране на видео на DVD), е 
престъпление."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -430,7 +430,7 @@
 "these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -441,14 +441,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -458,7 +458,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -486,7 +486,7 @@
 "DefectiveByDesign.org\">DefectiveByDesign.org</a>."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "One of the ideas in the story was not proposed in reality until 2002.  "
@@ -500,7 +500,7 @@
 "Идеята, че <abbr>ФБР</abbr> и „Майкрософт“ ще 
държат най-важните пароли на "
 "персоналните компютри и няма да ви ги 
дават, не бе предложена до 2002 г."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
@@ -508,7 +508,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -534,7 +534,7 @@
 "сайтове, които си кооперират с тях, 
неограничен контрол върху това какво "
 "потребителя може да прави със собствения 
си компютър."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -544,7 +544,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "When this story was first written, the SPA was threatening small Internet "
@@ -571,7 +571,7 @@
 "който им даваше властта, която искаха."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The SPA, which actually stands for Software Publishers Association, has "
@@ -601,7 +601,7 @@
 "\"#TransNote7\">7</a></sup>."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -612,7 +612,7 @@
 "следното съобщение при свързване:"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -639,7 +639,7 @@
 "органи.“"
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -648,11 +648,11 @@
 "САЩ<sup><a href=\"#TransNote8\">8</a></sup>: притискай 
повечето хора "
 "предварително да се откажат от правата си 
по нея."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The <a href=\"#AuthorsNote\">author's note</a> talks about the battle for "
@@ -668,7 +668,7 @@
 "започва сега, а ето и връзки към две 
статии, за технологии, които се "
 "разработват в момента, за да ви отнемат 
правото да четете."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -679,31 +679,31 @@
 "for rejecting the product completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -715,7 +715,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we want to stop the bad news and create some good news, we need to "
 "organize and fight.  Subscribe to the FSF's <a href=\"http://";
@@ -726,12 +726,12 @@
 msgstr ""
 
 # type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Препратки"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "The administration's &ldquo;White Paper&rdquo;: Information "
@@ -749,7 +749,7 @@
 "Доклад на работната група за правата на 
интелектуална собственост (1995)."
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -760,7 +760,7 @@
 "Самуелсън, сп. Wired, януари 1996 г."
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -768,7 +768,7 @@
 "<a 
href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Продадено</a>, 
"
 "Джеймс Бойл, в. „Ню Йорк Таймс“, 31 март 1996 
г."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -776,7 +776,7 @@
 msgstr ""
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.public-domain.org/\";>Union for the Public Domain</"
@@ -792,30 +792,19 @@
 "се противопоставя и се опитва да намали 
прекомерното увеличаване на властта "
 "на авторското право и патентите."
 
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Това есе е публикувано в книгата <a 
href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Свободен софтуер, 
свободно общество: избрани "
-"есета от Ричард М. Столман</cite></a>."
-
 # type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Други текстове за четене"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">Философията на 
проекта GNU</a>"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.computerworld.com/s/article/49358/";
@@ -830,6 +819,17 @@
 "Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">Защита срещу 
копиране: "
 "просто кажи „не“</a>, публикувано в Computer 
World."
 
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Това есе е публикувано в книгата <a 
href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Свободен софтуер, 
свободно общество: избрани "
+"есета от Ричард М. Столман</cite></a>."
+
 # type: Content of: <div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>

Index: po/right-to-read.ca.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ca.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- po/right-to-read.ca.po      18 Oct 2016 16:29:49 -0000      1.72
+++ po/right-to-read.ca.po      6 Nov 2016 21:28:14 -0000       1.73
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: right-to-read.ca\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-09-18 13:01+0200\n"
 "Last-Translator: Miquel Puigpelat <address@hidden>\n"
 "Language-Team: Catalan\n"
@@ -46,7 +46,7 @@
 "<cite>Communications of the ACM</cite> (Volum 40, Número 2).</em>"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -55,7 +55,7 @@
 "antecedents de la Revolució Lunària, publicat a Luna City el 2096."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -68,7 +68,7 @@
 "semestral. No gosava demanar-lo a ningú, tret d'en Dan."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -85,7 +85,7 @@
 "estava malament i era lleig, una cosa que només feien els pirates."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -108,7 +108,7 @@
 "delicte."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -133,7 +133,7 @@
 "sovint, li reportarien ingressos suficients per tornar el préstec)."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -152,7 +152,7 @@
 "eren un vague record."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -173,7 +173,7 @@
 "programari."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -191,7 +191,7 @@
 "il·legals i els desenvolupadors de depuradors van acabar a la presó."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -205,7 +205,7 @@
 "especial perquè només es pogués fer servir per als exercicis de classe."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It was also possible to bypass the copyright monitors by installing a "
 "modified system kernel.  Dan would eventually find out about the free "
@@ -224,7 +224,7 @@
 "informació."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -238,7 +238,7 @@
 "dir que ella també n'estava enamorada."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -254,7 +254,7 @@
 "denunciava."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -277,7 +277,7 @@
 "es tractava."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -288,7 +288,7 @@
 "de manera que inevitablement suspenien totes les assignatures."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -304,7 +304,7 @@
 "aixecaven sospites."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -325,7 +325,7 @@
 "Tycho, el dret universal a llegir es va convertir ràpidament en un dels seus 
"
 "objectius centrals."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing "
@@ -338,11 +338,11 @@
 "nostra llista de correu sobre els perills dels llibres electrònics</a>."
 
 # type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr "Notes de l'autor"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -359,7 +359,7 @@
 "<a href=\"/philosophy/words-to-avoid.html#Piracy\">&ldquo;Pirateria&rdquo;</"
 "a>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -373,14 +373,14 @@
 "Software Foundation ha iniciat la campanya <a href=\"http://";
 "DefectiveByDesign.org\">Defective by Design</a>.  Demanem el vostre suport. "
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The following note has been updated several times since the first "
 "publication of the story."
@@ -389,7 +389,7 @@
 "del conte."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The battle for the right to read is already being fought.  Although it may "
 "take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -411,7 +411,7 @@
 "delicte.  El 2001 la Unió Europea va imposar restriccions similars en una "
 "directiva sobre el copyright, tot i que de manera menys forta."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -430,7 +430,7 @@
 "salten la DRM és una de les moltes polítiques injustes que aquests tractats 
"
 "imposen en una àmplia varietat de camps."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
@@ -460,7 +460,7 @@
 "als seus representants al congrés rebutjar l'intent d'aprovar el TPP "
 "aprofitant el període d'interinitat posterior a les eleccions de 2016."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
@@ -470,7 +470,7 @@
 "indústria del copyright; està a punt d'aprovar un sistema DRM com a part "
 "oficial de les especificacions web."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "Nonfree software tends to have <a href=\"/proprietary/\">abusive features "
@@ -491,7 +491,7 @@
 "un programa no lliure</a>.  Hem d'insistir en el programari lliure, i "
 "rebutjar els programes no lliures."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "With Windows Vista, Microsoft admitted it had built in a back door: "
@@ -517,7 +517,7 @@
 "els usuaris no poden eludir."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "One of the ideas in the story was not proposed in reality until 2002.  This "
 "is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -528,7 +528,7 @@
 "sistema dels ordenadors personals, sense permetre que els usuaris les "
 "tinguin."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
@@ -540,7 +540,7 @@
 "segura&rdquo;. "
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "What Microsoft keeps is not exactly a password in the traditional sense; no "
 "person ever types it on a terminal.  Rather, it is a signature and "
@@ -561,7 +561,7 @@
 "malware-microsoft.html\">informa a l'Agència National de Seguretat dels "
 "errors de seguretat de Windows</a> per a què els exploti."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -577,7 +577,7 @@
 "això <em>arrancada restringida</em>."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "In 1997, when this story was first published, the SPA was threatening small "
 "Internet service providers, demanding they permit the SPA to monitor all "
@@ -596,7 +596,7 @@
 "la llei DMCA, que els donà el poder que cercaven."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The SPA, which actually stands for Software Publishers Association, has been "
 "replaced in its police-like role by the Business Software Alliance.  The BSA "
@@ -616,7 +616,7 @@
 "dient-los que serien violats a la presó."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -627,7 +627,7 @@
 "de Chicago mostren aquest missatge quan l'usuari obre una sessió:"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -653,7 +653,7 @@
 "autoritats universitàries o a les forces de seguretat\"."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -662,11 +662,11 @@
 "Constitució dels EUA: obligar els usuaris a renunciar, per endavant, als "
 "drets que s'hi reconeixen."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "Males notícies"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The battle for the right to read is already in progress, The enemy is "
@@ -678,7 +678,7 @@
 "La batalla per dret a llegir ja ha començat. L'enemic s'ha organitzat, i "
 "nosaltres no, de manera que avança en contra nostra."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "Today's commercial ebooks <a href=\"/philosophy/the-danger-of-ebooks.html"
@@ -706,7 +706,7 @@
 "orwellianes</a> demostrades.  Qualsevol d'elles és suficient per rebutjar "
 "completament el producte:"
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
@@ -716,11 +716,11 @@
 "quina pàgina es troba, i sobre quan subratlla text i qualsevol nota que "
 "introdueixi."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr "Incorpora DRM, amb la intenció d'impedir als usuaris compartir 
còpies."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
@@ -729,7 +729,7 @@
 "qualsevol llibre. L'any 2009 va esborrar milers de còpies de 1984, de George 
"
 "Orwell."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
@@ -739,7 +739,7 @@
 "amb la qual Amazon pot canviar remotament el programari, i introduir "
 "qualsevol altra funcionalitat repugnant."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "Amazon's e-book distribution is oppressive, too.  It identifies the user "
@@ -765,7 +765,7 @@
 "així, el mal menor seria ignorar-lo i compartir còpies igualment. No "
 "obstant, per ser completament honestos, no hauríem d'acceptar-lo 
prèviament."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "If we want to stop the bad news and create some good news, we need to "
@@ -789,12 +789,12 @@
 "finançar les nostres activitats."
 
 # type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Referències"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -807,7 +807,7 @@
 "Intellectual Property Rights (1995)."
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -818,7 +818,7 @@
 "Wired, gener de 1996"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -826,7 +826,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 de març de 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -837,7 +837,7 @@
 "Private Data</a>, Washington Post, 4 de novembre de 1996."
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"https://web.archive.org/web/20151113122141/http://public-domain.";
 "org/\">Union for the Public Domain</a>&mdash;an organization which aims to "
@@ -848,30 +848,19 @@
 "objectiu frenar i invertir l'ampliació desmesurada del poder del copyright i 
"
 "de les patents."
 
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Aquest assaig s'ha publicat al llibre <a href=\"http://shop.fsf.org/product/";
-"free-software-free-society/\"><cite>Free Software, Free Society: The "
-"Selected Essays of Richard M. Stallman</cite></a>."
-
 # type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Altres texts per llegir"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">Filosofia del Projecte GNU</a>"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.computerworld.com/article/2596679/networking/copy-";
 "protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -881,6 +870,17 @@
 "protection--just-say-no.html\" id=\"copy-protection\">Protecció anticòpia: "
 "simplement digues no</a>, publicat a Computer World."
 
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Aquest assaig s'ha publicat al llibre <a href=\"http://shop.fsf.org/product/";
+"free-software-free-society/\"><cite>Free Software, Free Society: The "
+"Selected Essays of Richard M. Stallman</cite></a>."
+
 # type: Content of: <div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>

Index: po/right-to-read.cs-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.cs-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- po/right-to-read.cs-diff.html       18 Oct 2016 16:29:49 -0000      1.28
+++ po/right-to-read.cs-diff.html       6 Nov 2016 21:28:14 -0000       1.29
@@ -15,32 +15,69 @@
 &lt;title&gt;The Right to Read
 - GNU Project - Free Software <span class="removed"><del><strong>Foundation 
(FSF)&lt;/title&gt;</strong></del></span> <span 
class="inserted"><ins><em>Foundation&lt;/title&gt;
 &lt;style type="text/css" media="print,screen"&gt;&lt;!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns &gt; p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --&gt;&lt;/style&gt;</em></ins></span>
 &lt;!--#include <span 
class="removed"><del><strong>virtual="/server/banner.html"</strong></del></span>
 <span 
class="inserted"><ins><em>virtual="/philosophy/po/right-to-read.translist"</em></ins></span>
 --&gt;
 &lt;!--#include <span 
class="removed"><del><strong>virtual="/philosophy/po/right-to-read.translist"</strong></del></span>
 <span 
class="inserted"><ins><em>virtual="/server/banner.html"</em></ins></span> --&gt;
-&lt;h2&gt;The Right to Read&lt;/h2&gt;
+<span class="removed"><del><strong>&lt;h2&gt;The</strong></del></span>
+<span class="inserted"><ins><em>&lt;h2 class="center"&gt;The</em></ins></span> 
Right to Read&lt;/h2&gt;
 
-&lt;p&gt;
+<span class="removed"><del><strong>&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p class="byline 
center"&gt;</em></ins></span>
 by &lt;a href="http://www.stallman.org/"&gt;&lt;strong&gt;Richard 
Stallman&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;div style="text-align: center; 
font-size: 110%;text-shadow: 0 0 0.2em #fff; width: 300px; float: right; 
margin: 12px; background-color: #a0f112; color: #353831; padding: 
1em;"&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of 
eBooks&lt;/a&gt;.&lt;/div&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;div style="text-align: center; 
font-size: 110%;text-shadow: 0 0 0.2em #fff; width: 300px; float: right; 
margin: 12px; background-color: #a0f112; color: #353831; padding: 
1em;"&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of eBooks&lt;/a&gt;.&lt;/div&gt;
 
-&lt;p&gt;
+&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;p class="center"&gt;</em></ins></span>
 &lt;em&gt;This article appeared in the February 1997 issue
 of <span 
class="removed"><del><strong>&lt;strong&gt;Communications</strong></del></span> 
<span class="inserted"><ins><em>&lt;cite&gt;Communications</em></ins></span> of 
the <span class="removed"><del><strong>ACM&lt;/strong&gt;</strong></del></span> 
<span class="inserted"><ins><em>ACM&lt;/cite&gt;</em></ins></span> (Volume 40, 
Number
 2).&lt;/em&gt;&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;hr /&gt;</em></ins></span>
 
-&lt;blockquote&gt;&lt;p&gt;
+<span 
class="removed"><del><strong>&lt;blockquote&gt;&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;hr class="thin" /&gt;
+
+&lt;div class="article"&gt;
+&lt;blockquote class="info center"&gt;&lt;p&gt;</em></ins></span>
             From &lt;cite&gt;The Road To Tycho&lt;/cite&gt;, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 &lt;/p&gt;&lt;/blockquote&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -76,7 +113,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -120,7 +160,10 @@
 knowing your computer's root password.  And neither
 the <span class="removed"><del><strong>&lt;abbr title="Federal Bureau of 
Investigation"&gt;FBI&lt;/abbr&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI</em></ins></span> nor
 Microsoft Support would tell you that.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -157,7 +200,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -172,8 +218,9 @@
 <span class="removed"><del><strong>&lt;h3 id="AuthorsNote"&gt;Author's 
Note&lt;/h3&gt;
 
 &lt;p&gt;[This</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;div class="announcement"&gt;
+&lt;div class="announcement"&gt;
 &lt;blockquote&gt;
 &lt;p&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of e-books&lt;/a&gt;.&lt;/p&gt;
 &lt;/blockquote&gt;
@@ -182,35 +229,46 @@
 &lt;div id="AuthorsNote"&gt;
 &lt;h3&gt;Author's Notes&lt;/h3&gt;
 
-&lt;ul&gt;
-&lt;li&gt;This story is supposedly a historical article that will be written in
+&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p&gt;This story is supposedly a historical article that will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it forwards into something more visibly
 oppressive. See &lt;a
 
href="/philosophy/words-to-avoid.html#Piracy"&gt;&ldquo;Piracy&rdquo;&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
+&lt;div class="reduced-width"&gt;
 &lt;p&gt;Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the &lt;a href="http://DefectiveByDesign.org"&gt;Defective by
 Design&lt;/a&gt; campaign.  We ask for your support.&lt;/p&gt;
-&lt;/li&gt;
 
-&lt;li&gt;
 &lt;p&gt;The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 &lt;/li&gt;
+&lt;/ul&gt;
 
-&lt;li&gt;
+&lt;blockquote class="info center"&gt;
 &lt;p&gt;The following</em></ins></span> note has been updated several times 
since the first
-publication of the <span 
class="removed"><del><strong>story.]&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>story.&lt;/p&gt;</em></ins></span>
+publication of the <span 
class="removed"><del><strong>story.]&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>story.&lt;/p&gt;
+&lt;/blockquote&gt;
 
+&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The <span class="inserted"><ins><em>battle for the</em></ins></span> right to 
read is <span class="removed"><del><strong>a battle</strong></del></span> <span 
class="inserted"><ins><em>already</em></ins></span> being <span 
class="removed"><del><strong>fought today.</strong></del></span> <span 
class="inserted"><ins><em>fought.</em></ins></span>  Although it
 may take 50 years for our <span class="removed"><del><strong>present way of 
life</strong></del></span> <span class="inserted"><ins><em>past 
freedoms</em></ins></span> to fade into obscurity, most
@@ -223,40 +281,39 @@
 <span class="inserted"><ins><em>computer-enforced restrictions 
known</em></ins></span> as <span 
class="removed"><del><strong>well).</strong></del></span> <span 
class="inserted"><ins><em>DRM, by making the
 distribution of programs that can break DRM a crime.</em></ins></span>  The 
European
 Union imposed similar restrictions in a 2001 copyright <span 
class="removed"><del><strong>directive.  In France, under the DADVSI law
-adopted</strong></del></span> <span 
class="inserted"><ins><em>directive,</em></ins></span> in <span 
class="removed"><del><strong>2006, mere possession of a copy of DeCSS, the free 
program
-to decrypt video on a DVD, is a crime.&lt;/p&gt;
+adopted</strong></del></span> <span 
class="inserted"><ins><em>directive,</em></ins></span> in <span 
class="removed"><del><strong>2006, mere possession of</strong></del></span> a 
<span class="removed"><del><strong>copy of DeCSS, the free program
+to decrypt video on a DVD, is a crime.&lt;/p&gt;</strong></del></span>
+<span class="inserted"><ins><em>form not quite as 
strong.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;
-In 2001, Disney-funded Senator Hollings proposed a bill called the
-SSSCA that would require every new computer to have mandatory
-copy-restriction facilities that the user cannot bypass.  Following
-the Clipper chip and similar US government key-escrow proposals, this
-shows</strong></del></span> a <span class="removed"><del><strong>long-term 
trend: computer systems are increasingly set up to
-give absentees with clout control over the people actually using the
+<span class="removed"><del><strong>In 2001, Disney-funded Senator Hollings 
proposed a bill called the
+SSSCA that would require every new computer</strong></del></span>
+<span class="inserted"><ins><em>The US campaigns</em></ins></span> to <span 
class="removed"><del><strong>have mandatory
+copy-restriction facilities that</strong></del></span> <span 
class="inserted"><ins><em>impose such rules on</em></ins></span> the <span 
class="removed"><del><strong>user cannot bypass.  
Following</strong></del></span> <span class="inserted"><ins><em>rest 
of</em></ins></span> the <span class="removed"><del><strong>Clipper chip and 
similar US government key-escrow proposals, this
+shows</strong></del></span> <span class="inserted"><ins><em>world through
+so-called &ldquo;free trade&rdquo; treaties.
+&lt;a href="https://stallman.org/business-supremacy-treaties.html"&gt;
+Business-supremacy treaties&lt;/a&gt; is</em></ins></span> a <span 
class="removed"><del><strong>long-term trend: computer 
systems</strong></del></span> <span class="inserted"><ins><em>more fitting term 
for them, since
+they</em></ins></span> are <span class="removed"><del><strong>increasingly set 
up</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to give <span 
class="removed"><del><strong>absentees with clout control</strong></del></span> 
<span class="inserted"><ins><em>business dominion</em></ins></span> over <span 
class="removed"><del><strong>the people actually using the
 computer system.  The SSSCA was later renamed to the unpronounceable
-CBDTPA, which was glossed</strong></del></span>
-<span class="inserted"><ins><em>form not quite</em></ins></span> as <span 
class="removed"><del><strong>the &ldquo;Consume But Don't Try
+CBDTPA, which was glossed as the &ldquo;Consume But Don't Try
 Programming Act&rdquo;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>strong.&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;
 
-&lt;p&gt;
-The <span class="removed"><del><strong>Republicans took control of the US 
senate shortly thereafter.
+&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>nominally 
democratic
+states.</em></ins></span>  The <span class="removed"><del><strong>Republicans 
took control</strong></del></span> <span class="inserted"><ins><em>DMCA's 
policy</em></ins></span> of <span class="removed"><del><strong>the US senate 
shortly thereafter.
 They are less tied to Hollywood than the Democrats, so they did not
-press these proposals.  Now that the Democrats are back in control,
+press these proposals.  Now</strong></del></span> <span 
class="inserted"><ins><em>criminalizing programs</em></ins></span> that <span 
class="removed"><del><strong>the Democrats are back in control,
 the danger is once again higher.&lt;/p&gt;
 
 &lt;p&gt;
-In 2001 the</strong></del></span> US <span class="removed"><del><strong>began 
attempting to use the proposed Free Trade Area of
-the Americas (FTAA) treaty</strong></del></span> <span 
class="inserted"><ins><em>campaigns</em></ins></span> to impose <span 
class="removed"><del><strong>the same</strong></del></span> <span 
class="inserted"><ins><em>such</em></ins></span> rules on <span 
class="removed"><del><strong>all the countries in</strong></del></span> the 
<span class="removed"><del><strong>Western Hemisphere.  The FTAA is 
one</strong></del></span> <span 
class="inserted"><ins><em>rest</em></ins></span> of the <span 
class="inserted"><ins><em>world through</em></ins></span>
-so-called <span class="removed"><del><strong>free
-trade treaties, which</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;free trade&rdquo; treaties.
-&lt;a href="https://stallman.org/business-supremacy-treaties.html"&gt;
-Business-supremacy treaties&lt;/a&gt; is a more fitting term for them, since
-they</em></ins></span> are <span 
class="removed"><del><strong>actually</strong></del></span> designed to give 
business
-<span class="removed"><del><strong>increased power</strong></del></span> <span 
class="inserted"><ins><em>dominion</em></ins></span> over <span 
class="inserted"><ins><em>nominally</em></ins></span> democratic <span 
class="removed"><del><strong>governments; imposing laws like the
-DMCA</strong></del></span>
-<span class="inserted"><ins><em>states.  The DMCA's policy of criminalizing 
programs that
-break DRM</em></ins></span> is <span 
class="removed"><del><strong>typical</strong></del></span> <span 
class="inserted"><ins><em>one</em></ins></span> of <span 
class="removed"><del><strong>this spirit.  The FTAA was effectively killed by
+In 2001 the US began attempting to use the proposed Free Trade Area of
+the Americas (FTAA) treaty to impose the same rules on all the countries in
+the Western Hemisphere.  The FTAA</strong></del></span>
+<span class="inserted"><ins><em>break DRM</em></ins></span> is one of <span 
class="removed"><del><strong>the so-called free
+trade treaties, which are actually designed to give business
+increased power over democratic governments; imposing laws like the
+DMCA is typical of this spirit.  The FTAA was effectively killed by
 Lula, President</strong></del></span> <span class="inserted"><ins><em>many 
unjust policies that these treaties impose
 across a wide range</em></ins></span> of <span 
class="removed"><del><strong>Brazil, who rejected the DMCA requirement and
 others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>fields.&lt;/p&gt;</em></ins></span>
@@ -279,23 +336,33 @@
 Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
-&lt;p&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p class="emph-box"&gt;
 Nonfree software tends to have &lt;a href="/proprietary/"&gt;abusive
 features of many kinds&lt;/a&gt;, which lead to the conclusion that
 &lt;a href="/philosophy/free-software-even-more-important.html"&gt;you can
 never trust a nonfree program&lt;/a&gt;.  We must insist on free (libre)
 software only, and reject nonfree programs.&lt;/p&gt;
 
-&lt;p&gt;
+&lt;p class="inline-block"&gt;
 With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span 
class="removed"><del><strong>2003.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
 downgrades.  It can also order all machines running Vista to refuse to
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
-10 is no better&lt;/p&gt;</em></ins></span>
+10 is no better&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the <span 
class="removed"><del><strong>&lt;abbr&gt;FBI&lt;/abbr&gt;</strong></del></span> 
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep 
the
@@ -318,14 +385,15 @@
 sense; no person ever types it on a terminal.  Rather, it is a
 signature and encryption key that corresponds to a second key stored
 in your computer.  This enables Microsoft, and potentially any web
-sites that cooperate with Microsoft, the ultimate control over what
-the user can do on <span 
class="removed"><del><strong>his</strong></del></span> <span 
class="inserted"><ins><em>per</em></ins></span> own <span 
class="removed"><del><strong>computer.&lt;/p&gt;
+sites that <span class="removed"><del><strong>cooperate with Microsoft, the 
ultimate control over what
+the user can do on his own computer.&lt;/p&gt;
 
 &lt;p&gt;
-Vista also gives Microsoft additional powers; for 
instance,</strong></del></span> <span 
class="inserted"><ins><em>computer.</em></ins></span>  Microsoft
-<span class="removed"><del><strong>can forcibly install upgrades, and it can 
order all machines running
+Vista also gives Microsoft additional powers; for instance, Microsoft
+can forcibly install upgrades, and it can order all machines running
 Vista to refuse to run a certain device driver.  The main purpose of
-Vista's many restrictions</strong></del></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> to <span 
class="removed"><del><strong>impose DRM (Digital Restrictions
+Vista's many restrictions</strong></del></span> <span 
class="inserted"><ins><em>cooperate with Microsoft, the ultimate control over 
what
+the user can do on per own computer.  Microsoft</em></ins></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> to <span 
class="removed"><del><strong>impose DRM (Digital Restrictions
 Management)</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> that <span 
class="removed"><del><strong>users can't overcome.  The 
threat</strong></del></span>
 <span class="inserted"><ins><em>control on behalf</em></ins></span> of <span 
class="removed"><del><strong>DRM is why we
 have established</strong></del></span> the <span class="inserted"><ins><em>FBI 
when asked: it
@@ -341,7 +409,12 @@
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this &lt;em&gt;restricted
 boot&lt;/em&gt;.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;
 &lt;p&gt;
 In 1997, when</em></ins></span> this story was first <span 
class="removed"><del><strong>written,</strong></del></span> <span 
class="inserted"><ins><em>published,</em></ins></span> the SPA was
 threatening small Internet service providers, demanding they permit
@@ -359,8 +432,13 @@
 reminiscent of the erstwhile Soviet Union, it invites people to inform
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;</em></ins></span>
+software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="reduced-width"&gt;</em></ins></span>
 &lt;p&gt;
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -382,12 +460,15 @@
 &lt;p&gt;
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;/li&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;/li&gt;
 &lt;/ul&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 &lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="BadNews"&gt;Bad News&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The battle for the right to read is <span class="removed"><del><strong>already 
in progress,</strong></del></span> <span class="inserted"><ins><em>going 
against us so far.</em></ins></span>
 The enemy is organized, <span 
class="removed"><del><strong>while</strong></del></span> <span 
class="inserted"><ins><em>and</em></ins></span> we are <span 
class="removed"><del><strong>not, so it is going against us.
@@ -402,47 +483,47 @@
 <span class="inserted"><ins><em>e-books</em></ins></span> &lt;a 
href="/philosophy/the-danger-of-ebooks.html"&gt; abolish
 readers' traditional <span 
class="removed"><del><strong>freedoms.&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="http://www.nature.com/nature_education/biology.html"&gt;
-     A "biology textbook" web site&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>freedoms&lt;/a&gt;.  Amazon's e-book reader product,
+     A "biology textbook" web site&lt;/a&gt; that you can access 
only</strong></del></span> <span class="inserted"><ins><em>freedoms&lt;/a&gt;.  
Amazon's e-book reader product,
 which I call the &ldquo;Amazon Swindle&rdquo; because it's designed to
 swindle readers out of the traditional freedoms of readers of books,
-is run by software with several
-demonstrated &lt;a href="/proprietary/malware-kindle-swindle.html"&gt;Orwellian
+is run</em></ins></span> by <span class="removed"><del><strong>signing
+     a</strong></del></span> <span class="inserted"><ins><em>software with 
several
+demonstrated</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nature.com/principles/viewTermsOfUse"&gt;
+     contract not to lend</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-kindle-swindle.html"&gt;Orwellian
 functionalities&lt;/a&gt;.  Any one of them calls for rejecting the product
 completely:&lt;/p&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;It spies on everything the user does: it reports which book 
the
-user is reading, and which page, and it reports when the user highlights
-text, and any notes the user enters.&lt;/p&gt;&lt;/li&gt;
+&lt;li&gt;&lt;p&gt;It spies on everything the user does:</em></ins></span> it 
<span class="removed"><del><strong>to anyone 
else&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>reports 
which book the
+user is reading, and</em></ins></span> which <span 
class="inserted"><ins><em>page, and it reports when the user highlights
+text, and any notes</em></ins></span> the <span 
class="removed"><del><strong>publisher</strong></del></span> <span 
class="inserted"><ins><em>user enters.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;It has DRM, which is intended to block users from
 sharing copies.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;It has a back door with which Amazon can remotely erase any 
book.
-In 2009, it erased thousands of copies of 1984, by George 
Orwell.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;In case all that isn't Orwellian enough, there is a 
universal
-back door with which Amazon can remotely change the software, and
-introduce any other form of nastiness.&lt;/p&gt;&lt;/li&gt;
+&lt;li&gt;&lt;p class="inline-block"&gt;It has a back door with which 
Amazon</em></ins></span> can
+     <span class="removed"><del><strong>revoke at will.&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151"&gt;Electronic
+     Publishing:&lt;/a&gt; An article about distribution</strong></del></span> 
<span class="inserted"><ins><em>remotely erase any book.
+In 2009, it erased thousands</em></ins></span> of <span 
class="removed"><del><strong>books in
+     electronic form,</strong></del></span> <span 
class="inserted"><ins><em>copies of 1984, by George Orwell.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p class="inline-block"&gt;In case all that isn't Orwellian 
enough, there is a universal
+back door with which Amazon can remotely change the 
software,</em></ins></span> and <span class="removed"><del><strong>copyright 
issues affecting</strong></del></span>
+<span class="inserted"><ins><em>introduce any other form of 
nastiness.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;p&gt;Amazon's e-book distribution is oppressive, too.  It identifies the
-user and records what books the user obtains.  It also requires users
-to agree to an antisocial contract</em></ins></span> that <span 
class="removed"><del><strong>you can access only by 
signing</strong></del></span> <span class="inserted"><ins><em>they won't share 
copies with
-others.  My conscience tells me that, if I had agreed to 
such</em></ins></span> a <span class="removed"><del><strong>&lt;a 
href="http://www.nature.com/principles/viewTermsOfUse"&gt;
-     contract not</strong></del></span>
-<span class="inserted"><ins><em>contract, the lesser evil would 
be</em></ins></span> to <span 
class="removed"><del><strong>lend</strong></del></span> <span 
class="inserted"><ins><em>defy</em></ins></span> it <span 
class="inserted"><ins><em>and share copies anyway;
-however,</em></ins></span> to <span class="removed"><del><strong>anyone 
else&lt;/a&gt;, which the publisher can
-     revoke at will.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151"&gt;Electronic
-     Publishing:&lt;/a&gt; An article about distribution of 
books</strong></del></span> <span class="inserted"><ins><em>be entirely good, I 
should not agree to it</em></ins></span> in
-     <span class="removed"><del><strong>electronic form, and copyright issues 
affecting</strong></del></span> the <span 
class="removed"><del><strong>right</strong></del></span> <span 
class="inserted"><ins><em>first
-place.  Therefore, I refuse</em></ins></span> to <span 
class="removed"><del><strong>read
-     a copy.&lt;/li&gt;
+&lt;p&gt;Amazon's e-book distribution is oppressive, too.  It 
identifies</em></ins></span> the <span 
class="removed"><del><strong>right</strong></del></span>
+<span class="inserted"><ins><em>user and records what books the user obtains.  
It also requires users
+to agree to an antisocial contract that they won't share copies with
+others.  My conscience tells me that, if I had agreed</em></ins></span> to 
<span class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>such</em></ins></span> a <span 
class="removed"><del><strong>copy.&lt;/li&gt;
 &lt;li&gt;&lt;a 
href="http://www.microsoft.com/en-us/news/press/1999/Aug99/SeyboldPR.aspx"&gt;Books
-     inside Computers:&lt;/a&gt; Software</strong></del></span> <span 
class="inserted"><ins><em>agree</em></ins></span> to <span 
class="removed"><del><strong>control who can read
-     books and documents on a PC.&lt;/li&gt;
-&lt;/ul&gt;</strong></del></span> <span class="inserted"><ins><em>such 
contracts, whether for
+     inside Computers:&lt;/a&gt; Software</strong></del></span>
+<span class="inserted"><ins><em>contract, the lesser evil would 
be</em></ins></span> to <span class="removed"><del><strong>control who can read
+     books</strong></del></span> <span class="inserted"><ins><em>defy 
it</em></ins></span> and <span class="removed"><del><strong>documents on a 
PC.&lt;/li&gt;
+&lt;/ul&gt;</strong></del></span> <span class="inserted"><ins><em>share copies 
anyway;
+however, to be entirely good, I should not agree to it in the first
+place.  Therefore, I refuse to agree to such contracts, whether for
 software, for e-books, for music, or for anything 
else.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;If we want to stop the bad news and create some good news, we need
@@ -454,6 +535,7 @@
 our work more generally.  There is also a &lt;a href="/help/help.html"&gt;list 
of ways
 to participate in</em></ins></span> our <span 
class="removed"><del><strong>work.</strong></del></span> <span 
class="inserted"><ins><em>work&lt;/a&gt;.</em></ins></span>
 &lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="References"&gt;References&lt;/h3&gt;
 
@@ -479,16 +561,15 @@
        reverse the overextension of copyright and patent powers.&lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;hr /&gt;
-<span class="removed"><del><strong>&lt;h4&gt;This</strong></del></span>
-<span class="inserted"><ins><em>&lt;blockquote id="fsfs"&gt;&lt;p 
class="big"&gt;This</em></ins></span> essay is published
+<span class="removed"><del><strong>&lt;hr /&gt;
+&lt;h4&gt;This essay is published
 in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
 Software, Free Society: The Selected Essays of Richard
-M. <span 
class="removed"><del><strong>Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/h4&gt;
+M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/h4&gt;
 
-&lt;p&gt;&lt;strong&gt;Other</strong></del></span> <span 
class="inserted"><ins><em>Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;
+&lt;p&gt;&lt;strong&gt;Other</strong></del></span>
 
-&lt;h5&gt;Other</em></ins></span> Texts to <span 
class="removed"><del><strong>Read&lt;/strong&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>Read&lt;/h5&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;h4&gt;Other</em></ins></span> Texts to 
<span 
class="removed"><del><strong>Read&lt;/strong&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>Read&lt;/h4&gt;</em></ins></span>
 
 &lt;ul&gt;
        &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
@@ -499,10 +580,15 @@
                <span 
class="removed"><del><strong>Published</strong></del></span>
                <span class="inserted"><ins><em>published</em></ins></span> in 
Computer World.&lt;/li&gt;
 &lt;/ul&gt;
+&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;hr class="thin" /&gt;
+&lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
+in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;
 
-<span class="inserted"><ins><em>&lt;/div&gt;&lt;!-- for id="content", starts 
in the include above --&gt;</em></ins></span>
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above 
--&gt;</em></ins></span>
 &lt;!--#include virtual="/server/footer.html" --&gt;
 &lt;div id="footer"&gt;
 
@@ -578,7 +664,7 @@
 
 &lt;p class="unprintable"&gt;Updated:</em></ins></span>
 &lt;!-- timestamp start --&gt;
-$Date: 2016/10/18 16:29:49 $
+$Date: 2016/11/06 21:28:14 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/right-to-read.cs.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.cs.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/right-to-read.cs.po      18 Oct 2016 16:29:49 -0000      1.29
+++ po/right-to-read.cs.po      6 Nov 2016 21:28:14 -0000       1.30
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2013-01-01 01:45+0100\n"
 "Last-Translator: František Kučera <address@hidden>\n"
 "Language-Team: Czech <address@hidden>\n"
@@ -47,7 +47,7 @@
 "<em>Tento článek se objevil v únoru 1997 ve vydání 
<strong>Communications of "
 "the ACM</strong> (svazek 40, číslo 2).</em>"
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -55,7 +55,7 @@
 "Z knihy <cite>Cesta k Tychu</cite>, souboru článků o předchůdcích 
Lunární "
 "revoluce, publikováno v Luna City v roce 2096"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -67,7 +67,7 @@
 "nemohla půjčit jiný, nestihla by pololetní projekt. Kromě Dana tu nebyl "
 "nikdo, koho by se odvážila zeptat. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -82,7 +82,7 @@
 "samotný nápad ho nejprve šokoval. Jako každý byl již od základní 
školy učen, "
 "že sdílení knih bylo ošklivé a špatné – něco, co by dělali jen 
piráti."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -102,7 +102,7 @@
 "počítače, by podstoupil nejtvrdší trest – protože se nenamáhal 
zabránit "
 "zločinu. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -124,7 +124,7 @@
 "že jeho vlastní dokumenty, pokud by byly žádány, by mu vynesly dost na "
 "zaplacení té půjčky.) "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -140,7 +140,7 @@
 "požadovat poplatky za přístup. V roce 2047 již byly knihovny 
nabízející "
 "svobodný veřejný přístup k akademické literatuře pouhou matnou 
vzpomínkou."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -158,7 +158,7 @@
 "zadlužené studenty ke zradě). V roce 2047 byl Frank ve vězení, ne za "
 "pirátské čtení, ale za vlastnictví debugeru. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -174,7 +174,7 @@
 "jejich základním použitím. To znamenalo, že byly ilegální; vývojáři 
debugerů "
 "skončili ve vězení. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -187,7 +187,7 @@
 "Dan používal v hodinách softwaru, byl držen za speciálním firewallem, 
takže "
 "mohl být používán pouze pro cvičení při výuce."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "It was also possible to bypass the copyright monitors by installing a "
@@ -215,7 +215,7 @@
 "vašemu počítači. A ani <abbr title=\"Federal Bureau of 
Investigation\">FBI</"
 "abbr>, ani Microsoft, by vám ho neřekli."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -227,7 +227,7 @@
 "naplňovala radostí. A to, že si vybrala jeho, aby ho požádala o pomoc, 
by "
 "mohlo naznačovat, že ho také miluje."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -240,7 +240,7 @@
 "pro licence by si myslelo, že je četl on. Stále to byl zločin, ale SOA by 
na "
 "to automaticky nepřišla. Zjistila by to jen kdyby jim to Lissa oznámila."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -259,7 +259,7 @@
 "vaši kontrolu. Brali to tak, že jste dělali něco zakázaného, a 
nepotřebovali "
 "vědět, co to bylo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -268,7 +268,7 @@
 "Studenti za to nebyli obvykle vyloučeni – alespoň ne přímo. Místo toho 
"
 "dostali zákaz přístupu ke školním počítačům, a tak bylo jisté, že 
propadnou."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -282,7 +282,7 @@
 "disciplíně; trestaly aktivity, které byly škodlivé, ne ty, které je 
pouze "
 "uváděli v podezření."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -301,7 +301,7 @@
 "také utekli z dosahu dlouhé ruky SOA. Když v roce 2062 vypuklo povstání 
na "
 "Tychu, jedním z hlavních cílů bylo získat veřejné právo na čtení."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing "
@@ -313,13 +313,13 @@
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Připojte se k naší e-"
 "mailové konferenci o nebezpečích eKnih</a>."
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 #, fuzzy
 #| msgid "Author's Note"
 msgid "Author's Notes"
 msgstr "Autorova poznámka"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -329,7 +329,7 @@
 "philosophy/words-to-avoid.html#Piracy\">&ldquo;Piracy&rdquo;</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -338,13 +338,13 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "This note has been updated several times since the first publication of "
@@ -355,7 +355,7 @@
 msgstr ""
 "Tato poznámka byla od původního vydání povídky několikrát 
aktualizována."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The right to read is a battle being fought today.  Although it may take "
@@ -389,7 +389,7 @@
 "přijatý v roce 2006 přinesl, že pouhé držení kopie DeCSS (svobodného "
 "programu na dešifrování videa na DVD) je považováno za zločin."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -400,7 +400,7 @@
 "these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -411,14 +411,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -427,7 +427,7 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -452,7 +452,7 @@
 "překonat. Hrozba DRM je důvodem, proč jsme spustili kampaň <a 
href=\"http://";
 "DefectiveByDesign.org\"> Defective by Design</a>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "One of the ideas in the story was not proposed in reality until 2002.  "
@@ -467,14 +467,14 @@
 "představa, že by <abbr>FBI</abbr> a Microsoft měly rootovská hesla k 
vašemu "
 "počítači a odmítali vám ho vydat."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
 "into use, it is called &ldquo;secure boot&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -499,7 +499,7 @@
 "potenciálně jakémukoli webu, který spolupracuje s Microsoftem – 
neomezenou "
 "kontrolu nad tím, co uživatel může se svým vlastním počítačem 
dělat."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -508,7 +508,7 @@
 "control.  We call this <em>restricted boot</em>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "When this story was first written, the SPA was threatening small Internet "
@@ -534,7 +534,7 @@
 "nakonecstáhla žalobu, ale získala DMCA, která jim dala pravomoci, které "
 "chtěli."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The SPA, which actually stands for Software Publishers Association, has "
@@ -561,7 +561,7 @@
 "kampaň v Argentině v roce 2001 lehce náznakem vyhrožovala, že lidé 
sdílející "
 "software budou znásilněni."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -570,7 +570,7 @@
 "Universitní bezpečnostní politiky nejsou smyšlené. Např. na jedné 
universitě "
 "v Chicagu zobrazovaly počítače po přihlášení následující hlášku:"
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -594,7 +594,7 @@
 "pracovníci mohou poskytnout tyto důkazy orgánům University a/nebo 
orgánům "
 "činným v trestním řízení."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -602,11 +602,11 @@
 "To je zajímavý přístup ke Čtvrtému dodatku: nutit kohokoli k tomu, aby 
se "
 "předem zřekl svých práv daných tímto dodatkem."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "Špatné zprávy"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The battle for the right to read is already in progress, The enemy is "
@@ -621,7 +621,7 @@
 "což nás oslabuje. Zde jsou články o špatnostech, které se staly od 
prvního "
 "vydání tohoto článku."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -632,31 +632,31 @@
 "for rejecting the product completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -668,7 +668,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "If we want to stop the bad news and create some good news, we need to "
@@ -690,11 +690,11 @@
 "zvedněte ruku. A <a href=\"http://www.fsf.org/associate\";>připojte se k 
FSF</"
 "a> a pomozte financovat naši práci."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Odkazy"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -706,7 +706,7 @@
 "Information Infrastructure: The Report of the Working Group on Intellectual "
 "Property [sic] Rights (1995)."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -716,7 +716,7 @@
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
 "Wired, Jan. 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -724,7 +724,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -734,7 +734,7 @@
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
 "Private Data</a>, Washington Post, 4 Nov 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.public-domain.org/\";>Union for the Public Domain</"
@@ -749,26 +749,16 @@
 "organizace, která si klade za cíl odvracet nadměrné rozšiřování 
copyrightové "
 "a patentové moci."
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Tato esej vyšla v knize <a href=\"http://shop.fsf.org/product/free-software-";
-"free-society/\"><cite>Free Software, Free Society: The Selected Essays of "
-"Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Další texty ke čtení"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">Filosofie projektu GNU</a>"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.computerworld.com/s/article/49358/";
@@ -783,6 +773,16 @@
 "Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">Copy Protection: Just "
 "Say No</a>, vyšlo v Computer Worldu."
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Tato esej vyšla v knize <a href=\"http://shop.fsf.org/product/free-software-";
+"free-society/\"><cite>Free Software, Free Society: The Selected Essays of "
+"Richard M. Stallman</cite></a>."
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/right-to-read.de-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.de-en.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- po/right-to-read.de-en.html 28 Oct 2016 11:58:13 -0000      1.50
+++ po/right-to-read.de-en.html 6 Nov 2016 21:28:14 -0000       1.51
@@ -3,30 +3,60 @@
 <title>The Right to Read
 - GNU Project - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns > p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --></style>
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<h2 class="center">The Right to Read</h2>
 
-<p>
+<p class="byline center">
 by <a href="http://www.stallman.org/";><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
 <em>This article appeared in the February 1997 issue
 of <cite>Communications of the ACM</cite> (Volume 40, Number
 2).</em></p>
-<hr />
+<hr class="thin" />
 
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
             From <cite>The Road To Tycho</cite>, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 </p></blockquote>
 
+<div class="columns">
 <p>
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -62,7 +92,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -106,7 +139,10 @@
 knowing your computer's root password.  And neither
 the FBI nor
 Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -143,7 +179,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -153,6 +192,7 @@
 to Luna, where they found others who had likewise gravitated away from
 the long arm of the SPA.  When the Tycho Uprising began in 2062, the
 universal right to read soon became one of its central aims.</p>
+</div>
 
 <div class="announcement">
 <blockquote>
@@ -163,35 +203,46 @@
 <div id="AuthorsNote">
 <h3>Author's Notes</h3>
 
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it forwards into something more visibly
 oppressive. See <a
 href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>.
+</p>
+</div>
+<div class="column-limit"></div>
 </li>
 
 <li>
+<div class="reduced-width">
 <p>Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the <a href="http://DefectiveByDesign.org";>Defective by
 Design</a> campaign.  We ask for your support.</p>
-</li>
 
-<li>
 <p>The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.</p>
+</div>
+<div class="column-limit"></div>
 </li>
+</ul>
 
-<li>
+<blockquote class="info center">
 <p>The following note has been updated several times since the first
 publication of the story.</p>
+</blockquote>
 
+<ul class="no-bullet">
+<li>
+<div class="columns">
 <p>
 The battle for the right to read is already being fought.  Although it
 may take 50 years for our past freedoms to fade into obscurity, most
@@ -228,15 +279,20 @@
 Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
 Nonfree software tends to have <a href="/proprietary/">abusive
 features of many kinds</a>, which lead to the conclusion that
 <a href="/philosophy/free-software-even-more-important.html">you can
 never trust a nonfree program</a>.  We must insist on free (libre)
 software only, and reject nonfree programs.</p>
 
-<p>
+<p class="inline-block">
 With Windows Vista, Microsoft admitted it had built in a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
@@ -244,7 +300,12 @@
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
 10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the FBI and Microsoft will keep the
@@ -274,7 +335,12 @@
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this <em>restricted
 boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 In 1997, when this story was first published, the SPA was
 threatening small Internet service providers, demanding they permit
@@ -293,7 +359,12 @@
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
 software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="reduced-width">
 <p>
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -315,12 +386,15 @@
 <p>
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.</p>
+</div>
 </li>
 </ul>
+<div class="column-limit"></div>
 </div>
 
 <h3 id="BadNews">Bad News</h3>
 
+<div class="columns">
 <p>
 The battle for the right to read is going against us so far.
 The enemy is organized, and we are not.
@@ -344,10 +418,10 @@
 <li><p>It has DRM, which is intended to block users from
 sharing copies.</p></li>
 
-<li><p>It has a back door with which Amazon can remotely erase any book.
+<li><p class="inline-block">It has a back door with which Amazon can remotely 
erase any book.
 In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
 
-<li><p>In case all that isn't Orwellian enough, there is a universal
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is 
a universal
 back door with which Amazon can remotely change the software, and
 introduce any other form of nastiness.</p></li>
 </ul>
@@ -369,6 +443,7 @@
 our work more generally.  There is also a <a href="/help/help.html">list of 
ways
 to participate in our work</a>.
 </p>
+</div>
 
 <h3 id="References">References</h3>
 
@@ -394,13 +469,7 @@
        reverse the overextension of copyright and patent powers.</li>
 </ul>
 
-<hr />
-<blockquote id="fsfs"><p class="big">This essay is published
-in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Other Texts to Read</h5>
+<h4>Other Texts to Read</h4>
 
 <ul>
        <li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -409,6 +478,13 @@
                id="copy-protection">Copy Protection: Just Say No</a>,
                published in Computer World.</li>
 </ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -467,7 +543,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/10/28 11:58:13 $
+$Date: 2016/11/06 21:28:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/right-to-read.de.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.de.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- po/right-to-read.de.po      28 Oct 2016 11:58:13 -0000      1.76
+++ po/right-to-read.de.po      6 Nov 2016 21:28:14 -0000       1.77
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-10-25 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -41,7 +41,7 @@
 "lang=\"en\">The Right to Read</cite> in <span xml:lang=\"en\" lang=\"en"
 "\">Communications of the ACM</span>, New York, Jg. 40, 1997, 2."
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -49,7 +49,7 @@
 "Aus: <cite>Der Weg nach Tycho</cite>, einer Sammlung von Artikeln über die "
 "Vorgeschichte der Lunarischen Revolution, veröffentlicht 2096 in Luna City."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -62,7 +62,7 @@
 "abzuschließen, wenn sie sich keinen anderen leihen konnte. Es gab niemanden, 
"
 "den sie zu fragen wagte, außer Dan."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -79,7 +79,7 @@
 "abscheulich und falsch war&#160;&#8209;&#160;etwas, dass nur Piraten machen "
 "würden."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -102,7 +102,7 @@
 "erhalten&#160;&#8209;&#160;er hatte sich nicht genügend Mühe gegeben, das "
 "Verbrechen zu verhindern."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -126,7 +126,7 @@
 "konnte er hoffen, dass seine eigenen Forschungsarbeiten, wenn häufig darauf "
 "Bezug genommen wird, genug einbringen würden, diese Darlehen 
zurückzuzahlen.]"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -144,7 +144,7 @@
 "2047 waren Bibliotheken, die freien öffentlichen Zugang zur "
 "wissenschaftlichen Literatur anboten, nur noch dunkle Erinnerung."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -165,7 +165,7 @@
 "Frank im Gefängnis, nicht für das Raublesen, sondern für den Besitz eines "
 "Debuggers."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -183,7 +183,7 @@
 "bedeutete, dass sie illegal waren. Die Entwickler der Debugger kamen ins "
 "Gefängnis."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -197,7 +197,7 @@
 "Firewall abgeschirmt, so dass er nur für Übungsaufgaben verwendet werden "
 "konnte."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It was also possible to bypass the copyright monitors by installing a "
 "modified system kernel.  Dan would eventually find out about the free "
@@ -216,7 +216,7 @@
 "Bundespolizei <span xml:lang=\"en\" lang=\"en\">FBI</span> noch der <span "
 "xml:lang=\"en\" lang=\"en\">Microsoft Support</span> würden es aushändigen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -228,7 +228,7 @@
 "mit ihr zu sprechen erfüllte ihn mit Freude. Und dass sie gerade ihn um "
 "Hilfe bat, konnte bedeuten, dass auch sie ihn liebte."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -243,7 +243,7 @@
 "würde nicht automatisch davon erfahren. Sie würde es nur herausfinden, wenn 
"
 "Lissa ihn meldete."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -264,7 +264,7 @@
 "kontrollieren. Sie gingen davon aus, dies bedeutete, dass man noch etwas "
 "anderes Verbotenes tat, und sie brauchten nicht zu wissen, was es war."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -275,7 +275,7 @@
 "der Hochschule gesperrt, und würden unvermeidlich in allen Kursen "
 "durchfallen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -290,7 +290,7 @@
 "solche, die lediglich Verdacht erregten."
 
 # … Piraterie, +also der illegalen Vervielfältigung+, …
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -311,7 +311,7 @@
 "SPA entzogen hatten. Als 2062 der Aufstand von Tycho begann, wurde das "
 "allgemeine Recht zu lesen schnell eines seiner zentralen Ziele."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list "
 "about the dangers of e-books</a>."
@@ -319,11 +319,11 @@
 "<a href=\"//defectivebydesign.org/ebooks.html\">Abonnieren Sie unsere "
 "Mailingliste über die Gefahren von elektronischen Büchern</a>."
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr "Anmerkungen<!-- des Autors -->"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -340,7 +340,7 @@
 "Terminologie dieser Gesellschaft. Um sichtlich noch beklemmender zu klingen, "
 "habe ich versucht dies <!--aus heutiger Sicht -->zu projizieren."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -354,7 +354,7 @@
 "Foundation die Kampagne <em><a href=\"//DefectiveByDesign.org\">Defective-by-"
 "Design</a></em> ein. Bitte unterstützen Sie die Kampagne."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
@@ -363,7 +363,7 @@
 "Software Foundation in Beziehung stehende Organisation, kämpft auch gegen "
 "DRM."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The following note has been updated several times since the first "
 "publication of the story."
@@ -376,7 +376,7 @@
 # de l'information</span> (DADVSI) der bloße Besitz einer Kopie von
 # <b>DeCSS</b>, einem freien Programm zum Entschlüsseln von  Video-DVDs,
 # eine Straftat.
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The battle for the right to read is already being fought.  Although it may "
 "take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -401,7 +401,7 @@
 "Urheberrechtsrichtlinie<a href=\"#tn1\" id=\"tn1-ref\" class=\"tnote\">[1]</"
 "a> vergleichbare Restriktionen in einer Form, nicht ganz so stark."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -427,7 +427,7 @@
 # TTIP - Transatlantic Trade and Investment Partnership
 # (ins) also the Dominican Republic, El Salvador, Guatemala, Honduras und 
Nicaragua. 
 # Lame Duck („lahme Ente“) - wird im politischen System der Vereinigten 
Staaten ein gewählter Politiker bezeichnet, der noch im Amt ist, aber nicht zu 
einer Wiederwahl antritt bzw. eine Wahl verloren hat (der in absehbarer Zeit 
aus dem Amt scheidet,dessen Nachfolger bereits gewählt worden ist). 
innenpolitisch gilt er insbesondere als handlungsunfähig.[
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -448,7 +448,7 @@
 "Verträge müssen vereitelt oder abgeschafft werden."
 
 # (replace) web specifications -> HTML5 specifications ???
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
@@ -459,7 +459,7 @@
 "geratenen; es steht kurz davor ein DRM-System als offiziellen Teil der "
 "Internet-Spezifikationen zu genehmigen."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -473,7 +473,7 @@
 "unfreien Programm vertrauen kann</a>. Wir müssen bloß auf Freie (Libre) "
 "Software bestehen und unfreie Programme zurückweisen."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "With Windows Vista, Microsoft admitted it had built in a back door: "
 "Microsoft can use it to forcibly install software &ldquo;upgrades,&rdquo; "
@@ -491,7 +491,7 @@
 "gegen Nutzer war DRM aufzuerlegen, das Nutzer nicht überwinden können. "
 "Natürlich ist Windows 10 nicht besser."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "One of the ideas in the story was not proposed in reality until 2002.  This "
 "is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -502,7 +502,7 @@
 "Microsoft die Root-Passwörter für Privat- und Arbeitsplatzrechner behalten "
 "und diese nicht mitteilen!"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
@@ -513,7 +513,7 @@
 "em>, aber wie letztlich eingesetzt wird es <em><span xml:lang=\"en\" lang="
 "\"en\">Secure Boot</span></em> genannt."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "What Microsoft keeps is not exactly a password in the traditional sense; no "
 "person ever types it on a terminal.  Rather, it is a signature and "
@@ -535,7 +535,7 @@
 "\">zeigt die NSA-Sicherheitslücken in Windows</a>, die bereits ausgenutzt "
 "wurden."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -552,7 +552,7 @@
 "nennen dies <em><span xml:lang=\"en\" lang=\"en\">Restricted Boot</span></"
 "em>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "In 1997, when this story was first published, the SPA was threatening small "
 "Internet service providers, demanding they permit the SPA to monitor all "
@@ -570,7 +570,7 @@
 "tatsächlich verklagt. Die SPA ließ die Klage später fallen, aber durch das 
"
 "DMCA erhielt sie die Macht, die sie anstrebte."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The SPA, which actually stands for Software Publishers Association, has been "
 "replaced in its police-like role by the Business Software Alliance.  The BSA "
@@ -592,7 +592,7 @@
 "Drohungen, dass Personen, die Software gemeinsam benutzen, also teilen, im "
 "Gefängnis vergewaltigt werden würden."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -602,7 +602,7 @@
 "Beispielsweise zeigt ein Rechner einer Universität in der Gegend von Chicago 
"
 "bei der Anmeldung diese Meldung an:"
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -627,7 +627,7 @@
 "gesammelte Daten an die Universitätsverwaltung und/oder an zuständige "
 "Strafverfolgungsbehörden weiterzugeben.“"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -636,11 +636,11 @@
 "Verfassung: fast jedermann im Voraus zu zwingen, auf die entsprechenden "
 "Rechte zu verzichten."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "Schlechte Nachrichten"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The battle for the right to read is going against us so far.  The enemy is "
 "organized, and we are not."
@@ -649,7 +649,7 @@
 "Ungunsten&#160;&#8209;&#160;im Gange. Der ist Feind organisiert, wir "
 "hingegen nicht."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -668,7 +668,7 @@
 "völlige Zurückweisung des Produktes:"
 
 # … on servers outside the country where you live
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
@@ -678,13 +678,13 @@
 "stellt Amazon Informationen wie beispielsweise welches Buch und welche Seite "
 "gelesen wurden, Markierungen und jegliche eingegebenen Notizen bereit</ins>."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 "Es verfügt über DRM, die Nutzer von der gemeinsamen Nutzung von Kopien "
 "abhalten soll."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
@@ -693,7 +693,7 @@
 "löschen kann. Im Jahr 2009 wurden so Tausende Kopien von George Orwells "
 "<cite>1984</cite> entfernt."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
@@ -703,7 +703,7 @@
 "universelle Hintertür, mit der Amazon die Software aus der Ferne ändern und 
"
 "jede andere Form von Bosheit einführen kann."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -724,7 +724,7 @@
 "Verträgen zuzustimmen, egal ob für Software, E-Bücher, Musik oder für "
 "irgendetwas anderes."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we want to stop the bad news and create some good news, we need to "
 "organize and fight.  Subscribe to the FSF's <a href=\"http://";
@@ -741,12 +741,12 @@
 "als assoziiertes Mitglied an die FSF</a>. Es gibt auch eine Reihe von <a "
 "href=\"/help/\">Möglichkeiten, an unserer Arbeit zu partizipieren</a>."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Referenzen"
 
 # http://www.uspto.gov/web/offices/com/doc/ipnii/ipnii.txt (Stand: 2012-08-30)
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -760,7 +760,7 @@
 "philosophy/not-ipr\">[sic]</a> 1995."
 
 # (Stand: 2012-08-30)
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -771,7 +771,7 @@
 "Eine Erklärung des Weißbuchs, in: Wired 1996."
 
 # (Stand: 2012-08-30)
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -780,7 +780,7 @@
 "lang=\"en\" lang=\"en\">Sold Out</a></cite>, in: The New York Times 1996."
 
 # Retrieved 2013-06-26.
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -792,7 +792,7 @@
 "Washington Post 1996 [Internet Archive]."
 
 # (Stand: 2011-03-26) Internet Archive
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"https://web.archive.org/web/20151113122141/http://public-domain.";
 "org/\">Union for the Public Domain</a>&mdash;an organization which aims to "
@@ -804,29 +804,18 @@
 "Organisation, deren Ziel es <ins>war</ins> sich übermäßigen Befugnissen 
des "
 "Urheber- und Patentrechts zu widersetzen und rückgängig zu machen."
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Dieser Aufsatz wurde englischsprachig in <cite><a href=\"//shop.fsf.org/"
-"product/free-software-free-society/\" xml:lang=\"en\" lang=\"en\">Free "
-"Software, Free Society: The Selected Essays of Richard M. Stallman</a></"
-"cite> veröffentlicht."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Weitere Texte"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/\">Philosophie des GNU-Projekts</a>"
 
 # Kay, Russel: Copy Protection: Just Say No (2000). In: Computerworld,
 # URL: 
http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html
 (Stand: 2016-03-26).
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.computerworld.com/article/2596679/networking/copy-";
 "protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -837,6 +826,17 @@
 "lang=\"en\" lang=\"en\">Copy Protection: Just Say No</a></cite>, in: "
 "Computerworld 2000."
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Dieser Aufsatz wurde englischsprachig in <cite><a href=\"//shop.fsf.org/"
+"product/free-software-free-society/\" xml:lang=\"en\" lang=\"en\">Free "
+"Software, Free Society: The Selected Essays of Richard M. Stallman</a></"
+"cite> veröffentlicht."
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/right-to-read.el-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.el-diff.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/right-to-read.el-diff.html       18 Oct 2016 16:29:50 -0000      1.12
+++ po/right-to-read.el-diff.html       6 Nov 2016 21:28:14 -0000       1.13
@@ -15,34 +15,71 @@
 &lt;title&gt;The Right to Read
 - GNU Project - Free Software Foundation&lt;/title&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns &gt; p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --&gt;&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/philosophy/po/right-to-read.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
-&lt;h2&gt;The Right to Read&lt;/h2&gt;
+<span class="removed"><del><strong>&lt;h2&gt;The</strong></del></span>
+<span class="inserted"><ins><em>&lt;h2 class="center"&gt;The</em></ins></span> 
Right to Read&lt;/h2&gt;
 
-&lt;p&gt;
+<span class="removed"><del><strong>&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p class="byline 
center"&gt;</em></ins></span>
 by &lt;a href="http://www.stallman.org/"&gt;&lt;strong&gt;Richard 
Stallman&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;blockquote class="note"&gt;
 &lt;p&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of eBooks&lt;/a&gt;.&lt;/p&gt;
-&lt;/blockquote&gt;</strong></del></span>
+&lt;/blockquote&gt;
 
-&lt;p&gt;
+&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;p class="center"&gt;</em></ins></span>
 &lt;em&gt;This article appeared in the February 1997 issue
 of <span 
class="removed"><del><strong>&lt;strong&gt;Communications</strong></del></span> 
<span class="inserted"><ins><em>&lt;cite&gt;Communications</em></ins></span> of 
the <span class="removed"><del><strong>ACM&lt;/strong&gt;</strong></del></span> 
<span class="inserted"><ins><em>ACM&lt;/cite&gt;</em></ins></span> (Volume 40, 
Number
 2).&lt;/em&gt;&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;hr /&gt;</em></ins></span>
 
-&lt;blockquote&gt;&lt;p&gt;
+<span 
class="removed"><del><strong>&lt;blockquote&gt;&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;hr class="thin" /&gt;
+
+&lt;div class="article"&gt;
+&lt;blockquote class="info center"&gt;&lt;p&gt;</em></ins></span>
             From &lt;cite&gt;The Road To Tycho&lt;/cite&gt;, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 &lt;/p&gt;&lt;/blockquote&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -78,7 +115,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -122,7 +162,10 @@
 knowing your computer's root password.  And neither
 the <span class="removed"><del><strong>&lt;abbr title="Federal Bureau of 
Investigation"&gt;FBI&lt;/abbr&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI</em></ins></span> nor
 Microsoft Support would tell you that.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -159,7 +202,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -172,8 +218,9 @@
 
 
 <span class="removed"><del><strong>&lt;h3 
id="AuthorsNote"&gt;Author's</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;div class="announcement"&gt;
+&lt;div class="announcement"&gt;
 &lt;blockquote&gt;
 &lt;p&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of e-books&lt;/a&gt;.&lt;/p&gt;
 &lt;/blockquote&gt;
@@ -182,35 +229,49 @@
 &lt;div id="AuthorsNote"&gt;
 &lt;h3&gt;Author's</em></ins></span> Notes&lt;/h3&gt;
 
-&lt;ul&gt;
-&lt;li&gt;This story is supposedly a historical article that will be written in
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;This</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p&gt;This</em></ins></span> story is supposedly a historical article that 
will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the <span 
class="removed"><del><strong>enemies</strong></del></span> <span 
class="inserted"><ins><em>unjust forces</em></ins></span> that use 
&ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it <span class="removed"><del><strong>from today so as 
to sound even</strong></del></span> <span class="inserted"><ins><em>forwards 
into something</em></ins></span> more <span 
class="inserted"><ins><em>visibly</em></ins></span>
 oppressive. See &lt;a
 
href="/philosophy/words-to-avoid.html#Piracy"&gt;&ldquo;Piracy&rdquo;&lt;/a&gt;.
+<span class="inserted"><ins><em>&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;</em></ins></span>
 &lt;/li&gt;
 
 &lt;li&gt;
-<span class="inserted"><ins><em>&lt;p&gt;Computer-enforced restrictions on 
lending or reading books (and other
+<span class="inserted"><ins><em>&lt;div class="reduced-width"&gt;
+&lt;p&gt;Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the &lt;a href="http://DefectiveByDesign.org"&gt;Defective by
 Design&lt;/a&gt; campaign.  We ask for your support.&lt;/p&gt;
-&lt;/li&gt;
 
-&lt;li&gt;
 &lt;p&gt;The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 &lt;/li&gt;
+&lt;/ul&gt;
 
-&lt;li&gt;</em></ins></span>
+&lt;blockquote class="info center"&gt;</em></ins></span>
 &lt;p&gt;The following note has been updated several times since the first
 publication of the story.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
+&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The <span class="inserted"><ins><em>battle for the</em></ins></span> right to 
read is <span class="removed"><del><strong>a battle</strong></del></span> <span 
class="inserted"><ins><em>already</em></ins></span> being <span 
class="removed"><del><strong>fought today.</strong></del></span> <span 
class="inserted"><ins><em>fought.</em></ins></span>  Although it
 may take 50 years for our <span class="removed"><del><strong>present way of 
life</strong></del></span> <span class="inserted"><ins><em>past 
freedoms</em></ins></span> to fade into obscurity, most
@@ -247,8 +308,7 @@
 
 &lt;p&gt;
 In 2001 the</strong></del></span> US <span class="removed"><del><strong>began 
attempting to use the proposed Free Trade Area of
-the Americas (FTAA) treaty</strong></del></span> <span 
class="inserted"><ins><em>campaigns</em></ins></span> to impose <span 
class="removed"><del><strong>the same</strong></del></span> <span 
class="inserted"><ins><em>such</em></ins></span> rules on <span 
class="removed"><del><strong>all</strong></del></span> the <span 
class="removed"><del><strong>countries in
-the Western Hemisphere.  The FTAA is one</strong></del></span> <span 
class="inserted"><ins><em>rest</em></ins></span> of the <span 
class="inserted"><ins><em>world through</em></ins></span>
+the Americas (FTAA) treaty</strong></del></span> <span 
class="inserted"><ins><em>campaigns</em></ins></span> to impose <span 
class="removed"><del><strong>the same</strong></del></span> <span 
class="inserted"><ins><em>such</em></ins></span> rules on <span 
class="removed"><del><strong>all the countries in</strong></del></span> the 
<span class="removed"><del><strong>Western Hemisphere.  The FTAA is 
one</strong></del></span> <span 
class="inserted"><ins><em>rest</em></ins></span> of the <span 
class="inserted"><ins><em>world through</em></ins></span>
 so-called <span class="removed"><del><strong>free
 trade treaties, which</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;free trade&rdquo; treaties.
 &lt;a href="https://stallman.org/business-supremacy-treaties.html"&gt;
@@ -280,23 +340,33 @@
 Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
-&lt;p&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p class="emph-box"&gt;
 Nonfree software tends to have &lt;a href="/proprietary/"&gt;abusive
 features of many kinds&lt;/a&gt;, which lead to the conclusion that
 &lt;a href="/philosophy/free-software-even-more-important.html"&gt;you can
 never trust a nonfree program&lt;/a&gt;.  We must insist on free (libre)
 software only, and reject nonfree programs.&lt;/p&gt;
 
-&lt;p&gt;
+&lt;p class="inline-block"&gt;
 With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span 
class="removed"><del><strong>2003.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
 downgrades.  It can also order all machines running Vista to refuse to
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
-10 is no better&lt;/p&gt;</em></ins></span>
+10 is no better&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the <span 
class="removed"><del><strong>&lt;abbr&gt;FBI&lt;/abbr&gt;</strong></del></span> 
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep 
the
@@ -329,22 +399,27 @@
 Vista's many restrictions</strong></del></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> to <span 
class="removed"><del><strong>impose DRM (Digital Restrictions
 Management)</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> that <span 
class="removed"><del><strong>users can't overcome.  The 
threat</strong></del></span>
 <span class="inserted"><ins><em>control on behalf</em></ins></span> of <span 
class="removed"><del><strong>DRM is why we
-have established</strong></del></span> the <span 
class="removed"><del><strong>&lt;a href="http://DefectiveByDesign.org"&gt;
-Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI when asked: it
-already &lt;a href="/proprietary/malware-microsoft.html"&gt;shows
-the NSA security bugs in Windows&lt;/a&gt; to exploit.&lt;/p&gt;
+have established</strong></del></span> the <span class="inserted"><ins><em>FBI 
when asked: it
+already</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://DefectiveByDesign.org"&gt;
+Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;shows
+the NSA security bugs in Windows&lt;/a&gt; to 
exploit.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;
-Secure boot can be implemented in a way that permits the user to
+<span class="removed"><del><strong>When</strong></del></span>
+<span class="inserted"><ins><em>Secure boot can be implemented in a way that 
permits the user to
 specify the signature key and decide what software to sign.  In
 practice, PCs designed for Windows 10 carry only Microsoft's key, and
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this &lt;em&gt;restricted
-boot&lt;/em&gt;.&lt;/p&gt;</em></ins></span>
+boot&lt;/em&gt;.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;
 &lt;p&gt;
-<span class="removed"><del><strong>When</strong></del></span>
-<span class="inserted"><ins><em>In 1997, when</em></ins></span> this story was 
first <span class="removed"><del><strong>written,</strong></del></span> <span 
class="inserted"><ins><em>published,</em></ins></span> the SPA was
+In 1997, when</em></ins></span> this story was first <span 
class="removed"><del><strong>written,</strong></del></span> <span 
class="inserted"><ins><em>published,</em></ins></span> the SPA was
 threatening small Internet service providers, demanding they permit
 the SPA to monitor all users.  Most ISPs surrendered when
 threatened, because they <span 
class="removed"><del><strong>cannot</strong></del></span> <span 
class="inserted"><ins><em>could not</em></ins></span> afford to fight back in 
court.  One
@@ -360,8 +435,13 @@
 reminiscent of the erstwhile Soviet Union, it invites people to inform
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;</em></ins></span>
+software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="reduced-width"&gt;</em></ins></span>
 &lt;p&gt;
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -383,16 +463,20 @@
 &lt;p&gt;
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 &lt;/li&gt;
 &lt;/ul&gt;
-<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="BadNews"&gt;Bad News&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
-The battle for the right to read is <span class="removed"><del><strong>already 
in progress,</strong></del></span> <span class="inserted"><ins><em>going 
against us so far.</em></ins></span>
-The enemy is organized, <span 
class="removed"><del><strong>while</strong></del></span> <span 
class="inserted"><ins><em>and</em></ins></span> we are <span 
class="removed"><del><strong>not, so it is going against us.
-Here are articles about bad things that have happened since the
+The battle for the right to read is <span class="removed"><del><strong>already 
in progress,
+The enemy is organized, while we are not, so it is</strong></del></span> going 
against <span class="removed"><del><strong>us.
+Here</strong></del></span> <span class="inserted"><ins><em>us so far.
+The enemy is organized, and we</em></ins></span> are <span 
class="removed"><del><strong>articles about bad things that have happened since 
the
 original publication of this article.&lt;/p&gt;
 
 &lt;ul&gt;
@@ -414,21 +498,21 @@
 completely:&lt;/p&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;It spies on everything the user does:</em></ins></span> it 
<span class="removed"><del><strong>to anyone 
else&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>reports 
which book the
-user is reading, and</em></ins></span> which <span 
class="inserted"><ins><em>page, and it reports when</em></ins></span> the <span 
class="removed"><del><strong>publisher</strong></del></span> <span 
class="inserted"><ins><em>user highlights
-text, and any notes the user enters.&lt;/p&gt;&lt;/li&gt;
+&lt;li&gt;&lt;p&gt;It spies on everything the user does:</em></ins></span> it 
<span class="removed"><del><strong>to anyone 
else&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>reports</em></ins></span> which <span 
class="inserted"><ins><em>book the
+user is reading, and which page, and it reports when the user highlights
+text, and any notes</em></ins></span> the <span 
class="removed"><del><strong>publisher</strong></del></span> <span 
class="inserted"><ins><em>user enters.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;It has DRM, which is intended to block users from
 sharing copies.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;It has a back door with which Amazon</em></ins></span> can
+&lt;li&gt;&lt;p class="inline-block"&gt;It has a back door with which 
Amazon</em></ins></span> can
      <span class="removed"><del><strong>revoke at will.&lt;/li&gt;
 &lt;li&gt;&lt;a 
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151"&gt;Electronic
      Publishing:&lt;/a&gt; An article about distribution</strong></del></span> 
<span class="inserted"><ins><em>remotely erase any book.
 In 2009, it erased thousands</em></ins></span> of <span 
class="removed"><del><strong>books in
      electronic form,</strong></del></span> <span 
class="inserted"><ins><em>copies of 1984, by George Orwell.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;In case all that isn't Orwellian enough, there is a 
universal
+&lt;li&gt;&lt;p class="inline-block"&gt;In case all that isn't Orwellian 
enough, there is a universal
 back door with which Amazon can remotely change the 
software,</em></ins></span> and <span class="removed"><del><strong>copyright 
issues affecting</strong></del></span>
 <span class="inserted"><ins><em>introduce any other form of 
nastiness.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -455,6 +539,7 @@
 our work more generally.  There is also a &lt;a href="/help/help.html"&gt;list 
of ways
 to participate in</em></ins></span> our <span 
class="removed"><del><strong>work.</strong></del></span> <span 
class="inserted"><ins><em>work&lt;/a&gt;.</em></ins></span>
 &lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="References"&gt;References&lt;/h3&gt;
 
@@ -480,23 +565,32 @@
        reverse the overextension of copyright and patent powers.&lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;hr /&gt;
+<span class="inserted"><ins><em>&lt;h4&gt;Other Texts to Read&lt;/h4&gt;
+
+&lt;ul&gt;
+       &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
+       GNU Project&lt;/a&gt;&lt;/li&gt;
+       &lt;li&gt;&lt;a 
href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html";
+               id="copy-protection"&gt;Copy Protection: Just Say No&lt;/a&gt;,
+               published in Computer World.&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;</em></ins></span>
+
+&lt;hr <span class="inserted"><ins><em>class="thin"</em></ins></span> /&gt;
 &lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
 in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
 Software, Free Society: The Selected Essays of Richard
 M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;
 
-&lt;h5&gt;Other Texts to Read&lt;/h5&gt;
+<span class="removed"><del><strong>&lt;h5&gt;Other Texts to Read&lt;/h5&gt;
 
 &lt;ul&gt;
        &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
        GNU Project&lt;/a&gt;&lt;/li&gt;
-       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No";
-               id="COPYPROCTECTION"&gt;Copy</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html";
-               id="copy-protection"&gt;Copy</em></ins></span> Protection: Just 
Say No&lt;/a&gt;,
-               <span 
class="removed"><del><strong>Published</strong></del></span>
-               <span class="inserted"><ins><em>published</em></ins></span> in 
Computer World.&lt;/li&gt;
-&lt;/ul&gt;
+       &lt;li&gt;&lt;a 
href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No";
+               id="COPYPROCTECTION"&gt;Copy Protection: Just Say No&lt;/a&gt;,
+               Published in Computer World.&lt;/li&gt;
+&lt;/ul&gt;</strong></del></span>
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
@@ -556,7 +650,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:14 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/right-to-read.el.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.el.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- po/right-to-read.el.po      18 Oct 2016 16:29:50 -0000      1.14
+++ po/right-to-read.el.po      6 Nov 2016 21:28:14 -0000       1.15
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2015-04-24 11:30+0200\n"
 "Last-Translator: Georgios Zarkadas <address@hidden>\n"
 "Language-Team: Greek <address@hidden>\n"
@@ -49,7 +49,7 @@
 "<strong>Επικοινωνίες της ACM</strong> (Τόμος 40, 
Αριθμός 2).</em>"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -59,7 +59,7 @@
 "Σελήνης το έτος 2096."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -73,7 +73,7 @@
 "τέτοιο, εκτός από τον Dan."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -90,7 +90,7 @@
 "ήταν άσχημος και λάθος&mdash;κάτι που μόνο οι 
πειρατές θα έκαναν."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -113,7 +113,7 @@
 "λήψη εκτεταμένων μέτρων για την αποτροπή 
του εγκλήματος."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -138,7 +138,7 @@
 "συχνά, θα του έφερναν αρκετό εισόδημα για 
να ξεπληρώσει το δάνειό του.)"
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -157,7 +157,7 @@
 "πρόσβαση στην επιστημονική βιβλιογραφία 
ήταν μια αχνή ανάμνηση."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -178,7 +178,7 @@
 "για πειρατικό διάβασμα, αλλά για κατοχή 
ενός αποσφαλματωτή."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -197,7 +197,7 @@
 "στη φυλακή."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -212,7 +212,7 @@
 "μπορεί να χρησιμοποιηθεί μόνο για 
ασκήσεις του μαθήματος."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "It was also possible to bypass the copyright monitors by installing a "
@@ -242,7 +242,7 @@
 "abbr> ούτε η Υποστήριξη της Microsoft θα σας τον 
έδινε."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -256,7 +256,7 @@
 "μπορεί να σήμαινε ότι κι εκείνη τον 
αγαπούσε επίσης."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -271,7 +271,7 @@
 "μάθαινε αυτόματα γι' αυτό.  Θα το ανακάλυ
πταν μόνο αν η Lissa τον ανέφερε."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -293,7 +293,7 @@
 "που ήταν αλλιώς απαγορευμένο, και δεν 
χρειαζόταν να ξέρουν τι είναι αυτό."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -304,7 +304,7 @@
 "αποτύχαιναν σε όλα τους τα μαθήματα."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -320,7 +320,7 @@
 "εκείνες που απλά δημιουργούσαν υποψίες."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -340,7 +340,7 @@
 "από το μακρύ χέρι της SPA.  Όταν η εξέγερση 
του Τύχο άρχισε το 2062, το "
 "παγκόσμιο δικαίωμα στην ανάγνωση έγινε 
ένας από τους κεντρικούς της στόχους."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing "
@@ -353,11 +353,11 @@
 "ταχυδρομείου σχετικά με τους κινδύνους 
των η-βιβλίων</a>."
 
 # type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr "Σημειώσεις του συγγραφέα"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "This story is supposedly a historical article that will be written in the "
@@ -382,7 +382,7 @@
 "ακόμη πιο καταθλιπτική.  Δείτε <a 
href=\"/philosophy/words-to-avoid."
 "html#Piracy\">&ldquo;Πειρατεία&rdquo;</a>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -391,14 +391,14 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The following note has been updated several times since the first "
 "publication of the story."
@@ -406,7 +406,7 @@
 "Αυτή η σημείωση έχει ενημερωθεί αρκετές 
φορές από την πρώτη δημοσίευση της "
 "ιστορίας."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The right to read is a battle being fought today.  Although it may take "
@@ -443,7 +443,7 @@
 "κατοχή ενός αντιγράφου του DeCSS, του 
ελεύθερου προγράμματος "
 "αποκρυπτογράφησης βίντεο σε ένα DVD, είναι 
έγκλημα.  "
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -454,7 +454,7 @@
 "these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -465,14 +465,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -482,7 +482,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -510,7 +510,7 @@
 "href=\"http://DefectiveByDesign.org\";> Ελαττωματικό από 
Σχεδιασμό</a>."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "One of the ideas in the story was not proposed in reality until 2002.  "
@@ -526,7 +526,7 @@
 "φύλαγαν τα ριζικά συνθηματικά για τους 
προσωπικούς σας υπολογιστές και δεν "
 "θα σας άφηναν να τα αποκτήσετε."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
@@ -534,7 +534,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -561,7 +561,7 @@
 "τη Microsoft, τον υπέρτατο έλεγχο πάνω στο τι 
μπορεί να κάνει ο χρήστης στον "
 "δικό του υπολογιστή."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -571,7 +571,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "When this story was first written, the SPA was threatening small Internet "
@@ -599,7 +599,7 @@
 "αλλά παρέλαβε τη DMCA, που τους έδωσε την 
ισχύ που ήθελαν."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The SPA, which actually stands for Software Publishers Association, has "
@@ -629,7 +629,7 @@
 "βιάζονταν. "
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -640,7 +640,7 @@
 "του Σικάγο πρόβαλε αυτό το μήνυμα κατά την 
επιβεβαίωση ταυτότητας (login):"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -667,7 +667,7 @@
 "αξιωματούχους των αστυνομικών αρχών."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -676,11 +676,11 @@
 "περισσότερους να συμφωνήσουν, 
προκαταβολικά, στην παραίτηση από τα "
 "δικαιώματά τους κάτω από αυτήν."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "Άσχημα νέα"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The battle for the right to read is already in progress, The enemy is "
@@ -696,7 +696,7 @@
 "παρατίθενται άρθρα σχετικά με άσχημα 
πράγματα που συνέβησαν από την αρχική "
 "δημοσίευση αυτού του άρθρου."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -707,31 +707,31 @@
 "for rejecting the product completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -743,7 +743,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "If we want to stop the bad news and create some good news, we need to "
@@ -768,12 +768,12 @@
 "μας."
 
 # type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Παραπομπές"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -786,7 +786,7 @@
 "Δικαιώματα Πνευματικής Ιδιοκτησίας [sic] 
(1995)."
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -797,7 +797,7 @@
 "Pamela Samuelson, Wired, Ιαν. 1996"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -805,7 +805,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Το 
ξεπούλημα</a>, "
 "James Boyle, New York Times, 31 Μαρτίου 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -816,7 +816,7 @@
 "δεδομένα ή ιδιωτικά δεδομένα</a>, Washington Post, 4 
Νοε 1996."
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.public-domain.org/\";>Union for the Public Domain</"
@@ -831,30 +831,19 @@
 "a>&mdash;ένας οργανισμός που έχει σκοπό να 
αντισταθεί και να αντιστρέψει την "
 "υπερ-εξάπλωση των δυνάμεων των πνευ
ματικών δικαιωμάτων και των πατεντών."
 
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Το δοκίμιο αυτό είναι δημοσιευμένο στο <a 
href=\"http://shop.fsf.org/product/";
-"free-software-free-society/\"><cite>Free Software, Free Society: The "
-"Selected Essays of Richard M. Stallman</cite></a>."
-
 # type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Άλλα κείμενα προς ανάγνωση"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">Φιλοσοφία του 
Έργου GNU</a>"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.computerworld.com/s/article/49358/";
@@ -869,6 +858,17 @@
 "Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">Προστασία 
αντιγραφής: "
 "Απλά πείτε Όχι</a>, Δημοσιεύτηκε στο Computer 
World."
 
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Το δοκίμιο αυτό είναι δημοσιευμένο στο <a 
href=\"http://shop.fsf.org/product/";
+"free-software-free-society/\"><cite>Free Software, Free Society: The "
+"Selected Essays of Richard M. Stallman</cite></a>."
+
 # type: Content of: <div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>

Index: po/right-to-read.es-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.es-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/right-to-read.es-en.html 20 Oct 2016 11:28:33 -0000      1.23
+++ po/right-to-read.es-en.html 6 Nov 2016 21:28:14 -0000       1.24
@@ -3,30 +3,60 @@
 <title>The Right to Read
 - GNU Project - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns > p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --></style>
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<h2 class="center">The Right to Read</h2>
 
-<p>
+<p class="byline center">
 by <a href="http://www.stallman.org/";><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
 <em>This article appeared in the February 1997 issue
 of <cite>Communications of the ACM</cite> (Volume 40, Number
 2).</em></p>
-<hr />
+<hr class="thin" />
 
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
             From <cite>The Road To Tycho</cite>, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 </p></blockquote>
 
+<div class="columns">
 <p>
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -62,7 +92,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -106,7 +139,10 @@
 knowing your computer's root password.  And neither
 the FBI nor
 Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -143,7 +179,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -153,6 +192,7 @@
 to Luna, where they found others who had likewise gravitated away from
 the long arm of the SPA.  When the Tycho Uprising began in 2062, the
 universal right to read soon became one of its central aims.</p>
+</div>
 
 <div class="announcement">
 <blockquote>
@@ -163,35 +203,46 @@
 <div id="AuthorsNote">
 <h3>Author's Notes</h3>
 
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it forwards into something more visibly
 oppressive. See <a
 href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>.
+</p>
+</div>
+<div class="column-limit"></div>
 </li>
 
 <li>
+<div class="reduced-width">
 <p>Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the <a href="http://DefectiveByDesign.org";>Defective by
 Design</a> campaign.  We ask for your support.</p>
-</li>
 
-<li>
 <p>The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.</p>
+</div>
+<div class="column-limit"></div>
 </li>
+</ul>
 
-<li>
+<blockquote class="info center">
 <p>The following note has been updated several times since the first
 publication of the story.</p>
+</blockquote>
 
+<ul class="no-bullet">
+<li>
+<div class="columns">
 <p>
 The battle for the right to read is already being fought.  Although it
 may take 50 years for our past freedoms to fade into obscurity, most
@@ -228,15 +279,20 @@
 Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
 Nonfree software tends to have <a href="/proprietary/">abusive
 features of many kinds</a>, which lead to the conclusion that
 <a href="/philosophy/free-software-even-more-important.html">you can
 never trust a nonfree program</a>.  We must insist on free (libre)
 software only, and reject nonfree programs.</p>
 
-<p>
+<p class="inline-block">
 With Windows Vista, Microsoft admitted it had built in a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
@@ -244,7 +300,12 @@
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
 10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the FBI and Microsoft will keep the
@@ -274,7 +335,12 @@
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this <em>restricted
 boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 In 1997, when this story was first published, the SPA was
 threatening small Internet service providers, demanding they permit
@@ -293,7 +359,12 @@
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
 software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="reduced-width">
 <p>
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -315,12 +386,15 @@
 <p>
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.</p>
+</div>
 </li>
 </ul>
+<div class="column-limit"></div>
 </div>
 
 <h3 id="BadNews">Bad News</h3>
 
+<div class="columns">
 <p>
 The battle for the right to read is going against us so far.
 The enemy is organized, and we are not.
@@ -344,10 +418,10 @@
 <li><p>It has DRM, which is intended to block users from
 sharing copies.</p></li>
 
-<li><p>It has a back door with which Amazon can remotely erase any book.
+<li><p class="inline-block">It has a back door with which Amazon can remotely 
erase any book.
 In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
 
-<li><p>In case all that isn't Orwellian enough, there is a universal
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is 
a universal
 back door with which Amazon can remotely change the software, and
 introduce any other form of nastiness.</p></li>
 </ul>
@@ -369,6 +443,7 @@
 our work more generally.  There is also a <a href="/help/help.html">list of 
ways
 to participate in our work</a>.
 </p>
+</div>
 
 <h3 id="References">References</h3>
 
@@ -394,13 +469,7 @@
        reverse the overextension of copyright and patent powers.</li>
 </ul>
 
-<hr />
-<blockquote id="fsfs"><p class="big">This essay is published
-in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Other Texts to Read</h5>
+<h4>Other Texts to Read</h4>
 
 <ul>
        <li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -409,6 +478,13 @@
                id="copy-protection">Copy Protection: Just Say No</a>,
                published in Computer World.</li>
 </ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -467,7 +543,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/10/20 11:28:33 $
+$Date: 2016/11/06 21:28:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/right-to-read.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.es.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- po/right-to-read.es.po      20 Oct 2016 11:20:38 -0000      1.46
+++ po/right-to-read.es.po      6 Nov 2016 21:28:14 -0000       1.47
@@ -14,7 +14,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-20 13:16+0200\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-10-20 13:14+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -49,7 +49,7 @@
 "<em>Este artículo se publicó en febrero de 1997 en  <cite>Communications of 
"
 "the ACM</cite> (Vol. 40, Número 2).</em>"
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -57,7 +57,7 @@
 "De <cite>El camino a Tycho</cite>, una colección de artículos sobre los "
 "antecedentes de la Revolución Lunar, publicado en Luna City en 2096."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -69,7 +69,7 @@
 "menos que consiguiera otro, sería reprobada en su trabajo de fin de "
 "trimestre. No se atrevía a pedírselo a nadie excepto a Dan."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -85,7 +85,7 @@
 "el mundo, desde la escuela primaria le habían enseñado que compartir libros 
"
 "es sucio y malo, cosa de piratas."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -107,7 +107,7 @@
 "recibiría un durísimo castigo por no tomar las medidas adecuadas para 
evitar "
 "el delito."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -131,7 +131,7 @@
 "investigación, en caso de ser citados frecuentemente, le reportaran los "
 "suficientes beneficios como para pagar el préstamo)."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -149,7 +149,7 @@
 "acceso público y gratuito a los artículos académicos eran ya solo un vago "
 "recuerdo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -168,7 +168,7 @@
 "traición a los estudiantes endeudados). En 2047 Frank estaba en la cárcel, "
 "pero no por lecturas piratas, sino por posesión de un depurador."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -186,7 +186,7 @@
 "los desarrolladores de esas herramientas de depuración fueron a parar a la "
 "cárcel."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -199,7 +199,7 @@
 "usado en sus clases de programación estaba detrás de un cortafuegos 
especial "
 "para que solo se pudiese utilizar en los ejercicios de clase."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It was also possible to bypass the copyright monitors by installing a "
 "modified system kernel.  Dan would eventually find out about the free "
@@ -218,7 +218,7 @@
 "ordenador, cosa que ni el FBI ni el servicio técnico de Microsoft estaban "
 "dispuestos a revelar."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -230,7 +230,7 @@
 "ella. Cada oportunidad de hablarle lo llenaba de alegría, y el hecho de que "
 "le hubiese pedido ayuda podía significar que ella también lo amaba."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -244,7 +244,7 @@
 "Seguía siendo un delito, pero la APS no lo detectaría automáticamente: 
solo "
 "podrían descubrirlo si Lissa lo denunciaba."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -264,7 +264,7 @@
 "control. Se daba por sentado que se estaba haciendo algo prohibido, no era "
 "preciso saber qué exactamente."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -275,7 +275,7 @@
 "de la universidad, con lo que inevitablemente serían reprobados en todas las 
"
 "asignaturas."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -289,7 +289,7 @@
 "en relación con la disciplina estudiantil: se castigaban las actividades "
 "perniciosas, no las que simplemente levantaran sospechas."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -311,7 +311,7 @@
 "en 2062, el derecho universal a leer se convirtió en una de sus proclamas "
 "fundamentales."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list "
 "about the dangers of e-books</a>."
@@ -319,11 +319,11 @@
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Inscríbase a nuestra "
 "lista de correo sobre los peligros de los libros electrónicos</a>."
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr "Notas del autor"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -340,7 +340,7 @@
 "sociedad en la que su opresividad resulta más patente. Véase <a href=\"/"
 "philosophy/words-to-avoid.html#Piracy\">«Piratería»</a>. "
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -355,7 +355,7 @@
 "la campaña <a href=\"http://DefectiveByDesign.org\";>Defective by Design</a>, 
"
 "para la que solicitamos su apoyo."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
@@ -363,7 +363,7 @@
 "La Electronic Frontier Foundation, una organización independiente, no "
 "vinculada a la Free Software Foundation, también hace campaña contra el 
DRM."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The following note has been updated several times since the first "
 "publication of the story."
@@ -371,7 +371,7 @@
 "La siguiente nota ha sido actualizada varias veces desde la primera "
 "publicación del cuento."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The battle for the right to read is already being fought.  Although it may "
 "take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -395,7 +395,7 @@
 "restricciones similares, aunque no tan fuertes, mediante una directiva sobre "
 "el copyright. "
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -414,7 +414,7 @@
 "de las muchas políticas injustas que esos tratados imponen en multitud de "
 "ámbitos. "
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -432,7 +432,7 @@
 "países del Pacífico. El TTIP impondría restricciones similares en Europa. "
 "Hay que abolir y poner fin a todos estos tratados. "
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
@@ -442,7 +442,7 @@
 "Wide Web Consortium</cite>, que está a punto de aprobar un sistema DRM como "
 "parte oficial de las especificaciones de la red."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -456,7 +456,7 @@
 "confiar en un programa que no sea libre</a>. Debemos exigir software libre, "
 "y rechazar programas privativos."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "With Windows Vista, Microsoft admitted it had built in a back door: "
 "Microsoft can use it to forcibly install software &ldquo;upgrades,&rdquo; "
@@ -474,7 +474,7 @@
 "era imponer a los usuarios un DRM que no pudieran saltarse. Por supuesto, "
 "Windows 10 no es mejor."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "One of the ideas in the story was not proposed in reality until 2002.  This "
 "is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -484,7 +484,7 @@
 "Es la idea de que el FBI y Microsoft guarden las claves de administrador de "
 "los ordenadores personales, y no las entreguen a los usuarios."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
@@ -494,7 +494,7 @@
 "«computación confiable» y «Palladium», aunque últimamente lo llaman "
 "«arranque seguro»."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "What Microsoft keeps is not exactly a password in the traditional sense; no "
 "person ever types it on a terminal.  Rather, it is a signature and "
@@ -515,7 +515,7 @@
 "a la NSA los errores de seguridad de Windows para que pueda aprovecharse de "
 "ellos."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -530,7 +530,7 @@
 "otro sistema (como GNU/Linux), lo hará bajo el control de Microsoft. A esto "
 "lo llamamos <em>arranque restringido</em>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "In 1997, when this story was first published, the SPA was threatening small "
 "Internet service providers, demanding they permit the SPA to monitor all "
@@ -548,7 +548,7 @@
 "rechazó esas exigencias y fue demandado. Posteriormente la SPA retiró la "
 "demanda; sin embargo, la DMCA le otorgó el poder que buscaba."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The SPA, which actually stands for Software Publishers Association, has been "
 "replaced in its police-like role by the Business Software Alliance.  The BSA "
@@ -568,7 +568,7 @@
 "2001, se lanzaron veladas amenazas de que las personas que comparten "
 "software serían violadas en prisión."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -578,7 +578,7 @@
 "ejemplo, un ordenador de una universidad del área de Chicago mostraba este "
 "mensaje al iniciar una sesión:"
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -604,7 +604,7 @@
 "autoridades universitarias y/o los agentes de la ley las pruebas derivadas "
 "de dicha monitorización."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -613,11 +613,11 @@
 "el mundo para que acceda a renunciar de antemano a los derechos que la "
 "enmienda les otorga. "
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "Malas noticias"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The battle for the right to read is going against us so far.  The enemy is "
 "organized, and we are not."
@@ -625,7 +625,7 @@
 "Hasta ahora la batalla por el derecho a leer no se está resolviendo a "
 "nuestro favor. El enemigo está organizado, y nosotros no. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -644,7 +644,7 @@
 "\">funcionalidades «orwellianas»</a>. Cualquiera de ellas es motivo "
 "suficiente para rechazar por completo el producto."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
@@ -654,11 +654,11 @@
 "qué página, e informa cuando el usuario marca un texto o hace alguna "
 "anotación."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr "Tiene DRM, para evitar que los usuarios compartan copias."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
@@ -666,7 +666,7 @@
 "Tiene una puerta trasera que permite a Amazon borrar por control remoto "
 "cualquier libro. En 2009 borraron miles de copias de 1984, de George Orwell."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
@@ -676,7 +676,7 @@
 "trasera universal mediante la cual Amazon puede cambiar el software por "
 "control remoto, y hacer cualquier otra fechoría."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -696,7 +696,7 @@
 "consiguiente, rechazo tales contratos, sean para software, libros "
 "electrónicos, música o cualquier otra cosa.,"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we want to stop the bad news and create some good news, we need to "
 "organize and fight.  Subscribe to the FSF's <a href=\"http://";
@@ -712,11 +712,11 @@
 "la FSF</a> para apoyar nuestra labor más en general. Hay también una <a 
href="
 "\"/help/help.html\">lista de maneras de participar en nuestro trabajo</a>."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Referencias"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -729,7 +729,7 @@
 "the Working Group on Intellectual Property</cite> [sic] <cite>Rights (1995)</"
 "cite>."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -739,7 +739,7 @@
 "\">Explicación del «Libro Blanco»: <cite>The Copyright Grab</cite></a>, "
 "<cite>Pamela Samuelson, Wired, Jan. 1996</cite>."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -747,7 +747,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";><cite>Sold Out</"
 "cite></a>, <cite>James Boyle, New York Times, 31 March 1996</cite>."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -757,7 +757,7 @@
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
 "Private Data</a>, Washington Post, 4 Nov 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"https://web.archive.org/web/20151113122141/http://public-domain.";
 "org/\">Union for the Public Domain</a>&mdash;an organization which aims to "
@@ -768,26 +768,16 @@
 "objetivo es oponerse a la excesiva extensión de los poderes del copyright y "
 "de las patentes y revertir esta situación."
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Este ensayo está publicado en el libro <a 
href=\"http://shop.fsf.org/product/";
-"free-software-free-society/\"><cite>Software libre para una sociedad libre: "
-"Selección de ensayos de Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Otros textos para leer"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">Filosofía del Proyecto 
GNU</a>"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.computerworld.com/article/2596679/networking/copy-";
 "protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -797,6 +787,16 @@
 "protection--just-say-no.html\" id=\"copy-protection\"><cite>Copy Protection: "
 "Just Say No</cite></a>, publicado en <cite>Computer World</cite>."
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Este ensayo está publicado en el libro <a 
href=\"http://shop.fsf.org/product/";
+"free-software-free-society/\"><cite>Software libre para una sociedad libre: "
+"Selección de ensayos de Richard M. Stallman</cite></a>."
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/right-to-read.fa.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.fa.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- po/right-to-read.fa.po      18 Oct 2016 16:29:50 -0000      1.53
+++ po/right-to-read.fa.po      6 Nov 2016 21:28:15 -0000       1.54
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2009-05-15 11:16+0330\n"
 "Last-Translator: Abbas Esmaeeli Some'eh <address@hidden>\n"
 "Language-Team: Persian <address@hidden>\n"
@@ -49,7 +49,7 @@
 "strong> (سال ۴۰، شمارهٔ ۲) به چاپ رسیده است.</em>"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -58,7 +58,7 @@
 "سابق ماه‌نشینان، انتشار یافته در شهر الهه 
ماه، سال ۲۰۹۶"
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -71,7 +71,7 @@
 "به غیر از دن شخص دیگری وجود نداشت که لیزا 
بتواند چنین تقاضایی از او کند."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -88,7 +88,7 @@
 "است&mdash;کاری که تنها دزدان ادبی انجام م
ی‌دهند."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -109,7 +109,7 @@
 "جلوگیری از وقوع این جنایت را پذیرا نشده 
بود."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -132,7 +132,7 @@
 "قرض‌های خود را پرداخت کند.)"
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -150,7 +150,7 @@
 "خاطره‌ای مبهم بدل شده بود."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -170,7 +170,7 @@
 "خاطر در اختیار داشتن یک ابزار 
اشکال‌زدایی."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -187,7 +187,7 @@
 "ابزارهای اشکال‌زدایی غیر قانونی هستند؛ و 
توسعه‌دهندگانشان به زندان افکنده شدند."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -201,7 +201,7 @@
 "تنها می‌توانست از آن برای تمرینات کلاسی 
استفاده کند."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "It was also possible to bypass the copyright monitors by installing a "
@@ -230,7 +230,7 @@
 "اشخاص قرار نخواهند داد."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -243,7 +243,7 @@
 "نشانهٔ این باشد که لیزا نیز دوستش دارد."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -258,7 +258,7 @@
 "تنها اگر لیزا گزارش می‌داد، متوجه م
ی‌شدند."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -278,7 +278,7 @@
 "انجام عملی غیر قانونی هستید، و احتیاجی 
نبود بدانند که حقیقتا چه کار می‌کردید."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -289,7 +289,7 @@
 "حتم در دروس خود مردود می‌شدند."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -304,7 +304,7 @@
 "انجام این کار هستند."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -324,19 +324,19 @@
 "هنگامی که قیامِ تایکو در سال ۲۰۶۲ اتفاق 
افتاد، حق عمومیِ مطالعه به یکی از "
 "اهداف اصلی قیام تبدیل گشت."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list "
 "about the dangers of e-books</a>."
 msgstr ""
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 #, fuzzy
 #| msgid "Author's Note"
 msgid "Author's Notes"
 msgstr "یادداشت نویسنده"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -346,7 +346,7 @@
 "philosophy/words-to-avoid.html#Piracy\">&ldquo;Piracy&rdquo;</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -355,13 +355,13 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid "This note was updated in 2007."
 msgid ""
@@ -369,7 +369,7 @@
 "publication of the story."
 msgstr "[این یادداشت در سال ۲۰۰۷ به روز شده 
است.]"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The right to read is a battle being fought today.  Although it may take "
@@ -403,7 +403,7 @@
 "DADVSI که در سال ۲۰۰۶ تصویب شد، تنها در اختیار 
داشتن DeCSS، یک نرم‌افزار آزاد "
 "برای کدگشاییِ فیلم‌های DVD، جرم محسوب م
ی‌شود."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -414,7 +414,7 @@
 "these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -425,14 +425,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -441,7 +441,7 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -460,7 +460,7 @@
 "می‌تواند نصب به‌روزرسان‌ها را تحمیل 
کند، و یا به تمام سیستم‌هایی که دارای ویستا 
"
 "هستند دستور دهد تا از اجرای بعضی 
راه‌اندازهای سخت‌افزاری سر باز زنند."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "One of the ideas in the story was not proposed in reality until 2002.  "
@@ -475,14 +475,14 @@
 "این تصور که <abbr>FBI</abbr> و مایکروسافت رمز عبور 
ریشهٔ کامپیوترتان را از "
 "شما مخفی کنند."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
 "into use, it is called &ldquo;secure boot&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -508,7 +508,7 @@
 "قادر می‌سازد تا کنترلی بدون محدودیت بر 
آنچه یک کاربر در کامپیوتر خود انجام "
 "می‌دهد اعمال کنند."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -517,7 +517,7 @@
 "control.  We call this <em>restricted boot</em>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "When this story was first written, the SPA was threatening small Internet "
@@ -545,7 +545,7 @@
 "حقیقتا اقامهٔ دعوی نمود. بعدها SPA از این 
اقدام خود دست کشید، اما DMCA را به "
 "دست آورد که آنچه را به دنبالش بود فراهم م
ی‌آورد."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The SPA, which actually stands for Software Publishers Association, has "
@@ -572,7 +572,7 @@
 "تقریبا به طور واضح مردم را تهدید کرد که اگر 
نرم‌افزارها را به اشتراک بگذارند، "
 "بازداشت خواهند شد."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The university security policies described above are not imaginary.  For "
@@ -587,7 +587,7 @@
 "کامپیوترهای دانشگاه شیگاگو هنگام ورود به 
سیستم چنین پیغامی را نمایش می‌دهند "
 "(پیغام بدون تغییر نقل شده است):"
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -609,7 +609,7 @@
 "خلاف تعهدنامهٔ مسئولان سیستم را آشکار نم
ود، ممکن است به عنوان مدرکی برای "
 "مسئولان دانشگاه و یا مجریان قانون مورد 
استفاده قرار گیرد."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -619,11 +619,11 @@
 "گیرد، به مراجع قانونی بدهند .مترجم] است: م
جبور ساختن افراد تا پیشاپیش از "
 "حقوق خود چشم‌پوشی کنند."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The <a href=\"#AuthorsNote\">author's note</a> talks about the battle for "
@@ -639,7 +639,7 @@
 "پیوندها به مقالاتی دربارهٔ فناوری‌هایی 
اشاره می‌کنند که به منظور نفی حقوق شما "
 "برای مطالعه توسعه یافته‌اند.‌"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -650,31 +650,31 @@
 "for rejecting the product completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -686,7 +686,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we want to stop the bad news and create some good news, we need to "
 "organize and fight.  Subscribe to the FSF's <a href=\"http://";
@@ -696,11 +696,11 @@
 "of ways to participate in our work</a>."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "مراجع"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "The administration's &ldquo;White Paper&rdquo;: Information "
@@ -716,7 +716,7 @@
 "گزارش هیئت دولت: زیرسازیِ اطلاعات، م
حصولات هوشمند و زیرسازیِ اطلاعاتِ ملی: "
 "گزارشِ انجمنِ تحقیق بر روی قوانینِ م
حصولات هوشمند (۱۹۹۵)."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -726,7 +726,7 @@
 "\">توصیفی بر گزارش هیئت دولت: تصرفِ 
کپی‌رایت</a>، Pamela Samuelson، Wired، "
 "ژوئن ۱۹۹۶"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -734,7 +734,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>فروخته 
شد</a>، "
 "James Boyle، نیویورک تایمز، ۳۱ مارس ۱۹۹۶"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -744,7 +744,7 @@
 "people.org/archives/interesting-people/199611/msg00012.html\">اطلاعات 
عمومی "
 "یا اطلاعات محرمانه</a>، واشنگتن پست، ۴ نوام
بر ۱۹۹۶."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.public-domain.org/\";>Union for the Public Domain</"
@@ -759,26 +759,16 @@
 "سازمانی که هدف آن مقاومت در برابر گسترش 
بیش از حدِ قدرتِ کپی‌رایت و حق امتیاز "
 "انحصاری، و معکوس کردن روند آن است."
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"این مقاله در <a 
href=\"http://shop.fsf.org/product/free-software-free-";
-"society/\"><cite>نرم‌افزار آزاد، جامعهٔ آزاد: م
نتخب مقالات ریچارد استالمن</"
-"cite></a> منتشر شده است."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "برای مطالعهٔ بیشتر"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">فلسفه پروژه 
گنو</a>"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.computerworld.com/s/article/49358/";
@@ -793,6 +783,16 @@
 "Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">حفاظت از 
کپی‌برداری: "
 "بگویید نه</a>، منتشر شده در Computer World."
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"این مقاله در <a 
href=\"http://shop.fsf.org/product/free-software-free-";
+"society/\"><cite>نرم‌افزار آزاد، جامعهٔ آزاد: م
نتخب مقالات ریچارد استالمن</"
+"cite></a> منتشر شده است."
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/right-to-read.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.fr-en.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- po/right-to-read.fr-en.html 20 Oct 2016 08:59:04 -0000      1.55
+++ po/right-to-read.fr-en.html 6 Nov 2016 21:28:15 -0000       1.56
@@ -3,30 +3,60 @@
 <title>The Right to Read
 - GNU Project - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns > p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --></style>
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<h2 class="center">The Right to Read</h2>
 
-<p>
+<p class="byline center">
 by <a href="http://www.stallman.org/";><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
 <em>This article appeared in the February 1997 issue
 of <cite>Communications of the ACM</cite> (Volume 40, Number
 2).</em></p>
-<hr />
+<hr class="thin" />
 
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
             From <cite>The Road To Tycho</cite>, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 </p></blockquote>
 
+<div class="columns">
 <p>
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -62,7 +92,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -106,7 +139,10 @@
 knowing your computer's root password.  And neither
 the FBI nor
 Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -143,7 +179,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -153,6 +192,7 @@
 to Luna, where they found others who had likewise gravitated away from
 the long arm of the SPA.  When the Tycho Uprising began in 2062, the
 universal right to read soon became one of its central aims.</p>
+</div>
 
 <div class="announcement">
 <blockquote>
@@ -163,35 +203,46 @@
 <div id="AuthorsNote">
 <h3>Author's Notes</h3>
 
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it forwards into something more visibly
 oppressive. See <a
 href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>.
+</p>
+</div>
+<div class="column-limit"></div>
 </li>
 
 <li>
+<div class="reduced-width">
 <p>Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the <a href="http://DefectiveByDesign.org";>Defective by
 Design</a> campaign.  We ask for your support.</p>
-</li>
 
-<li>
 <p>The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.</p>
+</div>
+<div class="column-limit"></div>
 </li>
+</ul>
 
-<li>
+<blockquote class="info center">
 <p>The following note has been updated several times since the first
 publication of the story.</p>
+</blockquote>
 
+<ul class="no-bullet">
+<li>
+<div class="columns">
 <p>
 The battle for the right to read is already being fought.  Although it
 may take 50 years for our past freedoms to fade into obscurity, most
@@ -228,15 +279,20 @@
 Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
 Nonfree software tends to have <a href="/proprietary/">abusive
 features of many kinds</a>, which lead to the conclusion that
 <a href="/philosophy/free-software-even-more-important.html">you can
 never trust a nonfree program</a>.  We must insist on free (libre)
 software only, and reject nonfree programs.</p>
 
-<p>
+<p class="inline-block">
 With Windows Vista, Microsoft admitted it had built in a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
@@ -244,7 +300,12 @@
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
 10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the FBI and Microsoft will keep the
@@ -274,7 +335,12 @@
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this <em>restricted
 boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 In 1997, when this story was first published, the SPA was
 threatening small Internet service providers, demanding they permit
@@ -293,7 +359,12 @@
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
 software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="reduced-width">
 <p>
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -315,12 +386,15 @@
 <p>
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.</p>
+</div>
 </li>
 </ul>
+<div class="column-limit"></div>
 </div>
 
 <h3 id="BadNews">Bad News</h3>
 
+<div class="columns">
 <p>
 The battle for the right to read is going against us so far.
 The enemy is organized, and we are not.
@@ -344,10 +418,10 @@
 <li><p>It has DRM, which is intended to block users from
 sharing copies.</p></li>
 
-<li><p>It has a back door with which Amazon can remotely erase any book.
+<li><p class="inline-block">It has a back door with which Amazon can remotely 
erase any book.
 In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
 
-<li><p>In case all that isn't Orwellian enough, there is a universal
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is 
a universal
 back door with which Amazon can remotely change the software, and
 introduce any other form of nastiness.</p></li>
 </ul>
@@ -369,6 +443,7 @@
 our work more generally.  There is also a <a href="/help/help.html">list of 
ways
 to participate in our work</a>.
 </p>
+</div>
 
 <h3 id="References">References</h3>
 
@@ -394,13 +469,7 @@
        reverse the overextension of copyright and patent powers.</li>
 </ul>
 
-<hr />
-<blockquote id="fsfs"><p class="big">This essay is published
-in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Other Texts to Read</h5>
+<h4>Other Texts to Read</h4>
 
 <ul>
        <li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -409,6 +478,13 @@
                id="copy-protection">Copy Protection: Just Say No</a>,
                published in Computer World.</li>
 </ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -467,7 +543,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/10/20 08:59:04 $
+$Date: 2016/11/06 21:28:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/right-to-read.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.fr.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- po/right-to-read.fr.po      20 Oct 2016 18:54:30 -0000      1.116
+++ po/right-to-read.fr.po      6 Nov 2016 21:28:15 -0000       1.117
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-10-20 20:51+0200\n"
 "Last-Translator: Sébastien Poher <sbphr @T volted.net>\n"
 "Language-Team: French <address@hidden>\n"
@@ -43,7 +43,7 @@
 "<em>Cet article a été publié dans la parution de février 1997 de "
 "<cite>Communications of the ACM</cite> (volume 40, numéro 2).</em>"
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -51,7 +51,7 @@
 "Extrait de <cite>The Road to Tycho</cite>, une collection d'articles sur les "
 "antécédents de la révolution lunaire publiée à Luna City en 2096."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -64,7 +64,7 @@
 "de mi-session. Il n'y avait personne d'autre à qui elle osait demander, à "
 "part Dan."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -80,7 +80,7 @@
 "lui avait enseigné dès l'école primaire que partager des livres était "
 "vicieux et immoral – une chose que seuls les pirates font."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -102,7 +102,7 @@
 "compte. Dan, comme propriétaire d'ordinateur, subirait la punition la plus "
 "sévère – pour ne pas avoir tout tenté pour éviter l'infraction."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -126,7 +126,7 @@
 "propres articles scientifiques, s'ils étaient souvent référencés, lui "
 "rapporteraient assez pour rembourser sa dette)."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -144,7 +144,7 @@
 "En 2047, les bibliothèques offrant un accès public gratuit à la 
littérature "
 "scientifique n'étaient qu'un pâle souvenir."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -164,7 +164,7 @@
 "par la trahison). En 2047, Frank était en prison, non pas pour lecture "
 "pirate, mais pour possession d'un débogueur."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -182,7 +182,7 @@
 "dire qu'ils étaient illégaux ; les développeurs de ces débogueurs furent 
"
 "envoyés en prison."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -196,7 +196,7 @@
 "programmation était gardé derrière un pare-feu spécial afin qu'il puisse "
 "uniquement servir aux exercices du cours."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It was also possible to bypass the copyright monitors by installing a "
 "modified system kernel.  Dan would eventually find out about the free "
@@ -215,7 +215,7 @@
 "ordinateur. Or, ni le FBI ni l'Aide technique Microsoft ne vous le "
 "révèlerait."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -227,7 +227,7 @@
 "occasion de lui parler le remplissait de bonheur. Et le fait qu'elle l'avait "
 "choisi pour demander de l'aide pouvait signifier qu'elle l'aimait aussi."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -242,7 +242,7 @@
 "pas compte automatiquement. Elle ne s'en rendrait compte que si Lissa le "
 "dénonçait."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -263,7 +263,7 @@
 "dire que vous étiez en train de faire quelque chose d'interdit et ils se "
 "moquaient de savoir de quoi il s'agissait."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -273,7 +273,7 @@
 "immédiatement. À la place, ils étaient bannis des systèmes informatiques 
de "
 "l'école et échouaient inévitablement à leurs examens."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -288,7 +288,7 @@
 "punissaient les activités qui causaient du tort et pas celles qui "
 "éveillaient simplement des soupçons."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -309,7 +309,7 @@
 "Tycho commença en 2062, le droit universel de lire devint bientôt un de ses 
"
 "objectifs principaux."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list "
 "about the dangers of e-books</a>."
@@ -318,11 +318,11 @@
 "liste de diffusion (en anglais) concernant les dangers des livres "
 "électroniques</a>."
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr "Notes de l'auteur"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -339,7 +339,7 @@
 "tyrannique. Consultez « <a href=\"/philosophy/words-to-avoid.html#Piracy"
 "\">Piratage</a> »."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -355,7 +355,7 @@
 "DefectiveByDesign.org\">Defective by Design</a></cite>.<a id=\"TransNote2-rev"
 "\" href=\"#TransNote2\"><sup>2</sup></a>. Nous demandons votre soutien."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
@@ -364,7 +364,7 @@
 "lien avec la <cite>Free Software Fondation</cite>, fait également campagne "
 "contre les DRM."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The following note has been updated several times since the first "
 "publication of the story."
@@ -372,7 +372,7 @@
 "La note suivante a été modifiée plusieurs fois depuis la première "
 "publication de cette histoire."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The battle for the right to read is already being fought.  Although it may "
 "take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -396,7 +396,7 @@
 "restrictions similaires sous une forme un peu moins rigoureuse dans une "
 "directive de 2001 sur le copyright."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -415,7 +415,7 @@
 "est l'une des nombreuses politiques injustes que ces traités imposent dans "
 "les domaines les plus variés."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -438,7 +438,7 @@
 "du Pacifique. Le TIPP imposerait des restrictions similaires à l'Europe. "
 "Tous ces traités doivent être repoussés ou abolis."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
@@ -448,7 +448,7 @@
 "de l'industrie du copyright; il est sur le point d'approuver l'inscription "
 "officielle d'un système de DRM dans les spécifications du web."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -463,7 +463,7 @@
 "devons exiger du logiciel exclusivement libre et rejeter les programmes non "
 "libres."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "With Windows Vista, Microsoft admitted it had built in a back door: "
 "Microsoft can use it to forcibly install software &ldquo;upgrades,&rdquo; "
@@ -481,7 +481,7 @@
 "d'imposer des DRM que les utilisateurs ne pourraient pas outrepasser. Bien "
 "sûr, Windows 10 n'a rien à lui envier."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "One of the ideas in the story was not proposed in reality until 2002.  This "
 "is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -492,7 +492,7 @@
 "administrateur (root) de vos ordinateurs et ne vous permettraient pas de les "
 "posséder."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
@@ -503,7 +503,7 @@
 "il a été finalement mis en place, il s'appelle « démarrage sécurisé 
» <cite>"
 "[secure boot]</cite>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "What Microsoft keeps is not exactly a password in the traditional sense; no "
 "person ever types it on a terminal.  Rather, it is a signature and "
@@ -524,7 +524,7 @@
 "demande : elle <a href=\"/proprietary/malware-microsoft.html\">montre déjà 
"
 "au FBI les failles de sécurité de Windows</a> pour qu'il les exploite."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -539,7 +539,7 @@
 "autre système (GNU/Linux par exemple) appartient à Microsoft. Nous appelons 
"
 "cela <em>démarrage restreint</em> <cite>[restricted boot]</cite>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "In 1997, when this story was first published, the SPA was threatening small "
 "Internet service providers, demanding they permit the SPA to monitor all "
@@ -557,7 +557,7 @@
 "la SPA a laissé tomber la plainte mais la DMCA lui a donné le pouvoir "
 "qu'elle recherchait."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The SPA, which actually stands for Software Publishers Association, has been "
 "replaced in its police-like role by the Business Software Alliance.  The BSA "
@@ -577,7 +577,7 @@
 "Argentine, des menaces à peine voilées ont été faites, selon lesquelles 
les "
 "gens partageant du logiciel seraient violés en prison."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -587,7 +587,7 @@
 "imaginaires. Par exemple, un ordinateur dans une université de la région de 
"
 "Chicago affiche le message suivant au login :"
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -613,7 +613,7 @@
 "système peuvent fournir ces indices aux autorités de l'université ou aux "
 "forces de l'ordre."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -622,11 +622,11 @@
 "presque tous les gens à accepter d'avance de renoncer aux droits qu'il leur "
 "accorde."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "Mauvaises nouvelles"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The battle for the right to read is going against us so far.  The enemy is "
 "organized, and we are not."
@@ -634,7 +634,7 @@
 "Jusqu'à présent, la bataille pour le droit de lire tourne à notre 
détriment. "
 "L'ennemi est organisé alors que nous ne le sommes pas."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -654,7 +654,7 @@
 "avérées dont n'importe laquelle est une raison de rejeter complètement le "
 "produit."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
@@ -664,12 +664,12 @@
 "livre il est en train de lire, quelle page, à quel moment il souligne du "
 "texte et quelles notes il prend."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 "Elle a un DRM conçu pour empêcher l'utilisateur de partager des copies."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
@@ -678,7 +678,7 @@
 "n'importe quel livre. En 2009, elle a effacé des milliers de copies de "
 "« 1984 », le roman de George Orwell."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
@@ -688,7 +688,7 @@
 "universelle par laquelle Amazon peut modifier le logiciel à distance et "
 "introduire n'importe quelle autre forme de vilainie."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -709,7 +709,7 @@
 "C'est pourquoi je refuse de signer ce genre de contrat, que ce soit pour du "
 "logiciel, des livres électroniques, de la musique ou n'importe quoi d'autre."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we want to stop the bad news and create some good news, we need to "
 "organize and fight.  Subscribe to the FSF's <a href=\"http://";
@@ -726,11 +726,11 @@
 "travail. Il y a aussi de nombreux moyens d'y <a href=\"/help/help.html"
 "\">participer</a>."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Références"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -742,7 +742,7 @@
 "\">sic</a>] and the National Information Infrastructure: The Report of the "
 "Working Group on Intellectual Property [sic] Rights (1995)."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -752,7 +752,7 @@
 "archive/4.01/white.paper_pr.html\">The Copyright Grab</a>, Pamela Samuelson, 
"
 "<cite>Wired</cite>, janv. 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -760,7 +760,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, <cite>New York Times</cite>, 31 mars 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -770,7 +770,7 @@
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
 "Private Data</a>, <cite>Washington Post</cite>, 4 nov. 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"https://web.archive.org/web/20151113122141/http://public-domain.";
 "org/\">Union for the Public Domain</a>&mdash;an organization which aims to "
@@ -781,26 +781,16 @@
 "le but est de résister à l'extension débridée des pouvoirs du copyright 
et "
 "des brevets, et de faire marche arrière."
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Cet essai est publié dans <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Autres textes à lire"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">Philosophie du projet GNU</a>"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.computerworld.com/article/2596679/networking/copy-";
 "protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -810,6 +800,16 @@
 "protection--just-say-no.html\" id=\"copy-protection\"> Copy Protection: Just "
 "Say No</a>, publié dans <cite>Computer World</cite>."
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Cet essai est publié dans <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/right-to-read.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.it-en.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- po/right-to-read.it-en.html 20 Oct 2016 20:27:37 -0000      1.32
+++ po/right-to-read.it-en.html 6 Nov 2016 21:28:15 -0000       1.33
@@ -3,30 +3,60 @@
 <title>The Right to Read
 - GNU Project - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns > p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --></style>
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<h2 class="center">The Right to Read</h2>
 
-<p>
+<p class="byline center">
 by <a href="http://www.stallman.org/";><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
 <em>This article appeared in the February 1997 issue
 of <cite>Communications of the ACM</cite> (Volume 40, Number
 2).</em></p>
-<hr />
+<hr class="thin" />
 
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
             From <cite>The Road To Tycho</cite>, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 </p></blockquote>
 
+<div class="columns">
 <p>
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -62,7 +92,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -106,7 +139,10 @@
 knowing your computer's root password.  And neither
 the FBI nor
 Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -143,7 +179,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -153,6 +192,7 @@
 to Luna, where they found others who had likewise gravitated away from
 the long arm of the SPA.  When the Tycho Uprising began in 2062, the
 universal right to read soon became one of its central aims.</p>
+</div>
 
 <div class="announcement">
 <blockquote>
@@ -163,35 +203,46 @@
 <div id="AuthorsNote">
 <h3>Author's Notes</h3>
 
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it forwards into something more visibly
 oppressive. See <a
 href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>.
+</p>
+</div>
+<div class="column-limit"></div>
 </li>
 
 <li>
+<div class="reduced-width">
 <p>Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the <a href="http://DefectiveByDesign.org";>Defective by
 Design</a> campaign.  We ask for your support.</p>
-</li>
 
-<li>
 <p>The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.</p>
+</div>
+<div class="column-limit"></div>
 </li>
+</ul>
 
-<li>
+<blockquote class="info center">
 <p>The following note has been updated several times since the first
 publication of the story.</p>
+</blockquote>
 
+<ul class="no-bullet">
+<li>
+<div class="columns">
 <p>
 The battle for the right to read is already being fought.  Although it
 may take 50 years for our past freedoms to fade into obscurity, most
@@ -228,15 +279,20 @@
 Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
 Nonfree software tends to have <a href="/proprietary/">abusive
 features of many kinds</a>, which lead to the conclusion that
 <a href="/philosophy/free-software-even-more-important.html">you can
 never trust a nonfree program</a>.  We must insist on free (libre)
 software only, and reject nonfree programs.</p>
 
-<p>
+<p class="inline-block">
 With Windows Vista, Microsoft admitted it had built in a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
@@ -244,7 +300,12 @@
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
 10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the FBI and Microsoft will keep the
@@ -274,7 +335,12 @@
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this <em>restricted
 boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 In 1997, when this story was first published, the SPA was
 threatening small Internet service providers, demanding they permit
@@ -293,7 +359,12 @@
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
 software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="reduced-width">
 <p>
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -315,12 +386,15 @@
 <p>
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.</p>
+</div>
 </li>
 </ul>
+<div class="column-limit"></div>
 </div>
 
 <h3 id="BadNews">Bad News</h3>
 
+<div class="columns">
 <p>
 The battle for the right to read is going against us so far.
 The enemy is organized, and we are not.
@@ -344,10 +418,10 @@
 <li><p>It has DRM, which is intended to block users from
 sharing copies.</p></li>
 
-<li><p>It has a back door with which Amazon can remotely erase any book.
+<li><p class="inline-block">It has a back door with which Amazon can remotely 
erase any book.
 In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
 
-<li><p>In case all that isn't Orwellian enough, there is a universal
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is 
a universal
 back door with which Amazon can remotely change the software, and
 introduce any other form of nastiness.</p></li>
 </ul>
@@ -369,6 +443,7 @@
 our work more generally.  There is also a <a href="/help/help.html">list of 
ways
 to participate in our work</a>.
 </p>
+</div>
 
 <h3 id="References">References</h3>
 
@@ -394,13 +469,7 @@
        reverse the overextension of copyright and patent powers.</li>
 </ul>
 
-<hr />
-<blockquote id="fsfs"><p class="big">This essay is published
-in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Other Texts to Read</h5>
+<h4>Other Texts to Read</h4>
 
 <ul>
        <li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -409,6 +478,13 @@
                id="copy-protection">Copy Protection: Just Say No</a>,
                published in Computer World.</li>
 </ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -467,7 +543,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/10/20 20:27:37 $
+$Date: 2016/11/06 21:28:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/right-to-read.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.it.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- po/right-to-read.it.po      20 Oct 2016 20:27:37 -0000      1.105
+++ po/right-to-read.it.po      6 Nov 2016 21:28:15 -0000       1.106
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-10-20 22:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian\n"
@@ -44,7 +44,7 @@
 "<cite>Communications of the ACM</cite> (volume 40, numero 2).</em>"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -53,7 +53,7 @@
 "antefatti della Rivoluzione Lunare, pubblicata a Città della Luna nel 2096."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -66,7 +66,7 @@
 "prestito. E Dan era l'unico a cui avrebbe osato chiederlo."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -83,7 +83,7 @@
 "sbagliata, una cosa da pirati."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -105,7 +105,7 @@
 "dura, per la sua negligenza nel prevenire il crimine."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -130,7 +130,7 @@
 "abbastanza spesso."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -149,7 +149,7 @@
 "erano che un pallido ricordo."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -170,7 +170,7 @@
 "debugger."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -188,7 +188,7 @@
 "gli autori di debugger furono imprigionati."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -202,7 +202,7 @@
 "che lo confinava unicamente all'uso per gli esercizi in classe."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It was also possible to bypass the copyright monitors by installing a "
 "modified system kernel.  Dan would eventually find out about the free "
@@ -221,7 +221,7 @@
 "della Microsoft te l'avrebbero mai svelata."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -234,7 +234,7 @@
 "questo poteva voler dire che anche lei lo amava."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -249,7 +249,7 @@
 "accorta a meno che Lissa non lo denunciasse."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -271,7 +271,7 @@
 "proibito, senza bisogno di sapere cosa."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -282,7 +282,7 @@
 "inevitabilmente avrebbero fallito in tutti i corsi."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -298,7 +298,7 @@
 "sospetti."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -319,7 +319,7 @@
 "Tycho nel 2062, il diritto universale a leggere ne divenne presto uno degli "
 "obiettivi centrali."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list "
 "about the dangers of e-books</a>."
@@ -328,11 +328,11 @@
 "mailing list sui rischi degli e-book</a>."
 
 # type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr "Note dell'autore"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -349,7 +349,7 @@
 "Vedere <a href=\"/philosophy/words-to-avoid.html#Piracy\">&ldquo;"
 "Pirateria&rdquo;</a>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -363,7 +363,7 @@
 "Software Foundation ha lanciato la campagna <a href=\"http://";
 "DefectiveByDesign.org\">Defective by Design</a> e chiede il vostro aiuto."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
@@ -372,7 +372,7 @@
 "collegata alla Free Software Foundation, organizza campagne contro i DRM."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The following note has been updated several times since the first "
 "publication of the story."
@@ -381,7 +381,7 @@
 "storia."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The battle for the right to read is already being fought.  Although it may "
 "take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -404,7 +404,7 @@
 "restrizioni simili, anche se non altrettanto forti, in una direttiva del "
 "2001 sul diritto d'autore."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -422,7 +422,7 @@
 "criminalizzare i programmi che aggirano i DRM è una fra le tante politiche "
 "ingiuste imposte da questi trattati in vari campi."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -439,7 +439,7 @@
 "Pacifico. TTIP farebbe lo stesso in Europa. Tutti questi trattati devono "
 "essere superati o aboliti."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
@@ -448,7 +448,7 @@
 "Anche il World Wide Web Consortium sta cedendo al potere delle aziende; sta "
 "per approvare un sistema DRM come parte ufficiale delle specifiche del web."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -461,7 +461,7 @@
 "software-even-more-important.html\">non si può mai avere fiducia in un "
 "programma non libero</a>.  Dobbiamo respingere i programmi non liberi."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "With Windows Vista, Microsoft admitted it had built in a back door: "
 "Microsoft can use it to forcibly install software &ldquo;upgrades,&rdquo; "
@@ -477,7 +477,7 @@
 "l'utente non potesse superare. Ovviamente Windows 10 non è migliore."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "One of the ideas in the story was not proposed in reality until 2002.  This "
 "is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -487,7 +487,7 @@
 "2002, quella che l'FBI e Microsoft terranno le parole segrete primarie per "
 "il tuo computer personale, senza fornirtele."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
@@ -498,7 +498,7 @@
 "come &ldquo;secure boot&rdquo;."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "What Microsoft keeps is not exactly a password in the traditional sense; no "
 "person ever types it on a terminal.  Rather, it is a signature and "
@@ -518,7 +518,7 @@
 "dell'FBI quando le verrà chiesto di farlo: già ora <a href=\"/proprietary/"
 "malware-microsoft.html\">mostra alla NSA bug di sicurezza in Windows</a>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -533,7 +533,7 @@
 "controllo di Microsoft. Noi lo chiamiamo <em>restricted boot</em>."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "In 1997, when this story was first published, the SPA was threatening small "
 "Internet service providers, demanding they permit the SPA to monitor all "
@@ -551,7 +551,7 @@
 "loro il potere che cercavano."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The SPA, which actually stands for Software Publishers Association, has been "
 "replaced in its police-like role by the Business Software Alliance.  The BSA "
@@ -571,7 +571,7 @@
 "il software sarebbero state violentate in carcere."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -582,7 +582,7 @@
 "nell'area di Chicago si poteva leggere, al momento dell'accesso:"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -608,7 +608,7 @@
 "dell'Università e/o a agenti dell'ordine pubblico."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -616,11 +616,11 @@
 "È invero un approccio interessante al Quarto Emendamento: pressare da subito 
"
 "i più a rinunciare ai propri diritti che questo garantisce."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "Cattive notizie"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The battle for the right to read is going against us so far.  The enemy is "
 "organized, and we are not."
@@ -628,7 +628,7 @@
 "La battaglia per il diritto a leggere è già in corso, e stiamo subendo. Il "
 "nemico è organizzato e noi non lo siamo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -646,7 +646,7 @@
 "\">funzioni Orwelliane</a>, ciascuna delle quali abbastanza grave per "
 "abbandonare il prodotto:"
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
@@ -655,11 +655,11 @@
 "Spia il lettore: riferisce quale libro viene letto, a quale pagina, e "
 "traccia le sottolineature e le note."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr "Ha DRM per evitare che gli utenti condividano copie."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
@@ -668,7 +668,7 @@
 "libro e che nel 2009 è stata usata per cancellare copie del libro \"1984\" "
 "di George Orwell."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
@@ -678,7 +678,7 @@
 "Amazon può cambiare il software da remoto, introducendo qualsiasi tipo di "
 "funzioni."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -696,7 +696,7 @@
 "di accettare questi contratti, per software, e-book, musica o qualsiasi "
 "altra cosa."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we want to stop the bad news and create some good news, we need to "
 "organize and fight.  Subscribe to the FSF's <a href=\"http://";
@@ -713,12 +713,12 @@
 "\"/help/help.html\">modi per aiutare il nostro lavoro</a>."
 
 # type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Riferimenti"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -731,7 +731,7 @@
 "of the Working Group on Intellectual Property [sic] Rights (1995)."
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -742,7 +742,7 @@
 "Wired, gennaio 1996"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -750,7 +750,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 marzo 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -761,7 +761,7 @@
 "Private Data</a>, Washington Post, 4 Novembre 1996."
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"https://web.archive.org/web/20151113122141/http://public-domain.";
 "org/\">Union for the Public Domain</a>&mdash;an organization which aims to "
@@ -772,30 +772,19 @@
 "contrastare e ad invertire l'eccessiva estensione dei poteri concessi dai "
 "diritti di copia e dai brevetti."
 
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Questo testo è stato pubblicato in <a href=\"http://shop.fsf.org/product/";
-"free-software-free-society/\"><cite>  Free Software, Free Society: The "
-"Selected Essays of Richard M. Stallman</cite></a>."
-
 # type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Altri testi da leggere"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">Filosofia del progetto GNU</a>"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.computerworld.com/article/2596679/networking/copy-";
 "protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -805,6 +794,17 @@
 "protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
 "Say No</a>, Pubblicato in Computer World."
 
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Questo testo è stato pubblicato in <a href=\"http://shop.fsf.org/product/";
+"free-software-free-society/\"><cite>  Free Software, Free Society: The "
+"Selected Essays of Richard M. Stallman</cite></a>."
+
 # type: Content of: <div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>

Index: po/right-to-read.ja-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ja-en.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/right-to-read.ja-en.html 31 Oct 2016 04:28:15 -0000      1.29
+++ po/right-to-read.ja-en.html 6 Nov 2016 21:28:15 -0000       1.30
@@ -3,30 +3,60 @@
 <title>The Right to Read
 - GNU Project - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns > p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --></style>
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<h2 class="center">The Right to Read</h2>
 
-<p>
+<p class="byline center">
 by <a href="http://www.stallman.org/";><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
 <em>This article appeared in the February 1997 issue
 of <cite>Communications of the ACM</cite> (Volume 40, Number
 2).</em></p>
-<hr />
+<hr class="thin" />
 
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
             From <cite>The Road To Tycho</cite>, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 </p></blockquote>
 
+<div class="columns">
 <p>
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -62,7 +92,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -106,7 +139,10 @@
 knowing your computer's root password.  And neither
 the FBI nor
 Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -143,7 +179,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -153,6 +192,7 @@
 to Luna, where they found others who had likewise gravitated away from
 the long arm of the SPA.  When the Tycho Uprising began in 2062, the
 universal right to read soon became one of its central aims.</p>
+</div>
 
 <div class="announcement">
 <blockquote>
@@ -163,35 +203,46 @@
 <div id="AuthorsNote">
 <h3>Author's Notes</h3>
 
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it forwards into something more visibly
 oppressive. See <a
 href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>.
+</p>
+</div>
+<div class="column-limit"></div>
 </li>
 
 <li>
+<div class="reduced-width">
 <p>Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the <a href="http://DefectiveByDesign.org";>Defective by
 Design</a> campaign.  We ask for your support.</p>
-</li>
 
-<li>
 <p>The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.</p>
+</div>
+<div class="column-limit"></div>
 </li>
+</ul>
 
-<li>
+<blockquote class="info center">
 <p>The following note has been updated several times since the first
 publication of the story.</p>
+</blockquote>
 
+<ul class="no-bullet">
+<li>
+<div class="columns">
 <p>
 The battle for the right to read is already being fought.  Although it
 may take 50 years for our past freedoms to fade into obscurity, most
@@ -228,15 +279,20 @@
 Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
 Nonfree software tends to have <a href="/proprietary/">abusive
 features of many kinds</a>, which lead to the conclusion that
 <a href="/philosophy/free-software-even-more-important.html">you can
 never trust a nonfree program</a>.  We must insist on free (libre)
 software only, and reject nonfree programs.</p>
 
-<p>
+<p class="inline-block">
 With Windows Vista, Microsoft admitted it had built in a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
@@ -244,7 +300,12 @@
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
 10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the FBI and Microsoft will keep the
@@ -274,7 +335,12 @@
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this <em>restricted
 boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 In 1997, when this story was first published, the SPA was
 threatening small Internet service providers, demanding they permit
@@ -293,7 +359,12 @@
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
 software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="reduced-width">
 <p>
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -315,12 +386,15 @@
 <p>
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.</p>
+</div>
 </li>
 </ul>
+<div class="column-limit"></div>
 </div>
 
 <h3 id="BadNews">Bad News</h3>
 
+<div class="columns">
 <p>
 The battle for the right to read is going against us so far.
 The enemy is organized, and we are not.
@@ -344,10 +418,10 @@
 <li><p>It has DRM, which is intended to block users from
 sharing copies.</p></li>
 
-<li><p>It has a back door with which Amazon can remotely erase any book.
+<li><p class="inline-block">It has a back door with which Amazon can remotely 
erase any book.
 In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
 
-<li><p>In case all that isn't Orwellian enough, there is a universal
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is 
a universal
 back door with which Amazon can remotely change the software, and
 introduce any other form of nastiness.</p></li>
 </ul>
@@ -369,6 +443,7 @@
 our work more generally.  There is also a <a href="/help/help.html">list of 
ways
 to participate in our work</a>.
 </p>
+</div>
 
 <h3 id="References">References</h3>
 
@@ -394,13 +469,7 @@
        reverse the overextension of copyright and patent powers.</li>
 </ul>
 
-<hr />
-<blockquote id="fsfs"><p class="big">This essay is published
-in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Other Texts to Read</h5>
+<h4>Other Texts to Read</h4>
 
 <ul>
        <li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -409,6 +478,13 @@
                id="copy-protection">Copy Protection: Just Say No</a>,
                published in Computer World.</li>
 </ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -467,7 +543,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/10/31 04:28:15 $
+$Date: 2016/11/06 21:28:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/right-to-read.ja.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ja.po,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- po/right-to-read.ja.po      31 Oct 2016 04:28:15 -0000      1.66
+++ po/right-to-read.ja.po      6 Nov 2016 21:28:15 -0000       1.67
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-10-31 10:30+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -39,7 +39,7 @@
 "<em>この記事は<cite>Communications of the 
ACM</cite>1997年2月号(第40巻No.2)に"
 "掲載されました。</em>"
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -47,7 +47,7 @@
 "月面革命の先行者
に関する記事集、<cite>ティコへの道</cite>、ルナシティ発行、"
 "2096年、より。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -60,7 +60,7 @@
 
"クトを終わらせることができなかった。ダンを除けば、他に彼女がé
 ¼ã‚ã‚‹è€…はいな"
 "かった。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -76,7 +76,7 @@
 "ることがけがらわしく間違ったこと、そう、海賊だ
けが行うようなことだと教えられ"
 "てきたのである。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -96,7 +96,7 @@
 "コンピュータ所有者
である彼は、犯罪の発生をあえて阻止しなかった、という咎で最"
 "も厳しい刑罰を受けることとなる。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -117,7 +117,7 @@
 "た研究者たちに支払われた。ダンは学者になるつもりだ
ったので、将来彼自身の研究"
 "論文が頻繁に参ç…
§ã•ã‚Œã‚Œã°ã€ã“のローンを返済できると望むことができたのã
 ã€‚)"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -133,7 +133,7 @@
 
"ようになった。2047年までに、かつて図書館では学術文献に自由に誰でもアクセスで"
 
"きたことなど、おぼろげな記憶の彼方に消えてしまったのである。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -152,7 +152,7 @@
 
"裏切りへ誘惑されたのである)。2047年、フランクは刑務所の中にいた。しかし、彼が"
 
"投獄されたのは海賊読書のためではなく、デバッガの所持のためã
 ã£ãŸã€‚"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -168,7 +168,7 @@
 
"バッガの主要な利用方法となったという判決を下した。これによってデバッガは違法"
 "とされ、デバッガの開発者たちは投獄されたのである。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -181,7 +181,7 @@
 
"バッガは特別なファイアウォールの背後に置かれ、クラスの実習でのみ使えるように"
 "なっていたのである。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It was also possible to bypass the copyright monitors by installing a "
 "modified system kernel.  Dan would eventually find out about the free "
@@ -198,7 +198,7 @@
 
"ピュータのルート・パスワードを知らないことにはインストールできないのã
 ã£ãŸã€‚"
 
"FBIもマイクロソフト・サポートもパスワードを教えてはくれない。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -210,7 +210,7 @@
 
"彼女と話す時はいつも、ダンの心は喜びに満ちあふれるのã
 ã£ãŸã€‚そしてリッサは他"
 "ならぬ彼に助けを求めてきたのだ
から、彼女も彼を愛しているのかもしれなかった。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -224,7 +224,7 @@
 "い込むだろう。これは依然として犯罪だ
が、SPAは自動的には発見することができな"
 "い。リッサが彼を報告したå 
´åˆã®ã¿ã€å½¼ã‚‰ã¯çŸ¥ã‚‹ã“とになるのだ。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -243,7 +243,7 @@
 "それだ
けで生徒が何か禁止されていることをやっているとみなすのに十分で、実際に"
 "何をやっているか知る必要はないというわけだ。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -253,7 +253,7 @@
 "わりに彼らは学校のコンピュータシステム
の利用が禁止され、必然的にすべての単位"
 "を落とすということになってしまうのだ。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -266,7 +266,7 @@
 
"て異なった方針を保持していた。当時の彼らは、有害な活動を罰したのであって、疑"
 "いを持たれただけの者は罰しなかったのである。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -285,7 +285,7 @@
 
"2062年にティコ蜂起が始まったとき、万人にとっての読む権利はまもなくその中心的"
 "な目的の一つとなったのである。"
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list "
 "about the dangers of e-books</a>."
@@ -293,11 +293,11 @@
 "<a 
href=\"http://defectivebydesign.org/ebooks.html\";>電子書籍の危険について、"
 "わたしたちのメーリングリストに参加ください</a>"
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr "作者の注釈"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -313,7 +313,7 @@
 "こちらの、<a 
href=\"/philosophy/words-to-avoid.html#Piracy\">「海賊行為」</a>"
 "もご覧ください。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -327,7 +327,7 @@
 "DefectiveByDesign.org\">Defective by 
Design</a>(設計から間違っている)キャン"
 
"ペーンを設置しました。皆さんのサポートをお願いします。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
@@ -335,13 +335,13 @@
 
"電子フロンティアファウンデーションも、フリーソフトウェアファウンデーションと"
 
"は関係ない別の団体ですが、DRMに反対する運動をしています。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The following note has been updated several times since the first "
 "publication of the story."
 msgstr 
"この注釈はストーリーの最初の発表から何回か更新されました。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The battle for the right to read is already being fought.  Although it may "
 "take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -362,7 +362,7 @@
 "とができるプログラムのé…
å¸ƒã‚’犯罪とすることによってです。ヨーロッパ連合も同様"
 
"に強力ではありませんが似たような制限を2001年の著作権指令で課しています。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -379,7 +379,7 @@
 "DRMを破るプログラム
を罰するDMCAのポリシーは、たくさんの不å…
¬æ­£ãªãƒãƒªã‚·ãƒ¼ã®ä¸€ã¤"
 
"で、こういった条約が広範囲の分野に渡って押し付けるものです。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -396,7 +396,7 @@
 "の構造
をヨーロッパに押し付けるでしょう。すべてのこういった条約はç
 ´æ£„しなけれ"
 "ばなりません。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
@@ -405,7 +405,7 @@
 "WWWコンソーシアムでさえもが著作権業界の影のå…
ƒã«é™¥ã£ã¦ã—まいました。今、DRMシ"
 "ステムをウェブの仕様のå…
¬å¼éƒ¨åˆ†ã¨ã™ã‚‹æ‰¿èªã®ãã‚ã«ã‚ります。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -419,7 +419,7 @@
 "(リブレ)ソフトウェアだけを主張し、不自由なプログラム
を拒否しなくてはなりませ"
 "ん。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "With Windows Vista, Microsoft admitted it had built in a back door: "
 "Microsoft can use it to forcibly install software &ldquo;upgrades,&rdquo; "
@@ -435,7 +435,7 @@
 
"ることもできます。Vistaのユーザの弾圧の主な目的は、ユーザがå
…‹æœã§ããªã„DRMの"
 
"押し付けでした。もちろん、ウィンドウズは決してよくはありません。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "One of the ideas in the story was not proposed in reality until 2002.  This "
 "is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -445,7 +445,7 @@
 
"た。これは、FBIとマイクロソフトがあなたのパーソナル・コンピュータのルートパス"
 
"ワードを保持し、あなたには持たせないというものです。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
@@ -455,7 +455,7 @@
 "ラジウム
」のような名を与えましたが、最終的に使う段になって、それは「セキュ"
 "ア・ブート」と呼ばれます。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "What Microsoft keeps is not exactly a password in the traditional sense; no "
 "person ever types it on a terminal.  Rather, it is a signature and "
@@ -476,7 +476,7 @@
 
"microsoft.html\">ウィンドウズのNSAセキュリティバグを見せているのです</a>か"
 "ら。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -490,7 +490,7 @@
 "うな)ほかのシステム
をインストールできるかどうかは、マイクロソフトのコントロー"
 
"ル下にあります。これをわたしたちは<em>制限されたブート</em>と呼びます。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "In 1997, when this story was first published, the SPA was threatening small "
 "Internet service providers, demanding they permit the SPA to monitor all "
@@ -506,7 +506,7 @@
 "ンドのCommunity 
ConneXionは要求を拒否し実際に訴えられました。SPAは後に訴訟を"
 
"取り下げましたが、求めていた力をDMCAが与えてくれたのです。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The SPA, which actually stands for Software Publishers Association, has been "
 "replaced in its police-like role by the Business Software Alliance.  The BSA "
@@ -524,7 +524,7 @@
 
"いて展開されたBSAの恐るべきキャンペーンは、ソフトウェアをå
…±æœ‰ã™ã‚‹äººã€…は監獄で"
 "レイプされるだろうというようなことを遠回しに述べて脅
すような内容でした。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -534,7 +534,7 @@
 
"えば、シカゴ地域にある某大学のコンピュータは、ログインする際に以下のような"
 "メッセージを表示します。"
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -557,7 +557,7 @@
 "判明したならば、システム
職員はそのような監視で得られた証拠を大学あるいは警察"
 
"当局に引き渡すことがあり得るということを理解しているものとします。"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -566,11 +566,11 @@
 
"に同意するよう圧力をかけているという点で、憲法修正第4条への興味深いアプローチ"
 "です。"
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "悪いニュース"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The battle for the right to read is going against us so far.  The enemy is "
 "organized, and we are not."
@@ -578,7 +578,7 @@
 
"読む権利の戦いはこれまでわたしたちに不利でした。敵は組織化されていますが、わ"
 "たしたちはそうではありません。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -596,7 +596,7 @@
 
"によって実行されています。その機能のどれもが、その製品を完å
…¨ã«æ‹’否することに"
 "値するでしょう: "
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
@@ -606,12 +606,12 @@
 "ジかをå 
±å‘Šã—、ユーザがいつテクストをハイライトしたか、ユーザがå
…¥åŠ›ã—たどんな"
 "注釈も報告します。"
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 "それはDRMを有し、ユーザがコピーをå…
±æœ‰ã™ã‚‹ã“とを阻止することを意図しています。"
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
@@ -619,7 +619,7 @@
 "それはAmazonが遠
隔操作でいかなる本も削除できるバックドアを有します。2009年、"
 
"ジョージ・オーウェル著の1984のコピーを何千部も削除しました。"
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
@@ -629,7 +629,7 @@
 "Amazonは遠
隔操作でソフトウェアを変更することができ、ほかのあらゆる種類の不快"
 "を導入できます。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -648,7 +648,7 @@
 
"しはそういった契約に同意することを拒否します。契約が、ソフトウェア、電子書"
 "籍、音楽あるいはほかのもの、何であっても。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we want to stop the bad news and create some good news, we need to "
 "organize and fight.  Subscribe to the FSF's <a href=\"http://";
@@ -663,11 +663,11 @@
 "\">FSFに参加
して</a>わたしたちの仕事に一般的に支援できます。<a 
href=\"/help/"
 "help.html\">わたしたちの仕事に参加
する方法のリスト</a>もあります。"
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "参考文献"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -678,7 +678,7 @@
 "\"/philosophy/not-ipr.html\">sic</a>]および国家情å 
±ã‚¤ãƒ³ãƒ•ãƒ©ã‚¹ãƒˆãƒ©ã‚¯ãƒãƒ£ãƒ¼: 知"
 "的財産[sic]権に関するワーキンググループ報告書(1995)。"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -687,7 +687,7 @@
 "<a 
href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>白書"
 "の解説: 著作権の横領</a>、Pamela Samuelson、Wired、1996年1月号"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -695,7 +695,7 @@
 "<a 
href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>「売り切れ」</a>、"
 "James Boyle、ニューヨークタイムズ 1996年3月31日。"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -705,7 +705,7 @@
 "people.org/archives/interesting-people/199611/msg00012.html\">å…
¬çš„データか私"
 "的データか</a>、ワシントンポスト、1996年11月4日。"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"https://web.archive.org/web/20151113122141/http://public-domain.";
 "org/\">Union for the Public Domain</a>&mdash;an organization which aims to "
@@ -715,26 +715,16 @@
 
"org/\">パブリックドメイン連合</a>&mdash;著作権と特許の権力の過剰な拡大に抵抗"
 "し、方針を転換させようとする団体。"
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"この小論は<a 
href=\"http://shop.fsf.org/product/free-software-free-society/";
-"\"><cite>自由ソフトウェア、自由な社会: 
リチャード・M・ストールマン小論選集</"
-"cite></a>に収録され、出版されました。"
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "その他の読みもの"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a 
href=\"/philosophy/philosophy.html\">GNUプロジェクトの理念</a>"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.computerworld.com/article/2596679/networking/copy-";
 "protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -744,6 +734,16 @@
 "copyprotection--just-say-no.html\" id=\"copy-protection\">著作権保護: 
単に"
 "ノーと言おう</a>、Computer World誌に掲載。"
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"この小論は<a 
href=\"http://shop.fsf.org/product/free-software-free-society/";
+"\"><cite>自由ソフトウェア、自由な社会: 
リチャード・M・ストールマン小論選集</"
+"cite></a>に収録され、出版されました。"
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/right-to-read.ko-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ko-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- po/right-to-read.ko-diff.html       18 Oct 2016 16:29:50 -0000      1.34
+++ po/right-to-read.ko-diff.html       6 Nov 2016 21:28:15 -0000       1.35
@@ -15,34 +15,71 @@
 &lt;title&gt;The Right to Read
 - GNU Project - Free Software Foundation&lt;/title&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns &gt; p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --&gt;&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/philosophy/po/right-to-read.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
-&lt;h2&gt;The Right to Read&lt;/h2&gt;
+<span class="removed"><del><strong>&lt;h2&gt;The</strong></del></span>
+<span class="inserted"><ins><em>&lt;h2 class="center"&gt;The</em></ins></span> 
Right to Read&lt;/h2&gt;
 
-&lt;p&gt;
+<span class="removed"><del><strong>&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p class="byline 
center"&gt;</em></ins></span>
 by &lt;a href="http://www.stallman.org/"&gt;&lt;strong&gt;Richard 
Stallman&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;blockquote class="note"&gt;
 &lt;p&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of eBooks&lt;/a&gt;.&lt;/p&gt;
-&lt;/blockquote&gt;</strong></del></span>
+&lt;/blockquote&gt;
 
-&lt;p&gt;
+&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;p class="center"&gt;</em></ins></span>
 &lt;em&gt;This article appeared in the February 1997 issue
 of <span 
class="removed"><del><strong>&lt;strong&gt;Communications</strong></del></span> 
<span class="inserted"><ins><em>&lt;cite&gt;Communications</em></ins></span> of 
the <span class="removed"><del><strong>ACM&lt;/strong&gt;</strong></del></span> 
<span class="inserted"><ins><em>ACM&lt;/cite&gt;</em></ins></span> (Volume 40, 
Number
 2).&lt;/em&gt;&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;hr /&gt;</em></ins></span>
 
-&lt;blockquote&gt;&lt;p&gt;
+<span 
class="removed"><del><strong>&lt;blockquote&gt;&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;hr class="thin" /&gt;
+
+&lt;div class="article"&gt;
+&lt;blockquote class="info center"&gt;&lt;p&gt;</em></ins></span>
             From &lt;cite&gt;The Road To Tycho&lt;/cite&gt;, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 &lt;/p&gt;&lt;/blockquote&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -78,7 +115,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -122,7 +162,10 @@
 knowing your computer's root password.  And neither
 the <span class="removed"><del><strong>&lt;abbr title="Federal Bureau of 
Investigation"&gt;FBI&lt;/abbr&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI</em></ins></span> nor
 Microsoft Support would tell you that.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -159,7 +202,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -174,8 +220,9 @@
 <span class="removed"><del><strong>&lt;h3 id="AuthorsNote"&gt;Author's 
Note&lt;/h3&gt;
 
 &lt;p&gt;[This</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;div class="announcement"&gt;
+&lt;div class="announcement"&gt;
 &lt;blockquote&gt;
 &lt;p&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of e-books&lt;/a&gt;.&lt;/p&gt;
 &lt;/blockquote&gt;
@@ -184,35 +231,46 @@
 &lt;div id="AuthorsNote"&gt;
 &lt;h3&gt;Author's Notes&lt;/h3&gt;
 
-&lt;ul&gt;
-&lt;li&gt;This story is supposedly a historical article that will be written in
+&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p&gt;This story is supposedly a historical article that will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it forwards into something more visibly
 oppressive. See &lt;a
 
href="/philosophy/words-to-avoid.html#Piracy"&gt;&ldquo;Piracy&rdquo;&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
+&lt;div class="reduced-width"&gt;
 &lt;p&gt;Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the &lt;a href="http://DefectiveByDesign.org"&gt;Defective by
 Design&lt;/a&gt; campaign.  We ask for your support.&lt;/p&gt;
-&lt;/li&gt;
 
-&lt;li&gt;
 &lt;p&gt;The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 &lt;/li&gt;
+&lt;/ul&gt;
 
-&lt;li&gt;
+&lt;blockquote class="info center"&gt;
 &lt;p&gt;The following</em></ins></span> note has been updated several times 
since the first
-publication of the <span 
class="removed"><del><strong>story.]&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>story.&lt;/p&gt;</em></ins></span>
+publication of the <span 
class="removed"><del><strong>story.]&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>story.&lt;/p&gt;
+&lt;/blockquote&gt;
 
+&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The <span class="inserted"><ins><em>battle for the</em></ins></span> right to 
read is <span class="removed"><del><strong>a battle</strong></del></span> <span 
class="inserted"><ins><em>already</em></ins></span> being <span 
class="removed"><del><strong>fought today.</strong></del></span> <span 
class="inserted"><ins><em>fought.</em></ins></span>  Although it
 may take 50 years for our <span class="removed"><del><strong>present way of 
life</strong></del></span> <span class="inserted"><ins><em>past 
freedoms</em></ins></span> to fade into obscurity, most
@@ -226,42 +284,41 @@
 distribution of programs that can break DRM a crime.</em></ins></span>  The 
European
 Union imposed similar restrictions in a 2001 copyright <span 
class="removed"><del><strong>directive.  In France, under the DADVSI law
 adopted</strong></del></span> <span 
class="inserted"><ins><em>directive,</em></ins></span> in <span 
class="removed"><del><strong>2006, mere possession of a copy of DeCSS, the free 
program
-to decrypt video on a DVD, is a crime.&lt;/p&gt;
+to decrypt video on a DVD, is</strong></del></span> a <span 
class="removed"><del><strong>crime.&lt;/p&gt;</strong></del></span>
+<span class="inserted"><ins><em>form not quite as 
strong.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;
-In 2001, Disney-funded Senator Hollings proposed a bill called the
-SSSCA that would require every new computer to have mandatory
-copy-restriction facilities that the user cannot bypass.  Following
-the Clipper chip and similar US government key-escrow proposals, this
-shows</strong></del></span> a <span class="removed"><del><strong>long-term 
trend: computer systems are increasingly set up to
-give absentees with clout control over the people actually using the
+<span class="removed"><del><strong>In 2001, Disney-funded Senator Hollings 
proposed a bill called the
+SSSCA that would require every new computer</strong></del></span>
+<span class="inserted"><ins><em>The US campaigns</em></ins></span> to <span 
class="removed"><del><strong>have mandatory
+copy-restriction facilities that</strong></del></span> <span 
class="inserted"><ins><em>impose such rules on</em></ins></span> the <span 
class="removed"><del><strong>user cannot bypass.  
Following</strong></del></span> <span class="inserted"><ins><em>rest 
of</em></ins></span> the <span class="removed"><del><strong>Clipper chip and 
similar US government key-escrow proposals, this
+shows</strong></del></span> <span class="inserted"><ins><em>world through
+so-called &ldquo;free trade&rdquo; treaties.
+&lt;a href="https://stallman.org/business-supremacy-treaties.html"&gt;
+Business-supremacy treaties&lt;/a&gt; is</em></ins></span> a <span 
class="removed"><del><strong>long-term trend: computer 
systems</strong></del></span> <span class="inserted"><ins><em>more fitting term 
for them, since
+they</em></ins></span> are <span class="removed"><del><strong>increasingly set 
up</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to give <span 
class="removed"><del><strong>absentees with clout control</strong></del></span> 
<span class="inserted"><ins><em>business dominion</em></ins></span> over <span 
class="removed"><del><strong>the people actually using the
 computer system.  The SSSCA was later renamed to the unpronounceable
-CBDTPA, which was glossed</strong></del></span>
-<span class="inserted"><ins><em>form not quite</em></ins></span> as <span 
class="removed"><del><strong>the &ldquo;Consume But Don't Try
+CBDTPA, which was glossed as the &ldquo;Consume But Don't Try
 Programming Act&rdquo;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>strong.&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;
 
-&lt;p&gt;
-The <span class="removed"><del><strong>Republicans took control of the US 
senate shortly thereafter.
+&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>nominally 
democratic
+states.</em></ins></span>  The <span class="removed"><del><strong>Republicans 
took control</strong></del></span> <span class="inserted"><ins><em>DMCA's 
policy</em></ins></span> of <span class="removed"><del><strong>the US senate 
shortly thereafter.
 They are less tied to Hollywood than the Democrats, so they did not
-press these proposals.  Now that the Democrats are back in control,
+press these proposals.  Now</strong></del></span> <span 
class="inserted"><ins><em>criminalizing programs</em></ins></span> that <span 
class="removed"><del><strong>the Democrats are back in control,
 the danger is once again higher.&lt;/p&gt;
 
 &lt;p&gt;
-In 2001 the</strong></del></span> US <span class="removed"><del><strong>began 
attempting to use the proposed Free Trade Area of
-the Americas (FTAA) treaty</strong></del></span> <span 
class="inserted"><ins><em>campaigns</em></ins></span> to impose <span 
class="removed"><del><strong>the same</strong></del></span> <span 
class="inserted"><ins><em>such</em></ins></span> rules on <span 
class="removed"><del><strong>all the countries in</strong></del></span> the 
<span class="removed"><del><strong>Western Hemisphere.  The FTAA is 
one</strong></del></span> <span 
class="inserted"><ins><em>rest</em></ins></span> of the <span 
class="inserted"><ins><em>world through</em></ins></span>
-so-called <span class="removed"><del><strong>free
-trade treaties, which</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;free trade&rdquo; treaties.
-&lt;a href="https://stallman.org/business-supremacy-treaties.html"&gt;
-Business-supremacy treaties&lt;/a&gt; is a more fitting term for them, since
-they</em></ins></span> are <span 
class="removed"><del><strong>actually</strong></del></span> designed to give 
business
-<span class="removed"><del><strong>increased power</strong></del></span> <span 
class="inserted"><ins><em>dominion</em></ins></span> over <span 
class="inserted"><ins><em>nominally</em></ins></span> democratic <span 
class="removed"><del><strong>governments; imposing laws like the
-DMCA is typical of this spirit.</strong></del></span>
-<span class="inserted"><ins><em>states.</em></ins></span>  The <span 
class="removed"><del><strong>FTAA was effectively killed by
-Lula, President</strong></del></span> <span class="inserted"><ins><em>DMCA's 
policy</em></ins></span> of <span class="removed"><del><strong>Brazil, who 
rejected the DMCA requirement and
-others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>criminalizing programs that
-break DRM is one of many unjust policies that these treaties impose
-across a wide range of fields.&lt;/p&gt;</em></ins></span>
+In 2001 the US began attempting to use the proposed Free Trade Area of
+the Americas (FTAA) treaty to impose the same rules on all the countries in
+the Western Hemisphere.  The FTAA</strong></del></span>
+<span class="inserted"><ins><em>break DRM</em></ins></span> is one of <span 
class="removed"><del><strong>the so-called free
+trade treaties, which are actually designed to give business
+increased power over democratic governments; imposing laws like the
+DMCA is typical of this spirit.  The FTAA was effectively killed by
+Lula, President</strong></del></span> <span class="inserted"><ins><em>many 
unjust policies that these treaties impose
+across a wide range</em></ins></span> of <span 
class="removed"><del><strong>Brazil, who rejected the DMCA requirement and
+others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>fields.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;
 <span class="removed"><del><strong>Since then, the</strong></del></span>
@@ -270,34 +327,44 @@
 and <span class="removed"><del><strong>Mexico</strong></del></span> <span 
class="inserted"><ins><em>South Korea</em></ins></span> through bilateral <span 
class="removed"><del><strong>&ldquo;free trade&rdquo;</strong></del></span> 
agreements, and on countries such as
 Costa Rica through another treaty, CAFTA.  <span 
class="removed"><del><strong>Ecuador's President Correa refused to sign a
 &ldquo;free trade&rdquo; agreement</strong></del></span>  <span 
class="inserted"><ins><em>Obama has escalated the
-campaign with two new proposed treaties, the TPP and the TTIP.  The
-TPP would impose the DMCA, along</em></ins></span> with <span 
class="inserted"><ins><em>many other wrongs, on 12
-countries on</em></ins></span> the <span class="removed"><del><strong>US, but 
I've heard Ecuador
-had adopted something like</strong></del></span> <span 
class="inserted"><ins><em>Pacific Ocean.  The TTIP would impose similar
+campaign</em></ins></span> with <span class="inserted"><ins><em>two new 
proposed treaties,</em></ins></span> the <span class="removed"><del><strong>US, 
but I've heard Ecuador
+had adopted something like</strong></del></span> <span 
class="inserted"><ins><em>TPP and</em></ins></span> the <span 
class="removed"><del><strong>DMCA</strong></del></span> <span 
class="inserted"><ins><em>TTIP.  The
+TPP would impose the DMCA, along with many other wrongs, on 12
+countries on the Pacific Ocean.  The TTIP would impose similar
 strictures on Europe.  All these treaties must be defeated, or
 abolished.&lt;/p&gt;
 
 &lt;p&gt;
-Even</em></ins></span> the <span 
class="removed"><del><strong>DMCA</strong></del></span> <span 
class="inserted"><ins><em>World Wide Web Consortium has fallen under the shadow 
of the
+Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
-&lt;p&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p class="emph-box"&gt;
 Nonfree software tends to have &lt;a href="/proprietary/"&gt;abusive
 features of many kinds&lt;/a&gt;, which lead to the conclusion that
 &lt;a href="/philosophy/free-software-even-more-important.html"&gt;you can
 never trust a nonfree program&lt;/a&gt;.  We must insist on free (libre)
 software only, and reject nonfree programs.&lt;/p&gt;
 
-&lt;p&gt;
+&lt;p class="inline-block"&gt;
 With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span 
class="removed"><del><strong>2003.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
 downgrades.  It can also order all machines running Vista to refuse to
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
-10 is no better&lt;/p&gt;</em></ins></span>
+10 is no better&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the <span 
class="removed"><del><strong>&lt;abbr&gt;FBI&lt;/abbr&gt;</strong></del></span> 
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep 
the
@@ -330,22 +397,27 @@
 Vista's many restrictions</strong></del></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> to <span 
class="removed"><del><strong>impose DRM (Digital Restrictions
 Management)</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> that <span 
class="removed"><del><strong>users can't overcome.  The 
threat</strong></del></span>
 <span class="inserted"><ins><em>control on behalf</em></ins></span> of <span 
class="removed"><del><strong>DRM is why we
-have established</strong></del></span> the <span 
class="removed"><del><strong>&lt;a href="http://DefectiveByDesign.org"&gt;
-Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI when asked: it
-already &lt;a href="/proprietary/malware-microsoft.html"&gt;shows
-the NSA security bugs in Windows&lt;/a&gt; to exploit.&lt;/p&gt;
+have established</strong></del></span> the <span class="inserted"><ins><em>FBI 
when asked: it
+already</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://DefectiveByDesign.org"&gt;
+Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;shows
+the NSA security bugs in Windows&lt;/a&gt; to 
exploit.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;
-Secure boot can be implemented in a way that permits the user to
+<span class="removed"><del><strong>When</strong></del></span>
+<span class="inserted"><ins><em>Secure boot can be implemented in a way that 
permits the user to
 specify the signature key and decide what software to sign.  In
 practice, PCs designed for Windows 10 carry only Microsoft's key, and
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this &lt;em&gt;restricted
-boot&lt;/em&gt;.&lt;/p&gt;</em></ins></span>
+boot&lt;/em&gt;.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;
 &lt;p&gt;
-<span class="removed"><del><strong>When</strong></del></span>
-<span class="inserted"><ins><em>In 1997, when</em></ins></span> this story was 
first <span class="removed"><del><strong>written,</strong></del></span> <span 
class="inserted"><ins><em>published,</em></ins></span> the SPA was
+In 1997, when</em></ins></span> this story was first <span 
class="removed"><del><strong>written,</strong></del></span> <span 
class="inserted"><ins><em>published,</em></ins></span> the SPA was
 threatening small Internet service providers, demanding they permit
 the SPA to monitor all users.  Most ISPs surrendered when
 threatened, because they <span 
class="removed"><del><strong>cannot</strong></del></span> <span 
class="inserted"><ins><em>could not</em></ins></span> afford to fight back in 
court.  One
@@ -361,8 +433,13 @@
 reminiscent of the erstwhile Soviet Union, it invites people to inform
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;</em></ins></span>
+software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="reduced-width"&gt;</em></ins></span>
 &lt;p&gt;
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -384,12 +461,15 @@
 &lt;p&gt;
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;/li&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;/li&gt;
 &lt;/ul&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 &lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="BadNews"&gt;Bad News&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The battle for the right to read is <span class="removed"><del><strong>already 
in progress,</strong></del></span> <span class="inserted"><ins><em>going 
against us so far.</em></ins></span>
 The enemy is organized, <span 
class="removed"><del><strong>while</strong></del></span> <span 
class="inserted"><ins><em>and</em></ins></span> we are <span 
class="removed"><del><strong>not, so it is going against us.
@@ -422,14 +502,14 @@
 &lt;li&gt;&lt;p&gt;It has DRM, which is intended to block users from
 sharing copies.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;It has a back door with which Amazon</em></ins></span> can
+&lt;li&gt;&lt;p class="inline-block"&gt;It has a back door with which 
Amazon</em></ins></span> can
      <span class="removed"><del><strong>revoke at will.&lt;/li&gt;
 &lt;li&gt;&lt;a 
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151"&gt;Electronic
      Publishing:&lt;/a&gt; An article about distribution</strong></del></span> 
<span class="inserted"><ins><em>remotely erase any book.
 In 2009, it erased thousands</em></ins></span> of <span 
class="removed"><del><strong>books in
      electronic form,</strong></del></span> <span 
class="inserted"><ins><em>copies of 1984, by George Orwell.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;In case all that isn't Orwellian enough, there is a 
universal
+&lt;li&gt;&lt;p class="inline-block"&gt;In case all that isn't Orwellian 
enough, there is a universal
 back door with which Amazon can remotely change the 
software,</em></ins></span> and <span class="removed"><del><strong>copyright 
issues affecting</strong></del></span>
 <span class="inserted"><ins><em>introduce any other form of 
nastiness.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -456,6 +536,7 @@
 our work more generally.  There is also a &lt;a href="/help/help.html"&gt;list 
of ways
 to participate in</em></ins></span> our <span 
class="removed"><del><strong>work.</strong></del></span> <span 
class="inserted"><ins><em>work&lt;/a&gt;.</em></ins></span>
 &lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="References"&gt;References&lt;/h3&gt;
 
@@ -481,23 +562,32 @@
        reverse the overextension of copyright and patent powers.&lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;hr /&gt;
+<span class="inserted"><ins><em>&lt;h4&gt;Other Texts to Read&lt;/h4&gt;
+
+&lt;ul&gt;
+       &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
+       GNU Project&lt;/a&gt;&lt;/li&gt;
+       &lt;li&gt;&lt;a 
href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html";
+               id="copy-protection"&gt;Copy Protection: Just Say No&lt;/a&gt;,
+               published in Computer World.&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;</em></ins></span>
+
+&lt;hr <span class="inserted"><ins><em>class="thin"</em></ins></span> /&gt;
 &lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
 in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
 Software, Free Society: The Selected Essays of Richard
 M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;
 
-&lt;h5&gt;Other Texts to Read&lt;/h5&gt;
+<span class="removed"><del><strong>&lt;h5&gt;Other Texts to Read&lt;/h5&gt;
 
 &lt;ul&gt;
        &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
        GNU Project&lt;/a&gt;&lt;/li&gt;
-       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No";
-               id="COPYPROCTECTION"&gt;Copy</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html";
-               id="copy-protection"&gt;Copy</em></ins></span> Protection: Just 
Say No&lt;/a&gt;,
-               <span 
class="removed"><del><strong>Published</strong></del></span>
-               <span class="inserted"><ins><em>published</em></ins></span> in 
Computer World.&lt;/li&gt;
-&lt;/ul&gt;
+       &lt;li&gt;&lt;a 
href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No";
+               id="COPYPROCTECTION"&gt;Copy Protection: Just Say No&lt;/a&gt;,
+               Published in Computer World.&lt;/li&gt;
+&lt;/ul&gt;</strong></del></span>
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
@@ -557,7 +647,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/right-to-read.ko.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ko.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/right-to-read.ko.po      18 Oct 2016 16:29:50 -0000      1.48
+++ po/right-to-read.ko.po      6 Nov 2016 21:28:15 -0000       1.49
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2015-02-02 16:49+0900\n"
 "Last-Translator: Jongmin Yoon <address@hidden>\n"
 "Language-Team: Korean <address@hidden>\n"
@@ -46,7 +46,7 @@
 "<em>이 글은 1997년 2월에 발행된 <strong>Communications of the 
ACM</strong>(제"
 "40권 2호)에 게재되었던 것입니다.</em>"
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -55,7 +55,7 @@
 "티코로 가는 길(The Road to Tycho)</cite>에서 가져온 것입니다. 
이 책은 2096년"
 "에 루나 시티(Lunar City)에서 출판되었습니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -69,7 +69,7 @@
 "황이었습니다. 하지만, 그녀가 도움을 요청할 만한 사람은 
댄 이외에 아무도 없었"
 "습니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -85,7 +85,7 @@
 "습니다. 왜냐하면 어느 누구나처럼 그도 초등학교 때부터 
책을 공유하는 것은 비열"
 "하고 나쁘다는 것을 배워왔기 때문입니다. 약탈 행위처럼 
말입니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -106,7 +106,7 @@
 "시스템은 그 사실을 알아낼 것입니다. 그는 컴퓨터의 소유
자이기 때문에 범죄 행위"
 "를 근절시키기 위해 감당하기 힘든 가혹한 벌을 받게 될 
것입니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -129,7 +129,7 @@
 "를 갖게 되면 그 돈으로 대출 경비를 충당할 수 있으리라고
 기대할 수 있었습니"
 "다.)"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -145,7 +145,7 @@
 "하기 시작했고, 2047년에 이르면 학술 자료에 대한 자유
로운 접근을 허용하는 도서"
 "관은 거의 사라지게 되었습니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -163,7 +163,7 @@
 "니다.(빚에 허덕이는 학생들은 배신의 유혹에 쉽게 빠져 
들었습니다.) 프랭크는 열"
 "람 위반이 아닌 디버거 소지를 이유로 2047년에 
수감되었습니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -179,7 +179,7 @@
 "도라고 판결했습니다. 그것은 곧 디버깅 툴 자체가 
불법이라는 것을 의미했고, 디"
 "버거의 개발자들은 감옥으로 보내졌습니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -191,7 +191,7 @@
 "이를 공급할 수 있었습니다. 댄이 소프트웨어 수업 시간에 
사용한 디버거는 오직 "
 "수업 실습용으로만 사용될 수 있게끔 특별한 방화벽 뒤에 
놓여진 것이었습니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "It was also possible to bypass the copyright monitors by installing a "
@@ -219,7 +219,7 @@
 "Bureau of Investigation\">FBI</abbr>나 마이크로소프트 고객 지원 
센터가 루트 "
 "패스워드를 알려줄 리는 만무한 것입니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -231,7 +231,7 @@
 "화하는 모든 순간마다 그는 벅찬 희열을 느꼈습니다. 또한 
그녀가 자신을 택해 도"
 "움을 청하고 있다는 것은 그녀 또한 자신을 사랑하고 
있다는 의미일 수 있습니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -245,7 +245,7 @@
 "법이기는 했지만, 그녀가 그를 고발하지 않는 한 
소프트웨어 보호국이 그 사실을 "
 "알아낼 수는 없을 것입니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -263,7 +263,7 @@
 "을 감시하는 것을 어렵게 하는 것이 금지되는 것입니다. 
학교는 금지된 행위를 한"
 "다는 것을 중시하지 그 자체가 무엇인지에 대해서는 
관심을 갖지 않습니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -273,7 +273,7 @@
 "시스템을 사용할 수 없게 되기 때문에, 어쩔 수 없이 모든 
과목에서 낙제하게 되"
 "는 것입니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -286,7 +286,7 @@
 "을 규제했습니다. 학교는 단순한 혐의가 아닌 해로운 
행위에 대해 학생들을 처벌했"
 "습니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -305,7 +305,7 @@
 "동류의 사람들과 만날 수 있었습니다. 서기 2062년, 
티코에서 혁명이 시작되었을 "
 "때, 자유롭게 읽고자 하는 이 보편적인 권리는 곧 혁명의 
중심 목표가 되었습니다."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing "
@@ -317,11 +317,11 @@
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>전자책의 위험에 
관한 메"
 "일링 리스트에 가입해 주세요.</a>"
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr "저자의 말"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "This story is supposedly a historical article that will be written in the "
@@ -343,7 +343,7 @@
 "시절을 서술하고 있다. 그렇기에 그 사회의 용어를 
사용하고 있다. 나는 여기에 사"
 "용된 용어를 조금 더 억압적으로 들리도록 하였다. "
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -352,13 +352,13 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "[This note has been updated several times since the first publication of "
@@ -368,7 +368,7 @@
 "publication of the story."
 msgstr "[아래의 내용은 이 이야기가 처음 출판된 이후 여러 
차례 수정되었습니다.]"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The right to read is a battle being fought today.  Although it may take "
@@ -402,7 +402,7 @@
 "률에 의하면 DVD 비디오를 디코딩하는 자유 프로그램인 
DeCSS의 복제물을 단순히 "
 "소지하는 것도 범죄가 됩니다."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -413,7 +413,7 @@
 "these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -424,14 +424,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -440,7 +440,7 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -465,7 +465,7 @@
 "습니다. DRM의 위협 때문에 우리는 <a 
href=\"http://DefectiveByDesign.org";
 "\">Defective by Design</a> 캠페인을 시작했습니다."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "One of the ideas in the story was not proposed in reality until 2002.  "
@@ -480,14 +480,14 @@
 "다. 그것은 여러분의 개인용 컴퓨터의 루트 패스워드를 
<abbr>FBI</abbr>와 마이크"
 "로소프트가 보유하고 여러분이 갖지 못하도록 한다는 것입
니다."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
 "into use, it is called &ldquo;secure boot&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -512,7 +512,7 @@
 "마이크로소프트에 협력하는 어떤 웹 사이트에게도 
사용자가 자신의 컴퓨터에서 할 "
 "수 있는 일에 대한 절대적인 통제권을 부여합니다."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -521,7 +521,7 @@
 "control.  We call this <em>restricted boot</em>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "When this story was first written, the SPA was threatening small Internet "
@@ -548,7 +548,7 @@
 "소송을 당했습니다. SPA는 후에 소송을 취하했지만, DMCA가 
시행된 후에 그들은 원"
 "하던 권한을 갖게 되었습니다."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The SPA, which actually stands for Software Publishers Association, has "
@@ -574,7 +574,7 @@
 "발하도록 부추깁니다. 아르헨티나에서 2001년에 벌인 
그들의 끔찍한 캠페인은 소프"
 "트웨어를 공유하는 사람은 성폭행당할 것이라는 은근히 
감춰진 협박이었습니다."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -584,7 +584,7 @@
 "면, 시카고 지역에 위치한 한 대학의 컴퓨터에는 로그인할 
때 다음과 같은 메시지"
 "가 출력됩니다."
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -605,7 +605,7 @@
 "불법 행위를 밝힐 수 있는 증거가 나타났을 때에는 관리 
직원이 이러한 증거를 대"
 "학 당국이나 경찰에 제공할 수 있음을 알려드립니다."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -614,11 +614,11 @@
 "습니다. 왜냐하면 모든 사람이 헌법상의 권리를  사전에 
포기하는데 동의하도록 강"
 "제하고 있기 때문입니다."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "나쁜 소식들"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The battle for the right to read is already in progress, The enemy is "
@@ -633,7 +633,7 @@
 "지 않습니다. 그래서 우리에게 불리해져 갑니다. 이 글이 
처음 발표된 이후에 일어"
 "난 나쁜 소식들은 다음과 같습니다."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -644,31 +644,31 @@
 "for rejecting the product completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -680,7 +680,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "If we want to stop the bad news and create some good news, we need to "
@@ -702,11 +702,11 @@
 "의 운동 기금을 도울 수 있는 <a 
href=\"http://www.fsf.org/associate\";>FSF 후원"
 "회원</a>에 가입해 주세요."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "참고 자료"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -718,7 +718,7 @@
 "a>] and the National Information Infrastructure: The Report of the Working "
 "Group on Intellectual Property [sic] Rights (1995)."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -728,7 +728,7 @@
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
 "Wired, Jan. 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -736,7 +736,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -746,7 +746,7 @@
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
 "Private Data</a>, Washington Post, 4 Nov 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.public-domain.org/\";>Union for the Public Domain</"
@@ -760,26 +760,16 @@
 "<a href=\"http://www.public-domain.org/\";>Union for the Public Domain</a>: ì 
€"
 "작권과 특허의 지나친 확대에 반대하고 이를 되돌리는 
것을 목적으로 하는 단체."
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"이 글은 &lsquo;<a href=\"http://shop.fsf.org/product/free-software-free-";
-"society/\">자유 소프트웨어, 자유 사회: 리처스 M. 스톨먼 ì 
€ìž‘선집</a>&rsquo;"
-"에 포함되어 출판되었습니다."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "읽어야 할 다른 글들"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">GNU 프로젝트의 철학</a>"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.computerworld.com/s/article/49358/";
@@ -794,6 +784,16 @@
 "Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">복제 방지: 그냥 
싫어</"
 "a>, Computer World."
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"이 글은 &lsquo;<a href=\"http://shop.fsf.org/product/free-software-free-";
+"society/\">자유 소프트웨어, 자유 사회: 리처스 M. 스톨먼 ì 
€ìž‘선집</a>&rsquo;"
+"에 포함되어 출판되었습니다."
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/right-to-read.lt-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.lt-diff.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/right-to-read.lt-diff.html       18 Oct 2016 16:29:50 -0000      1.10
+++ po/right-to-read.lt-diff.html       6 Nov 2016 21:28:15 -0000       1.11
@@ -15,34 +15,71 @@
 &lt;title&gt;The Right to Read
 - GNU Project - Free Software Foundation&lt;/title&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns &gt; p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --&gt;&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/philosophy/po/right-to-read.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
-&lt;h2&gt;The Right to Read&lt;/h2&gt;
+<span class="removed"><del><strong>&lt;h2&gt;The</strong></del></span>
+<span class="inserted"><ins><em>&lt;h2 class="center"&gt;The</em></ins></span> 
Right to Read&lt;/h2&gt;
 
-&lt;p&gt;
+<span class="removed"><del><strong>&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p class="byline 
center"&gt;</em></ins></span>
 by &lt;a href="http://www.stallman.org/"&gt;&lt;strong&gt;Richard 
Stallman&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;blockquote class="note"&gt;
 &lt;p&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of eBooks&lt;/a&gt;.&lt;/p&gt;
-&lt;/blockquote&gt;</strong></del></span>
+&lt;/blockquote&gt;
 
-&lt;p&gt;
+&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;p class="center"&gt;</em></ins></span>
 &lt;em&gt;This article appeared in the February 1997 issue
 of <span 
class="removed"><del><strong>&lt;strong&gt;Communications</strong></del></span> 
<span class="inserted"><ins><em>&lt;cite&gt;Communications</em></ins></span> of 
the <span class="removed"><del><strong>ACM&lt;/strong&gt;</strong></del></span> 
<span class="inserted"><ins><em>ACM&lt;/cite&gt;</em></ins></span> (Volume 40, 
Number
 2).&lt;/em&gt;&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;hr /&gt;</em></ins></span>
 
-&lt;blockquote&gt;&lt;p&gt;
+<span 
class="removed"><del><strong>&lt;blockquote&gt;&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;hr class="thin" /&gt;
+
+&lt;div class="article"&gt;
+&lt;blockquote class="info center"&gt;&lt;p&gt;</em></ins></span>
             From &lt;cite&gt;The Road To Tycho&lt;/cite&gt;, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 &lt;/p&gt;&lt;/blockquote&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -78,7 +115,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -122,7 +162,10 @@
 knowing your computer's root password.  And neither
 the <span class="removed"><del><strong>&lt;abbr title="Federal Bureau of 
Investigation"&gt;FBI&lt;/abbr&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI</em></ins></span> nor
 Microsoft Support would tell you that.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -159,7 +202,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -172,8 +218,9 @@
 
 
 <span class="removed"><del><strong>&lt;h3 
id="AuthorsNote"&gt;Author's</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;div class="announcement"&gt;
+&lt;div class="announcement"&gt;
 &lt;blockquote&gt;
 &lt;p&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of e-books&lt;/a&gt;.&lt;/p&gt;
 &lt;/blockquote&gt;
@@ -182,35 +229,49 @@
 &lt;div id="AuthorsNote"&gt;
 &lt;h3&gt;Author's</em></ins></span> Notes&lt;/h3&gt;
 
-&lt;ul&gt;
-&lt;li&gt;This story is supposedly a historical article that will be written in
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;This</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p&gt;This</em></ins></span> story is supposedly a historical article that 
will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the <span 
class="removed"><del><strong>enemies</strong></del></span> <span 
class="inserted"><ins><em>unjust forces</em></ins></span> that use 
&ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it <span class="removed"><del><strong>from today so as 
to sound even</strong></del></span> <span class="inserted"><ins><em>forwards 
into something</em></ins></span> more <span 
class="inserted"><ins><em>visibly</em></ins></span>
 oppressive. See &lt;a
 
href="/philosophy/words-to-avoid.html#Piracy"&gt;&ldquo;Piracy&rdquo;&lt;/a&gt;.
+<span class="inserted"><ins><em>&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;</em></ins></span>
 &lt;/li&gt;
 
 &lt;li&gt;
-<span class="inserted"><ins><em>&lt;p&gt;Computer-enforced restrictions on 
lending or reading books (and other
+<span class="inserted"><ins><em>&lt;div class="reduced-width"&gt;
+&lt;p&gt;Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the &lt;a href="http://DefectiveByDesign.org"&gt;Defective by
 Design&lt;/a&gt; campaign.  We ask for your support.&lt;/p&gt;
-&lt;/li&gt;
 
-&lt;li&gt;
 &lt;p&gt;The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 &lt;/li&gt;
+&lt;/ul&gt;
 
-&lt;li&gt;</em></ins></span>
+&lt;blockquote class="info center"&gt;</em></ins></span>
 &lt;p&gt;The following note has been updated several times since the first
 publication of the story.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
+&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The <span class="inserted"><ins><em>battle for the</em></ins></span> right to 
read is <span class="removed"><del><strong>a battle</strong></del></span> <span 
class="inserted"><ins><em>already</em></ins></span> being <span 
class="removed"><del><strong>fought today.</strong></del></span> <span 
class="inserted"><ins><em>fought.</em></ins></span>  Although it
 may take 50 years for our <span class="removed"><del><strong>present way of 
life</strong></del></span> <span class="inserted"><ins><em>past 
freedoms</em></ins></span> to fade into obscurity, most
@@ -279,23 +340,33 @@
 Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
-&lt;p&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p class="emph-box"&gt;
 Nonfree software tends to have &lt;a href="/proprietary/"&gt;abusive
 features of many kinds&lt;/a&gt;, which lead to the conclusion that
 &lt;a href="/philosophy/free-software-even-more-important.html"&gt;you can
 never trust a nonfree program&lt;/a&gt;.  We must insist on free (libre)
 software only, and reject nonfree programs.&lt;/p&gt;
 
-&lt;p&gt;
+&lt;p class="inline-block"&gt;
 With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span 
class="removed"><del><strong>2003.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
 downgrades.  It can also order all machines running Vista to refuse to
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
-10 is no better&lt;/p&gt;</em></ins></span>
+10 is no better&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the <span 
class="removed"><del><strong>&lt;abbr&gt;FBI&lt;/abbr&gt;</strong></del></span> 
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep 
the
@@ -328,22 +399,27 @@
 Vista's many restrictions</strong></del></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> to <span 
class="removed"><del><strong>impose DRM (Digital Restrictions
 Management)</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> that <span 
class="removed"><del><strong>users can't overcome.  The 
threat</strong></del></span>
 <span class="inserted"><ins><em>control on behalf</em></ins></span> of <span 
class="removed"><del><strong>DRM is why we
-have established</strong></del></span> the <span 
class="removed"><del><strong>&lt;a href="http://DefectiveByDesign.org"&gt;
-Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI when asked: it
-already &lt;a href="/proprietary/malware-microsoft.html"&gt;shows
-the NSA security bugs in Windows&lt;/a&gt; to exploit.&lt;/p&gt;
+have established</strong></del></span> the <span class="inserted"><ins><em>FBI 
when asked: it
+already</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://DefectiveByDesign.org"&gt;
+Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;shows
+the NSA security bugs in Windows&lt;/a&gt; to 
exploit.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;
-Secure boot can be implemented in a way that permits the user to
+<span class="removed"><del><strong>When</strong></del></span>
+<span class="inserted"><ins><em>Secure boot can be implemented in a way that 
permits the user to
 specify the signature key and decide what software to sign.  In
 practice, PCs designed for Windows 10 carry only Microsoft's key, and
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this &lt;em&gt;restricted
-boot&lt;/em&gt;.&lt;/p&gt;</em></ins></span>
+boot&lt;/em&gt;.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;
 &lt;p&gt;
-<span class="removed"><del><strong>When</strong></del></span>
-<span class="inserted"><ins><em>In 1997, when</em></ins></span> this story was 
first <span class="removed"><del><strong>written,</strong></del></span> <span 
class="inserted"><ins><em>published,</em></ins></span> the SPA was
+In 1997, when</em></ins></span> this story was first <span 
class="removed"><del><strong>written,</strong></del></span> <span 
class="inserted"><ins><em>published,</em></ins></span> the SPA was
 threatening small Internet service providers, demanding they permit
 the SPA to monitor all users.  Most ISPs surrendered when
 threatened, because they <span 
class="removed"><del><strong>cannot</strong></del></span> <span 
class="inserted"><ins><em>could not</em></ins></span> afford to fight back in 
court.  One
@@ -359,8 +435,13 @@
 reminiscent of the erstwhile Soviet Union, it invites people to inform
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;</em></ins></span>
+software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="reduced-width"&gt;</em></ins></span>
 &lt;p&gt;
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -382,12 +463,15 @@
 &lt;p&gt;
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 &lt;/li&gt;
 &lt;/ul&gt;
-<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="BadNews"&gt;Bad News&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The battle for the right to read is <span class="removed"><del><strong>already 
in progress,</strong></del></span> <span class="inserted"><ins><em>going 
against us so far.</em></ins></span>
 The enemy is organized, <span 
class="removed"><del><strong>while</strong></del></span> <span 
class="inserted"><ins><em>and</em></ins></span> we are <span 
class="removed"><del><strong>not, so it is going against us.
@@ -420,14 +504,14 @@
 &lt;li&gt;&lt;p&gt;It has DRM, which is intended to block users from
 sharing copies.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;It has a back door with which Amazon</em></ins></span> can
+&lt;li&gt;&lt;p class="inline-block"&gt;It has a back door with which 
Amazon</em></ins></span> can
      <span class="removed"><del><strong>revoke at will.&lt;/li&gt;
 &lt;li&gt;&lt;a 
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151"&gt;Electronic
      Publishing:&lt;/a&gt; An article about distribution</strong></del></span> 
<span class="inserted"><ins><em>remotely erase any book.
 In 2009, it erased thousands</em></ins></span> of <span 
class="removed"><del><strong>books in
      electronic form,</strong></del></span> <span 
class="inserted"><ins><em>copies of 1984, by George Orwell.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;In case all that isn't Orwellian enough, there is a 
universal
+&lt;li&gt;&lt;p class="inline-block"&gt;In case all that isn't Orwellian 
enough, there is a universal
 back door with which Amazon can remotely change the 
software,</em></ins></span> and <span class="removed"><del><strong>copyright 
issues affecting</strong></del></span>
 <span class="inserted"><ins><em>introduce any other form of 
nastiness.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -454,6 +538,7 @@
 our work more generally.  There is also a &lt;a href="/help/help.html"&gt;list 
of ways
 to participate in</em></ins></span> our <span 
class="removed"><del><strong>work.</strong></del></span> <span 
class="inserted"><ins><em>work&lt;/a&gt;.</em></ins></span>
 &lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="References"&gt;References&lt;/h3&gt;
 
@@ -479,23 +564,32 @@
        reverse the overextension of copyright and patent powers.&lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;hr /&gt;
+<span class="inserted"><ins><em>&lt;h4&gt;Other Texts to Read&lt;/h4&gt;
+
+&lt;ul&gt;
+       &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
+       GNU Project&lt;/a&gt;&lt;/li&gt;
+       &lt;li&gt;&lt;a 
href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html";
+               id="copy-protection"&gt;Copy Protection: Just Say No&lt;/a&gt;,
+               published in Computer World.&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;</em></ins></span>
+
+&lt;hr <span class="inserted"><ins><em>class="thin"</em></ins></span> /&gt;
 &lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
 in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
 Software, Free Society: The Selected Essays of Richard
 M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;
 
-&lt;h5&gt;Other Texts to Read&lt;/h5&gt;
+<span class="removed"><del><strong>&lt;h5&gt;Other Texts to Read&lt;/h5&gt;
 
 &lt;ul&gt;
        &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
        GNU Project&lt;/a&gt;&lt;/li&gt;
-       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No";
-               id="COPYPROCTECTION"&gt;Copy</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html";
-               id="copy-protection"&gt;Copy</em></ins></span> Protection: Just 
Say No&lt;/a&gt;,
-               <span 
class="removed"><del><strong>Published</strong></del></span>
-               <span class="inserted"><ins><em>published</em></ins></span> in 
Computer World.&lt;/li&gt;
-&lt;/ul&gt;
+       &lt;li&gt;&lt;a 
href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No";
+               id="COPYPROCTECTION"&gt;Copy Protection: Just Say No&lt;/a&gt;,
+               Published in Computer World.&lt;/li&gt;
+&lt;/ul&gt;</strong></del></span>
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
@@ -554,7 +648,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/right-to-read.lt.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.lt.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/right-to-read.lt.po      18 Oct 2016 16:29:50 -0000      1.13
+++ po/right-to-read.lt.po      6 Nov 2016 21:28:15 -0000       1.14
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-01-25 16:54+0200\n"
 "Last-Translator: Donatas Klimašauskas <address@hidden>\n"
 "Language-Team: Lithuanian <address@hidden>\n"
@@ -43,7 +43,7 @@
 "<em>Šis straipsnis pasirodė 1997&nbsp;m. vasario <strong>Communications of "
 "the ACM</strong> leidime (40 tomas, 2 numeris).</em>"
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -51,7 +51,7 @@
 "Iš <cite>The Road To Tycho</cite> &ndash; straipsnių apie Lunarian "
 "revoliucijos protėvius rinkinys, išleistas 2096&nbsp;m. Luna mieste."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -63,7 +63,7 @@
 "kitą, ji neišlaikytų jos viduriniojo termino projekto.  Ji nedrįso 
paprašyti "
 "nieko kito, išskyrus Dan."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -79,7 +79,7 @@
 "jis buvo mokomas nuo pagrindinės mokyklos, kad dalinimasis knygomis buvo "
 "bjaurus ir neteisingas &ndash; kažkas tokio, ką darytų tik piratai."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -101,7 +101,7 @@
 "gautų griežčiausią bausmę &ndash; už kančių to nusikaltimo 
prevencijai "
 "neprisiėmimą."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -124,7 +124,7 @@
 "siekė akademinės karjeros, jis galėjo tikėtis, kad jo paties moksliniai "
 "straipsniai, jei dažnai cituoti, atneštų pakankamai grąžinti šią 
paskolą.)"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -141,7 +141,7 @@
 "pradėjo imti mokesčius už prieigą.  2047&nbsp;m., bibliotekos 
siūlančios "
 "laisvą, viešą prieigą prie mokslinės literatūros buvo blanki atmintis."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -159,7 +159,7 @@
 "suvilioti išdavystei).  2047&nbsp;m., Frank buvo kalėjime, ne už piratinį 
"
 "skaitymą, bet už derintuvės turėjimą."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -175,7 +175,7 @@
 "praktikoje tapo jų principiniu naudojimu.  Tai reiškė jie buvo nelegalūs; 
"
 "derintuvių autoriai buvo nusiųsti į kalėjimą."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -188,7 +188,7 @@
 "klasėje naudota derintuvė buvo laikoma už specialios ugniasienės taip, 
kad "
 "ją būtų galima naudoti tik klasės praktinėms užduotims."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "It was also possible to bypass the copyright monitors by installing a "
@@ -216,7 +216,7 @@
 "šakninio slaptažodžio.  Ir nei <abbr title=\"Federal Bureau of 
Investigation"
 "\">FBI</abbr>, nei Microsoft Support jums tą pasakytų."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -228,7 +228,7 @@
 "Kiekviena proga su ja pasišnekėti jį užpildydavo pasigėrėjimu.  Ir, kad 
ji "
 "pasirinko jį paprašyti pagalbos, tai galėjo reikšti ji jį irgi mylėjo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -242,7 +242,7 @@
 "jis.  Vis tiek tai buvo nusikaltimas, bet SPA automatiškai apie tai "
 "nesužinotų.  Jie sužinotų tik jei Lissa jį įduotų."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -262,7 +262,7 @@
 "Jie priėmė, kad tai reiškė jūs darėte kažką kitką uždraustą ir 
jiems "
 "nereikėjo žinoti kas tai buvo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -272,7 +272,7 @@
 "jiems uždrausdavo tos mokyklos kompiuterines sistemas ir neišvengiamai "
 "neišlaikytų visų jų dalykų."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -286,7 +286,7 @@
 "studento discipliną; jie baudė veiklas, kurios buvo žalingos, ne tas, 
kurios "
 "vos kėlė įtarimą."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -306,7 +306,7 @@
 "prasidėjo Tycho sukilimas, universali teisė skaityti greitai tapo vienu iš 
"
 "jo svarbiausių tikslų."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing "
@@ -318,11 +318,11 @@
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Prisijunkite prie mūsų 
"
 "laiškų apie e-knygų pavojus siuntimo sąrašo</a>."
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr "Autoriaus pastabos"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "This story is supposedly a historical article that will be written in the "
@@ -347,7 +347,7 @@
 "Pamatykite <a href=\"/philosophy/words-to-avoid.html#Piracy\">&bdquo;"
 "Piratavimas&ldquo;</a>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -356,13 +356,13 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The following note has been updated several times since the first "
 "publication of the story."
@@ -370,7 +370,7 @@
 "Pastaroji pastaba nuo pirmo šios istorijos publikavimo buvo keletą kartų "
 "atnaujinta."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The right to read is a battle being fought today.  Although it may take "
@@ -405,7 +405,7 @@
 "paprastas DeCSS &ndash; laisva programa DVD video dešifravimui, kopijos "
 "turėjimas yra nusikaltimas."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -416,7 +416,7 @@
 "these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -427,14 +427,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -443,7 +443,7 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -469,7 +469,7 @@
 "naudotojai negali apeiti.  DRM pavojus yra tai, dėl ko mes įsteigėme <a 
href="
 "\"http://DefectiveByDesign.org\";>Defective by Design</a> kampaniją."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "One of the ideas in the story was not proposed in reality until 2002.  "
@@ -484,14 +484,14 @@
 "Tai yra idėja, kad <abbr>FBI</abbr> ir Microsoft laikys jūsų asmeninių "
 "kompiuterių šakninius slaptažodžius ir neleis jums jų turėti."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
 "into use, it is called &ldquo;secure boot&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -517,7 +517,7 @@
 "bendradarbiauja su Microsoft, visiškai kontroliuoti tą, ką naudotojas gali 
"
 "daryti jo paties kompiuteriu."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -526,7 +526,7 @@
 "control.  We call this <em>restricted boot</em>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "When this story was first written, the SPA was threatening small Internet "
@@ -552,7 +552,7 @@
 "SPA vėliau atsiėmė tą ieškinį, bet įgijo DMCA, kuris jiems suteikė 
galią, "
 "kurios jie siekė."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The SPA, which actually stands for Software Publishers Association, has "
@@ -581,7 +581,7 @@
 "padarė šiek tiek paslėptus grasinimus, kad žmonės besidalinantys 
programine "
 "įranga būtų išprievartauti."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -591,7 +591,7 @@
 "Pavyzdžiui, viename Čikagos srities universitete kompiuteris prisijungus "
 "parodė šią žinutę:"
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -615,7 +615,7 @@
 "personalas gali pateikti tą tokio stebėjimo įrodymą Universiteto "
 "administratoriams ir (arba) teisėtvarkos pareigūnams."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -623,11 +623,11 @@
 "Tai yra įdomus požiūris į Ketvirtą pataisą: beveik visus spausti 
sutikti, iš "
 "anksto, atsisakyti jų teisių pagal ją."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "Blogos naujienos"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The battle for the right to read is already in progress, The enemy is "
@@ -642,7 +642,7 @@
 "taigi, jis eina priešais mus.  Štai yra straipsniai apie blogus dalykus, "
 "kurie įvyko po pirmo šio straipsnio publikavimo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -653,31 +653,31 @@
 "for rejecting the product completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -689,7 +689,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "If we want to stop the bad news and create some good news, we need to "
@@ -712,11 +712,11 @@
 "Ir <a href=\"http://www.fsf.org/associate\";>prisijunkite prie FSF</a> "
 "pagalbai finansuoti mūsų darbą."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Nuorodos"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -729,7 +729,7 @@
 "infrastruktūra: Intelektinės nuosavybės [tai jau taip] teisių darbo 
grupės "
 "ataskaita (1995&nbsp;m.)."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -739,7 +739,7 @@
 "\">Baltosios ataskaitos paaiškinimas: Autorių teisių sugriebimas</a>, 
Pamela "
 "Samuelson, Wired, 1996&nbsp;m. sausis."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -747,7 +747,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Parduota</a>, "
 "James Boyle, New York Times, 1996&nbsp;m. kovo 31&nbsp;d."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -757,7 +757,7 @@
 "people.org/archives/interesting-people/199611/msg00012.html\">Vieši duomenys 
"
 "ar privatūs duomenys</a>, Washington Post, 1996&nbsp;m. lapkričio 4&nbsp;d."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.public-domain.org/\";>Union for the Public Domain</"
@@ -772,26 +772,16 @@
 "organizacija, kuri siekia priešintis ir apgręžti autorių teisių ir 
patento "
 "galių perdėtą išplėtimą."
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Ši esė yra publikuota <a href=\"http://shop.fsf.org/product/free-software-";
-"free-society/\"><cite>Laisva programinė įranga, laisva visuomenė: 
rinktinės "
-"Richard M. Stallman esės</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Kiti tekstai skaitymui"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">GNU projekto filosofija</a>."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.computerworld.com/s/article/49358/";
@@ -806,6 +796,16 @@
 "Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">Kopijavimo apsauga: "
 "tiesiog pasakykite ne</a>, publikuotas Computer World."
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Ši esė yra publikuota <a href=\"http://shop.fsf.org/product/free-software-";
+"free-society/\"><cite>Laisva programinė įranga, laisva visuomenė: 
rinktinės "
+"Richard M. Stallman esės</cite></a>."
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/right-to-read.nl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.nl-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/right-to-read.nl-diff.html       18 Oct 2016 16:29:50 -0000      1.24
+++ po/right-to-read.nl-diff.html       6 Nov 2016 21:28:15 -0000       1.25
@@ -15,34 +15,71 @@
 &lt;title&gt;The Right to Read
 - GNU Project - Free Software Foundation&lt;/title&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns &gt; p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --&gt;&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/philosophy/po/right-to-read.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
-&lt;h2&gt;The Right to Read&lt;/h2&gt;
+<span class="removed"><del><strong>&lt;h2&gt;The</strong></del></span>
+<span class="inserted"><ins><em>&lt;h2 class="center"&gt;The</em></ins></span> 
Right to Read&lt;/h2&gt;
 
-&lt;p&gt;
+<span class="removed"><del><strong>&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p class="byline 
center"&gt;</em></ins></span>
 by &lt;a href="http://www.stallman.org/"&gt;&lt;strong&gt;Richard 
Stallman&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;blockquote class="note"&gt;
 &lt;p&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of eBooks&lt;/a&gt;.&lt;/p&gt;
-&lt;/blockquote&gt;</strong></del></span>
+&lt;/blockquote&gt;
 
-&lt;p&gt;
+&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;p class="center"&gt;</em></ins></span>
 &lt;em&gt;This article appeared in the February 1997 issue
 of <span 
class="removed"><del><strong>&lt;strong&gt;Communications</strong></del></span> 
<span class="inserted"><ins><em>&lt;cite&gt;Communications</em></ins></span> of 
the <span class="removed"><del><strong>ACM&lt;/strong&gt;</strong></del></span> 
<span class="inserted"><ins><em>ACM&lt;/cite&gt;</em></ins></span> (Volume 40, 
Number
 2).&lt;/em&gt;&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;hr /&gt;</em></ins></span>
 
-&lt;blockquote&gt;&lt;p&gt;
+<span 
class="removed"><del><strong>&lt;blockquote&gt;&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;hr class="thin" /&gt;
+
+&lt;div class="article"&gt;
+&lt;blockquote class="info center"&gt;&lt;p&gt;</em></ins></span>
             From &lt;cite&gt;The Road To Tycho&lt;/cite&gt;, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 &lt;/p&gt;&lt;/blockquote&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -78,7 +115,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -122,7 +162,10 @@
 knowing your computer's root password.  And neither
 the <span class="removed"><del><strong>&lt;abbr title="Federal Bureau of 
Investigation"&gt;FBI&lt;/abbr&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI</em></ins></span> nor
 Microsoft Support would tell you that.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -159,7 +202,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -172,8 +218,9 @@
 
 
 <span class="removed"><del><strong>&lt;h3 
id="AuthorsNote"&gt;Author's</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;div class="announcement"&gt;
+&lt;div class="announcement"&gt;
 &lt;blockquote&gt;
 &lt;p&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of e-books&lt;/a&gt;.&lt;/p&gt;
 &lt;/blockquote&gt;
@@ -182,35 +229,49 @@
 &lt;div id="AuthorsNote"&gt;
 &lt;h3&gt;Author's</em></ins></span> Notes&lt;/h3&gt;
 
-&lt;ul&gt;
-&lt;li&gt;This story is supposedly a historical article that will be written in
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;This</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p&gt;This</em></ins></span> story is supposedly a historical article that 
will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the <span 
class="removed"><del><strong>enemies</strong></del></span> <span 
class="inserted"><ins><em>unjust forces</em></ins></span> that use 
&ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it <span class="removed"><del><strong>from today so as 
to sound even</strong></del></span> <span class="inserted"><ins><em>forwards 
into something</em></ins></span> more <span 
class="inserted"><ins><em>visibly</em></ins></span>
 oppressive. See &lt;a
 
href="/philosophy/words-to-avoid.html#Piracy"&gt;&ldquo;Piracy&rdquo;&lt;/a&gt;.
+<span class="inserted"><ins><em>&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;</em></ins></span>
 &lt;/li&gt;
 
 &lt;li&gt;
-<span class="inserted"><ins><em>&lt;p&gt;Computer-enforced restrictions on 
lending or reading books (and other
+<span class="inserted"><ins><em>&lt;div class="reduced-width"&gt;
+&lt;p&gt;Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the &lt;a href="http://DefectiveByDesign.org"&gt;Defective by
 Design&lt;/a&gt; campaign.  We ask for your support.&lt;/p&gt;
-&lt;/li&gt;
 
-&lt;li&gt;
 &lt;p&gt;The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 &lt;/li&gt;
+&lt;/ul&gt;
 
-&lt;li&gt;</em></ins></span>
+&lt;blockquote class="info center"&gt;</em></ins></span>
 &lt;p&gt;The following note has been updated several times since the first
 publication of the story.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
+&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The <span class="inserted"><ins><em>battle for the</em></ins></span> right to 
read is <span class="removed"><del><strong>a battle</strong></del></span> <span 
class="inserted"><ins><em>already</em></ins></span> being <span 
class="removed"><del><strong>fought today.</strong></del></span> <span 
class="inserted"><ins><em>fought.</em></ins></span>  Although it
 may take 50 years for our <span class="removed"><del><strong>present way of 
life</strong></del></span> <span class="inserted"><ins><em>past 
freedoms</em></ins></span> to fade into obscurity, most
@@ -279,23 +340,33 @@
 Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
-&lt;p&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p class="emph-box"&gt;
 Nonfree software tends to have &lt;a href="/proprietary/"&gt;abusive
 features of many kinds&lt;/a&gt;, which lead to the conclusion that
 &lt;a href="/philosophy/free-software-even-more-important.html"&gt;you can
 never trust a nonfree program&lt;/a&gt;.  We must insist on free (libre)
 software only, and reject nonfree programs.&lt;/p&gt;
 
-&lt;p&gt;
+&lt;p class="inline-block"&gt;
 With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span 
class="removed"><del><strong>2003.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
 downgrades.  It can also order all machines running Vista to refuse to
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
-10 is no better&lt;/p&gt;</em></ins></span>
+10 is no better&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the <span 
class="removed"><del><strong>&lt;abbr&gt;FBI&lt;/abbr&gt;</strong></del></span> 
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep 
the
@@ -328,22 +399,27 @@
 Vista's many restrictions</strong></del></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> to <span 
class="removed"><del><strong>impose DRM (Digital Restrictions
 Management)</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> that <span 
class="removed"><del><strong>users can't overcome.  The 
threat</strong></del></span>
 <span class="inserted"><ins><em>control on behalf</em></ins></span> of <span 
class="removed"><del><strong>DRM is why we
-have established</strong></del></span> the <span 
class="removed"><del><strong>&lt;a href="http://DefectiveByDesign.org"&gt;
-Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI when asked: it
-already &lt;a href="/proprietary/malware-microsoft.html"&gt;shows
-the NSA security bugs in Windows&lt;/a&gt; to exploit.&lt;/p&gt;
+have established</strong></del></span> the <span class="inserted"><ins><em>FBI 
when asked: it
+already</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://DefectiveByDesign.org"&gt;
+Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;shows
+the NSA security bugs in Windows&lt;/a&gt; to 
exploit.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;
-Secure boot can be implemented in a way that permits the user to
+<span class="removed"><del><strong>When</strong></del></span>
+<span class="inserted"><ins><em>Secure boot can be implemented in a way that 
permits the user to
 specify the signature key and decide what software to sign.  In
 practice, PCs designed for Windows 10 carry only Microsoft's key, and
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this &lt;em&gt;restricted
-boot&lt;/em&gt;.&lt;/p&gt;</em></ins></span>
+boot&lt;/em&gt;.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;
 &lt;p&gt;
-<span class="removed"><del><strong>When</strong></del></span>
-<span class="inserted"><ins><em>In 1997, when</em></ins></span> this story was 
first <span class="removed"><del><strong>written,</strong></del></span> <span 
class="inserted"><ins><em>published,</em></ins></span> the SPA was
+In 1997, when</em></ins></span> this story was first <span 
class="removed"><del><strong>written,</strong></del></span> <span 
class="inserted"><ins><em>published,</em></ins></span> the SPA was
 threatening small Internet service providers, demanding they permit
 the SPA to monitor all users.  Most ISPs surrendered when
 threatened, because they <span 
class="removed"><del><strong>cannot</strong></del></span> <span 
class="inserted"><ins><em>could not</em></ins></span> afford to fight back in 
court.  One
@@ -359,8 +435,13 @@
 reminiscent of the erstwhile Soviet Union, it invites people to inform
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;</em></ins></span>
+software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="reduced-width"&gt;</em></ins></span>
 &lt;p&gt;
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -382,16 +463,19 @@
 &lt;p&gt;
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 &lt;/li&gt;
 &lt;/ul&gt;
-<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="BadNews"&gt;Bad News&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The battle for the right to read is <span class="removed"><del><strong>already 
in progress,</strong></del></span> <span class="inserted"><ins><em>going 
against us so far.</em></ins></span>
-The enemy is organized, <span 
class="removed"><del><strong>while</strong></del></span> <span 
class="inserted"><ins><em>and</em></ins></span> we are <span 
class="removed"><del><strong>not, so it is going against us.
-Here are articles about bad things that have happened since the
+The enemy is <span class="removed"><del><strong>organized, while we are not, 
so it is going against us.
+Here</strong></del></span> <span class="inserted"><ins><em>organized, and 
we</em></ins></span> are <span class="removed"><del><strong>articles about bad 
things that have happened since the
 original publication of this article.&lt;/p&gt;
 
 &lt;ul&gt;
@@ -414,20 +498,20 @@
 
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;It spies on everything the user does:</em></ins></span> it 
<span class="removed"><del><strong>to anyone 
else&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>reports 
which book the
-user is reading, and</em></ins></span> which <span 
class="inserted"><ins><em>page, and it reports when the user highlights
-text, and any notes</em></ins></span> the <span 
class="removed"><del><strong>publisher</strong></del></span> <span 
class="inserted"><ins><em>user enters.&lt;/p&gt;&lt;/li&gt;
+user is reading, and</em></ins></span> which <span 
class="inserted"><ins><em>page, and it reports when</em></ins></span> the <span 
class="removed"><del><strong>publisher</strong></del></span> <span 
class="inserted"><ins><em>user highlights
+text, and any notes the user enters.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;It has DRM, which is intended to block users from
 sharing copies.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;It has a back door with which Amazon</em></ins></span> can
+&lt;li&gt;&lt;p class="inline-block"&gt;It has a back door with which 
Amazon</em></ins></span> can
      <span class="removed"><del><strong>revoke at will.&lt;/li&gt;
 &lt;li&gt;&lt;a 
href="http://www.zdnet.com/article/seybold-opens-chapter-on-digital-books/"&gt;Electronic
      Publishing:&lt;/a&gt; An article about distribution</strong></del></span> 
<span class="inserted"><ins><em>remotely erase any book.
 In 2009, it erased thousands</em></ins></span> of <span 
class="removed"><del><strong>books in
      electronic form,</strong></del></span> <span 
class="inserted"><ins><em>copies of 1984, by George Orwell.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;In case all that isn't Orwellian enough, there is a 
universal
+&lt;li&gt;&lt;p class="inline-block"&gt;In case all that isn't Orwellian 
enough, there is a universal
 back door with which Amazon can remotely change the 
software,</em></ins></span> and <span class="removed"><del><strong>copyright 
issues affecting</strong></del></span>
 <span class="inserted"><ins><em>introduce any other form of 
nastiness.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -454,6 +538,7 @@
 our work more generally.  There is also a &lt;a href="/help/help.html"&gt;list 
of ways
 to participate in</em></ins></span> our <span 
class="removed"><del><strong>work.</strong></del></span> <span 
class="inserted"><ins><em>work&lt;/a&gt;.</em></ins></span>
 &lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="References"&gt;References&lt;/h3&gt;
 
@@ -479,13 +564,15 @@
        reverse the overextension of copyright and patent powers.&lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;hr /&gt;
+<span class="removed"><del><strong>&lt;hr /&gt;
 &lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
 in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
 Software, Free Society: The Selected Essays of Richard
 M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;
 
-&lt;h5&gt;Other Texts to Read&lt;/h5&gt;
+&lt;h5&gt;Other</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h4&gt;Other</em></ins></span> Texts to 
<span class="removed"><del><strong>Read&lt;/h5&gt;</strong></del></span> <span 
class="inserted"><ins><em>Read&lt;/h4&gt;</em></ins></span>
 
 &lt;ul&gt;
        &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
@@ -494,6 +581,13 @@
                id="copy-protection"&gt;Copy Protection: Just Say No&lt;/a&gt;,
                published in Computer World.&lt;/li&gt;
 &lt;/ul&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;hr class="thin" /&gt;
+&lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
+in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
+Software, Free Society: The Selected Essays of Richard
+M. 
Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;</em></ins></span>
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
@@ -552,7 +646,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/right-to-read.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.nl.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/right-to-read.nl.po      18 Oct 2016 16:29:50 -0000      1.31
+++ po/right-to-read.nl.po      6 Nov 2016 21:28:15 -0000       1.32
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Tom Uijldert <address@hidden>\n"
 "Language-Team: Dutch\n"
@@ -48,7 +48,7 @@
 "<em>Dit artikel verscheen eerder in het februarinummer uit 1997 van "
 "<strong>Communications of the ACM</strong> (Volume 40, nummer 2).</em>"
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -56,7 +56,7 @@
 "Uit <cite>De Gang Naar Tycho</cite>, een serie artikelen over de "
 "voorgeschiedenis van de Luna-revolutie, verschenen in Maanstad in 2096"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -68,7 +68,7 @@
 "een andere kon lenen zou ze te laat zijn met haar werkstuk. Ze durfde het "
 "alleen Dirk te vragen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -85,7 +85,7 @@
 "het uitlenen van boeken iets slechts en crimineels was&mdash;iets wat alleen "
 "piraten deden."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -106,7 +106,7 @@
 "Hijzelf, als eigenaar van de computer, zou de zwaarste straf krijgen&mdash;"
 "omdat hij niet zijn best zou hebben gedaan deze misdaad te voorkomen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -130,7 +130,7 @@
 "zijn eigen wetenschappelijke publicaties zijn lening terug te kunnen "
 "betalen, mits zijn publicaties maar vaak genoeg zouden worden gerefereerd.)"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -148,7 +148,7 @@
 "toegang. Tegen 2047 was zelfs de <em> herinnering</em> aan bibliotheken die "
 "vrijelijk toegang boden vervaagd."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -168,7 +168,7 @@
 "gevangenis. Niet voor lees-piraterij maar voor het in bezit hebben van een "
 "debug-programma."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -185,7 +185,7 @@
 "betekende dus dat ze illegaal waren; de ontwikkelaars van debug-programma's "
 "belandden in de cel."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -198,7 +198,7 @@
 "Dirk in de lessen gebruikte zat achter een speciale firewall zodat deze "
 "alleen voor de lessen kon worden gebruikt."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 # | It was also possible to bypass the copyright monitors by installing a
 # | modified system kernel.  Dan would eventually find out about the free
 # | kernels, even entire free operating systems, that had existed around the
@@ -234,7 +234,7 @@
 "\"Federal Bureau of Investigation\">FBI</abbr>, noch Microsoft support zou "
 "je die geven."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -247,7 +247,7 @@
 "uitgerekend h&eacute;m vroeg haar te helpen zou wel eens kunnen betekenen "
 "dat zij ook wat voor hem voelde."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -262,7 +262,7 @@
 "misdaad maar de SBD zou er niet automatisch achter komen. Dat zou alleen "
 "gebeuren wanneer Lisa hem zou verraden."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -282,7 +282,7 @@
 "Ze namen daarbij automatisch aan dat je dus iets illegaals aan het doen was "
 "en het interesseerde ze daarbij niet wat dat dan was."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -292,7 +292,7 @@
 "meteen.  In plaats daarvan werd hen de toegang tot de schoolcomputers "
 "ontzegd, zodat ze uiteindelijk hun tentamens niet konden halen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -306,7 +306,7 @@
 "activiteiten die schadelijk waren werden bestraft, niet de activiteiten die "
 "slechts verdacht waren."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -326,7 +326,7 @@
 "de lange arm van de SBD.  Toen de Tycho revolutie in 2062 begon werd het "
 "centrale thema hiervan het universele recht om te lezen."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 # | <a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list
 # | about the dangers of [-eBooks</a>.-] {+e-books</a>.+}
 #, fuzzy
@@ -340,11 +340,11 @@
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Meld je aan bij onze "
 "mailinglijst over de gevaren van e-boeken</a>."
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr "Opmerkingen van de auteur"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 # | This story is supposedly a historical article that will be written in the
 # | future by someone else, describing Dan Halbert's youth under a repressive
 # | society shaped by the [-enemies-] {+unjust forces+} that use
@@ -376,7 +376,7 @@
 "weerspiegelen zodat het nog repressiever klinkt. Zie ook <a href=\"/"
 "philosophy/words-to-avoid.html#Piracy\">&ldquo;piraterij&rdquo;</a>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -385,13 +385,13 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The following note has been updated several times since the first "
 "publication of the story."
@@ -399,7 +399,7 @@
 "De volgende opmerking is meerdere keren bijgewerkt sinds de eerste "
 "publicatie."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 # | The {+battle for the+} right to read is [-a battle-] {+already+} being
 # | [-fought today.-] {+fought.+}  Although it may take 50 years for our
 # | [-present way of life-] {+past freedoms+} to fade into obscurity, most of
@@ -450,7 +450,7 @@
 "van het programma DeCSS, een vrij programma voor het ontcijferen van DVD-"
 "versleuteling."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -461,7 +461,7 @@
 "these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -472,14 +472,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -488,7 +488,7 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 # | [-Vista also gives-]{+With Windows Vista,+} Microsoft [-additional powers;
 # | for instance,-] {+admitted it had built in a back door:+} Microsoft can
 # | {+use it to+} forcibly install [-upgrades, and it-] {+software
@@ -525,7 +525,7 @@
 "bedreiging is de aanleiding voor de <a href=\"http://DefectiveByDesign.org";
 "\">Defective by Design</a>-campagne."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 # | One of the ideas in the story was not proposed in reality until 2002. 
 # | This is the idea that the [-<abbr>FBI</abbr>-] {+FBI+} and Microsoft will
 # | keep the root passwords for your personal computers, and not let you have
@@ -544,14 +544,14 @@
 "voorgesteld. Dat is het voorstel waarbij de <abbr>FBI</abbr> en Microsoft "
 "het systeemwachtwoord van je systeem beheren en het jou niet geven."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
 "into use, it is called &ldquo;secure boot&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 # | What Microsoft keeps is not exactly a password in the traditional sense;
 # | no person ever types it on a terminal.  Rather, it is a signature and
 # | encryption key that corresponds to a second key stored in your computer. 
@@ -585,7 +585,7 @@
 "computer.  Dit geeft Microsoft, en mogelijk iedere website die met Microsoft "
 "samenwerkt, totale controle over wat een gebruiker kan doen op zijn computer."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -594,7 +594,7 @@
 "control.  We call this <em>restricted boot</em>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 # | [-When-]{+In 1997, when+} this story was first [-written,-] {+published,+}
 # | the SPA was threatening small Internet service providers, demanding they
 # | permit the SPA to monitor all users.  Most ISPs surrendered when
@@ -629,7 +629,7 @@
 "verkreeg in plaats daarvan wel de DMCA, die hen de macht geeft die ze "
 "zochten."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 # | The SPA, which actually stands for Software Publishers Association, has
 # | been replaced in its police-like role by the Business Software Alliance. 
 # | The BSA is not, today, an official police force; unofficially, it acts
@@ -664,7 +664,7 @@
 "terreurcampagne van de BSA in Argentini&euml; in 2001 suggereerde dat mensen "
 "die software deelden verkracht zouden worden."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -674,7 +674,7 @@
 "verzonnen. Computers op een universiteit bij Chigago laten deze boodschap "
 "zien wanneer je inlogt:"
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -696,7 +696,7 @@
 "door de beheerders kan worden aangeleverd als bewijs aan de universiteit en/"
 "of de autoriteiten."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -704,11 +704,11 @@
 "Dit is een interessante toepassing van het vierde amendement: zet iedereen "
 "bij voorbaat onder druk om af te zien van hun rechten."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "Slecht nieuws"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 # | The battle for the right to read is [-already in progress,-] {+going
 # | against us so far.+}  The enemy is organized, [-while-] {+and+} we are
 # | [-not, so it is going against us.  Here are articles about bad things that
@@ -728,7 +728,7 @@
 "diverse slechte ontwikkelingen op dit gebied sinds de publicatie van dit "
 "artikel."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -739,31 +739,31 @@
 "for rejecting the product completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -775,7 +775,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 # | If we want to stop the bad news and create some good news, we need to
 # | organize and fight.  [-The-]  {+Subscribe to the+} FSF's <a
 # | href=\"http://defectivebydesign.org\";> Defective by Design</a> campaign
@@ -805,11 +805,11 @@
 "bij de mailinglijst om hulp te bieden. En <a href=\"http://www.fsf.org/";
 "associate\">sluit je aan bij de FSF</a> om ons werk te helpen financieren."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Referenties"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -821,7 +821,7 @@
 "a>] and the National Information Infrastructure: The Report of the Working "
 "Group on Intellectual Property [sic] Rights (1995)."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -831,7 +831,7 @@
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
 "Wired, januari 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -839,7 +839,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 maart 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -849,7 +849,7 @@
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
 "Private Data</a>, Washington Post, 4 november 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 # | <a [-href=\"http://www.public-domain.org/\";>Union-]
 # | 
{+href=\"https://web.archive.org/web/20151113122141/http://public-domain.org/\";>Union+}
 # | for the Public Domain</a>&mdash;an organization which aims to resist and
@@ -868,27 +868,17 @@
 "a>&mdash;een organisatie die tot doel heeft het doorslaan van auteursrechten "
 "en patenten tegen te gaan."
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Dit verhaal is gepubliceerd in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Vrije software, vrije maatschappij: "
-"geselecteerde artikelen van Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Andere artikelen die je kunt lezen"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr ""
 "<a href=\"/philosophy/philosophy.html\">De filosofie van het GNU-project</a>"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.computerworld.com/article/2596679/networking/copy-";
 "protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -898,6 +888,16 @@
 "protection--just-say-no.html\" id=\"copy-protection\">Kopieerbeveiliging: "
 "zeg gewoon nee</a>, gepubliceerd door Computer World."
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Dit verhaal is gepubliceerd in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Vrije software, vrije maatschappij: "
+"geselecteerde artikelen van Richard M. Stallman</cite></a>."
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/right-to-read.pl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.pl-diff.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/right-to-read.pl-diff.html       18 Oct 2016 16:29:50 -0000      1.12
+++ po/right-to-read.pl-diff.html       6 Nov 2016 21:28:15 -0000       1.13
@@ -15,34 +15,71 @@
 &lt;title&gt;The Right to Read
 - GNU Project - Free Software Foundation&lt;/title&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns &gt; p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --&gt;&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/philosophy/po/right-to-read.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
-&lt;h2&gt;The Right to Read&lt;/h2&gt;
+<span class="removed"><del><strong>&lt;h2&gt;The</strong></del></span>
+<span class="inserted"><ins><em>&lt;h2 class="center"&gt;The</em></ins></span> 
Right to Read&lt;/h2&gt;
 
-&lt;p&gt;
+<span class="removed"><del><strong>&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p class="byline 
center"&gt;</em></ins></span>
 by &lt;a href="http://www.stallman.org/"&gt;&lt;strong&gt;Richard 
Stallman&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;blockquote class="note"&gt;
 &lt;p&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of eBooks&lt;/a&gt;.&lt;/p&gt;
-&lt;/blockquote&gt;</strong></del></span>
+&lt;/blockquote&gt;
 
-&lt;p&gt;
+&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;p class="center"&gt;</em></ins></span>
 &lt;em&gt;This article appeared in the February 1997 issue
 of <span 
class="removed"><del><strong>&lt;strong&gt;Communications</strong></del></span> 
<span class="inserted"><ins><em>&lt;cite&gt;Communications</em></ins></span> of 
the <span class="removed"><del><strong>ACM&lt;/strong&gt;</strong></del></span> 
<span class="inserted"><ins><em>ACM&lt;/cite&gt;</em></ins></span> (Volume 40, 
Number
 2).&lt;/em&gt;&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;hr /&gt;</em></ins></span>
 
-&lt;blockquote&gt;&lt;p&gt;
+<span 
class="removed"><del><strong>&lt;blockquote&gt;&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;hr class="thin" /&gt;
+
+&lt;div class="article"&gt;
+&lt;blockquote class="info center"&gt;&lt;p&gt;</em></ins></span>
             From &lt;cite&gt;The Road To Tycho&lt;/cite&gt;, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 &lt;/p&gt;&lt;/blockquote&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -78,7 +115,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -122,7 +162,10 @@
 knowing your computer's root password.  And neither
 the <span class="removed"><del><strong>&lt;abbr title="Federal Bureau of 
Investigation"&gt;FBI&lt;/abbr&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI</em></ins></span> nor
 Microsoft Support would tell you that.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -159,7 +202,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -172,8 +218,9 @@
 
 
 <span class="removed"><del><strong>&lt;h3 
id="AuthorsNote"&gt;Author's</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;div class="announcement"&gt;
+&lt;div class="announcement"&gt;
 &lt;blockquote&gt;
 &lt;p&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of e-books&lt;/a&gt;.&lt;/p&gt;
 &lt;/blockquote&gt;
@@ -182,35 +229,49 @@
 &lt;div id="AuthorsNote"&gt;
 &lt;h3&gt;Author's</em></ins></span> Notes&lt;/h3&gt;
 
-&lt;ul&gt;
-&lt;li&gt;This story is supposedly a historical article that will be written in
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;This</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p&gt;This</em></ins></span> story is supposedly a historical article that 
will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the <span 
class="removed"><del><strong>enemies</strong></del></span> <span 
class="inserted"><ins><em>unjust forces</em></ins></span> that use 
&ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it <span class="removed"><del><strong>from today so as 
to sound even</strong></del></span> <span class="inserted"><ins><em>forwards 
into something</em></ins></span> more <span 
class="inserted"><ins><em>visibly</em></ins></span>
 oppressive. See &lt;a
 
href="/philosophy/words-to-avoid.html#Piracy"&gt;&ldquo;Piracy&rdquo;&lt;/a&gt;.
+<span class="inserted"><ins><em>&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;</em></ins></span>
 &lt;/li&gt;
 
 &lt;li&gt;
-<span class="inserted"><ins><em>&lt;p&gt;Computer-enforced restrictions on 
lending or reading books (and other
+<span class="inserted"><ins><em>&lt;div class="reduced-width"&gt;
+&lt;p&gt;Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the &lt;a href="http://DefectiveByDesign.org"&gt;Defective by
 Design&lt;/a&gt; campaign.  We ask for your support.&lt;/p&gt;
-&lt;/li&gt;
 
-&lt;li&gt;
 &lt;p&gt;The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 &lt;/li&gt;
+&lt;/ul&gt;
 
-&lt;li&gt;</em></ins></span>
+&lt;blockquote class="info center"&gt;</em></ins></span>
 &lt;p&gt;The following note has been updated several times since the first
 publication of the story.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
+&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The <span class="inserted"><ins><em>battle for the</em></ins></span> right to 
read is <span class="removed"><del><strong>a battle</strong></del></span> <span 
class="inserted"><ins><em>already</em></ins></span> being <span 
class="removed"><del><strong>fought today.</strong></del></span> <span 
class="inserted"><ins><em>fought.</em></ins></span>  Although it
 may take 50 years for our <span class="removed"><del><strong>present way of 
life</strong></del></span> <span class="inserted"><ins><em>past 
freedoms</em></ins></span> to fade into obscurity, most
@@ -279,23 +340,33 @@
 Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
-&lt;p&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p class="emph-box"&gt;
 Nonfree software tends to have &lt;a href="/proprietary/"&gt;abusive
 features of many kinds&lt;/a&gt;, which lead to the conclusion that
 &lt;a href="/philosophy/free-software-even-more-important.html"&gt;you can
 never trust a nonfree program&lt;/a&gt;.  We must insist on free (libre)
 software only, and reject nonfree programs.&lt;/p&gt;
 
-&lt;p&gt;
+&lt;p class="inline-block"&gt;
 With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span 
class="removed"><del><strong>2003.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
 downgrades.  It can also order all machines running Vista to refuse to
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
-10 is no better&lt;/p&gt;</em></ins></span>
+10 is no better&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the <span 
class="removed"><del><strong>&lt;abbr&gt;FBI&lt;/abbr&gt;</strong></del></span> 
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep 
the
@@ -328,22 +399,27 @@
 Vista's many restrictions</strong></del></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> to <span 
class="removed"><del><strong>impose DRM (Digital Restrictions
 Management)</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> that <span 
class="removed"><del><strong>users can't overcome.  The 
threat</strong></del></span>
 <span class="inserted"><ins><em>control on behalf</em></ins></span> of <span 
class="removed"><del><strong>DRM is why we
-have established</strong></del></span> the <span 
class="removed"><del><strong>&lt;a href="http://DefectiveByDesign.org"&gt;
-Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI when asked: it
-already &lt;a href="/proprietary/malware-microsoft.html"&gt;shows
-the NSA security bugs in Windows&lt;/a&gt; to exploit.&lt;/p&gt;
+have established</strong></del></span> the <span class="inserted"><ins><em>FBI 
when asked: it
+already</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://DefectiveByDesign.org"&gt;
+Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;shows
+the NSA security bugs in Windows&lt;/a&gt; to 
exploit.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;
-Secure boot can be implemented in a way that permits the user to
+<span class="removed"><del><strong>When</strong></del></span>
+<span class="inserted"><ins><em>Secure boot can be implemented in a way that 
permits the user to
 specify the signature key and decide what software to sign.  In
 practice, PCs designed for Windows 10 carry only Microsoft's key, and
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this &lt;em&gt;restricted
-boot&lt;/em&gt;.&lt;/p&gt;</em></ins></span>
+boot&lt;/em&gt;.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;
 &lt;p&gt;
-<span class="removed"><del><strong>When</strong></del></span>
-<span class="inserted"><ins><em>In 1997, when</em></ins></span> this story was 
first <span class="removed"><del><strong>written,</strong></del></span> <span 
class="inserted"><ins><em>published,</em></ins></span> the SPA was
+In 1997, when</em></ins></span> this story was first <span 
class="removed"><del><strong>written,</strong></del></span> <span 
class="inserted"><ins><em>published,</em></ins></span> the SPA was
 threatening small Internet service providers, demanding they permit
 the SPA to monitor all users.  Most ISPs surrendered when
 threatened, because they <span 
class="removed"><del><strong>cannot</strong></del></span> <span 
class="inserted"><ins><em>could not</em></ins></span> afford to fight back in 
court.  One
@@ -359,8 +435,13 @@
 reminiscent of the erstwhile Soviet Union, it invites people to inform
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;</em></ins></span>
+software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="reduced-width"&gt;</em></ins></span>
 &lt;p&gt;
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -382,12 +463,15 @@
 &lt;p&gt;
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 &lt;/li&gt;
 &lt;/ul&gt;
-<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="BadNews"&gt;Bad News&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The battle for the right to read is <span class="removed"><del><strong>already 
in progress,</strong></del></span> <span class="inserted"><ins><em>going 
against us so far.</em></ins></span>
 The enemy is organized, <span 
class="removed"><del><strong>while</strong></del></span> <span 
class="inserted"><ins><em>and</em></ins></span> we are <span 
class="removed"><del><strong>not, so it is going against us.
@@ -420,14 +504,14 @@
 &lt;li&gt;&lt;p&gt;It has DRM, which is intended to block users from
 sharing copies.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;It has a back door with which Amazon</em></ins></span> can
+&lt;li&gt;&lt;p class="inline-block"&gt;It has a back door with which 
Amazon</em></ins></span> can
      <span class="removed"><del><strong>revoke at will.&lt;/li&gt;
 &lt;li&gt;&lt;a 
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151"&gt;Electronic
      Publishing:&lt;/a&gt; An article about distribution</strong></del></span> 
<span class="inserted"><ins><em>remotely erase any book.
 In 2009, it erased thousands</em></ins></span> of <span 
class="removed"><del><strong>books in
      electronic form,</strong></del></span> <span 
class="inserted"><ins><em>copies of 1984, by George Orwell.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;In case all that isn't Orwellian enough, there is a 
universal
+&lt;li&gt;&lt;p class="inline-block"&gt;In case all that isn't Orwellian 
enough, there is a universal
 back door with which Amazon can remotely change the 
software,</em></ins></span> and <span class="removed"><del><strong>copyright 
issues affecting</strong></del></span>
 <span class="inserted"><ins><em>introduce any other form of 
nastiness.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -454,6 +538,7 @@
 our work more generally.  There is also a &lt;a href="/help/help.html"&gt;list 
of ways
 to participate in</em></ins></span> our <span 
class="removed"><del><strong>work.</strong></del></span> <span 
class="inserted"><ins><em>work&lt;/a&gt;.</em></ins></span>
 &lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="References"&gt;References&lt;/h3&gt;
 
@@ -479,23 +564,32 @@
        reverse the overextension of copyright and patent powers.&lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;hr /&gt;
+<span class="inserted"><ins><em>&lt;h4&gt;Other Texts to Read&lt;/h4&gt;
+
+&lt;ul&gt;
+       &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
+       GNU Project&lt;/a&gt;&lt;/li&gt;
+       &lt;li&gt;&lt;a 
href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html";
+               id="copy-protection"&gt;Copy Protection: Just Say No&lt;/a&gt;,
+               published in Computer World.&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;</em></ins></span>
+
+&lt;hr <span class="inserted"><ins><em>class="thin"</em></ins></span> /&gt;
 &lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
 in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
 Software, Free Society: The Selected Essays of Richard
 M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;
 
-&lt;h5&gt;Other Texts to Read&lt;/h5&gt;
+<span class="removed"><del><strong>&lt;h5&gt;Other Texts to Read&lt;/h5&gt;
 
 &lt;ul&gt;
        &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
        GNU Project&lt;/a&gt;&lt;/li&gt;
-       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No";
-               id="COPYPROCTECTION"&gt;Copy</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html";
-               id="copy-protection"&gt;Copy</em></ins></span> Protection: Just 
Say No&lt;/a&gt;,
-               <span 
class="removed"><del><strong>Published</strong></del></span>
-               <span class="inserted"><ins><em>published</em></ins></span> in 
Computer World.&lt;/li&gt;
-&lt;/ul&gt;
+       &lt;li&gt;&lt;a 
href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No";
+               id="COPYPROCTECTION"&gt;Copy Protection: Just Say No&lt;/a&gt;,
+               Published in Computer World.&lt;/li&gt;
+&lt;/ul&gt;</strong></del></span>
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
@@ -554,7 +648,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/right-to-read.pl.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.pl.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/right-to-read.pl.po      18 Oct 2016 16:29:50 -0000      1.48
+++ po/right-to-read.pl.po      6 Nov 2016 21:28:15 -0000       1.49
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-02-07 20:31-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -49,7 +49,7 @@
 "<em>Ten artykuł pojawił się w&nbsp;lutym 1997 
w&nbsp;<strong>Communications "
 "of the ACM</strong> (Volume 40, Number 2).</em>"
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -58,7 +58,7 @@
 "na&nbsp;temat źródeł Księżycowej Rewolucji, opublikowanego w&nbsp;Luna 
City "
 "w&nbsp;roku 2096."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -70,7 +70,7 @@
 "a&nbsp;bez pożyczenia innego nie zaliczyłaby projektu kończącego semestr. 
"
 "Nie odważyła się o to prosić nikogo, oprócz Dana."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -86,7 +86,7 @@
 "uczono go, jak wszystkich, że&nbsp;dzielenie się książkami jest czymś "
 "paskudnym i&nbsp;złym, czymś, co robią tylko piraci."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -108,7 +108,7 @@
 "wszystkim się dowie. On zaś, jako właściciel komputera, zostanie 
najsurowiej "
 "ukarany&nbsp;&ndash; za&nbsp;to, że&nbsp;nie usiłował zapobiec 
przestępstwu."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -132,7 +132,7 @@
 "miał nadzieję, że&nbsp;jego własne prace, jeśli będą wystarczająco 
często "
 "cytowane, przyniosą mu tyle, że&nbsp;wystarczy na&nbsp;spłatę tego 
kredytu)."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -150,7 +150,7 @@
 "2047 biblioteki oferujące publiczny darmowy dostęp do&nbsp;literatury "
 "naukowej były już tylko mglistym wspomnieniem."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -170,7 +170,7 @@
 "W&nbsp;2047 Frank trafił do&nbsp;więzienia, nie za&nbsp;pirackie czytanie, "
 "ale&nbsp;za posiadanie debuggera."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -186,7 +186,7 @@
 "sąd orzekł, że&nbsp;praktycznie stało się to ich podstawowym 
zastosowaniem. "
 "Co znaczyło, że&nbsp;były nielegalne; twórcom debuggerów groziło 
więzienie."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -200,7 +200,7 @@
 "za&nbsp;specjalnym firewallem i&nbsp;można było z&nbsp;niego korzystać 
tylko "
 "podczas ćwiczeń."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 # | It was also possible to bypass the copyright monitors by installing a
 # | modified system kernel.  Dan would eventually find out about the free
 # | kernels, even entire free operating systems, that had existed around the
@@ -237,7 +237,7 @@
 "komputera. A&nbsp;ani <abbr title=\"Federal Bureau of Investigation\">FBI</"
 "abbr>, ani&nbsp;Pomoc Techniczna Microsoftu by go wam nie podały."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -250,7 +250,7 @@
 "to jego wybrała, by poprosić o pomoc, mógł znaczyć, że&nbsp;ona 
również go "
 "kocha."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -265,7 +265,7 @@
 "przestępstwo, ale&nbsp;dla SPA niewykrywalne automatycznie. Mogliby się o "
 "tym dowiedzieć tylko, gdyby Lissa na&nbsp;niego doniosła."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -287,7 +287,7 @@
 "oznacza, iż robicie jakieś inne zakazane rzeczy, oni zaś&nbsp;nie muszą "
 "wiedzieć, jakie to rzeczy."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -297,7 +297,7 @@
 "bezpośrednio. Zamiast tego blokowano im dostęp do&nbsp;szkolnych systemów "
 "komputerowych, tak że&nbsp;było pewne, że&nbsp;obleją semestr."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -311,7 +311,7 @@
 "do&nbsp;problemu dyscypliny studentów&nbsp;&ndash; karano działania, które 
"
 "były szkodliwe, nie te, które tylko wzbudzały podejrzenia."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -332,7 +332,7 @@
 "w&nbsp;2062 zaczęło się Powstanie Tycho, powszechne prawo do&nbsp;czytania 
"
 "wkrótce stało się jednym z&nbsp;jego głównych celów."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 # | <a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list
 # | about the dangers of [-eBooks</a>.-] {+e-books</a>.+}
 #, fuzzy
@@ -346,11 +346,11 @@
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Zapiszcie się na&nbsp;"
 "naszą listę mailową o zagrożeniach ebookami</a>."
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr "Uwagi autora"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 # | This story is supposedly a historical article that will be written in the
 # | future by someone else, describing Dan Halbert's youth under a repressive
 # | society shaped by the [-enemies-] {+unjust forces+} that use
@@ -382,7 +382,7 @@
 "brzmiało jeszcze bardziej represyjnie. Zobacz <a 
href=\"/philosophy/words-to-"
 "avoid.html#Piracy\">&bdquo;piractwo&rdquo;</a>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -391,13 +391,13 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The following note has been updated several times since the first "
 "publication of the story."
@@ -405,7 +405,7 @@
 "Ta uwaga była kilka razy aktualizowana od&nbsp;pierwszego ukazania się "
 "opowiadania."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 # | The {+battle for the+} right to read is [-a battle-] {+already+} being
 # | [-fought today.-] {+fought.+}  Although it may take 50 years for our
 # | [-present way of life-] {+past freedoms+} to fade into obscurity, most of
@@ -458,7 +458,7 @@
 "samo posiadanie kopii DeCSS, wolnego programu do&nbsp;rozszyfrowywania "
 "filmów na&nbsp;DVD, jest przestępstwem."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -469,7 +469,7 @@
 "these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -480,14 +480,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -496,7 +496,7 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 # | [-Vista also gives-]{+With Windows Vista,+} Microsoft [-additional powers;
 # | for instance,-] {+admitted it had built in a back door:+} Microsoft can
 # | {+use it to+} forcibly install [-upgrades, and it-] {+software
@@ -534,7 +534,7 @@
 "dla którego stworzyliśmy kampanię <a 
href=\"http://DefectiveByDesign.org\";> "
 "Defective by Design</a>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 # | One of the ideas in the story was not proposed in reality until 2002. 
 # | This is the idea that the [-<abbr>FBI</abbr>-] {+FBI+} and Microsoft will
 # | keep the root passwords for your personal computers, and not let you have
@@ -553,14 +553,14 @@
 "administracyjnymi do&nbsp;komputerów osobistych i&nbsp;nie pozwalały Wam go 
"
 "mieć, nie był wysuwany aż do&nbsp;roku 2002."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
 "into use, it is called &ldquo;secure boot&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 # | What Microsoft keeps is not exactly a password in the traditional sense;
 # | no person ever types it on a terminal.  Rather, it is a signature and
 # | encryption key that corresponds to a second key stored in your computer. 
@@ -595,7 +595,7 @@
 "i&nbsp;innym firmom współpracującym z&nbsp;Microsoftem nieograniczoną "
 "kontrolę nad&nbsp;tym co użytkownik może robić ze swoim komputerem."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -604,7 +604,7 @@
 "control.  We call this <em>restricted boot</em>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 # | [-When-]{+In 1997, when+} this story was first [-written,-] {+published,+}
 # | the SPA was threatening small Internet service providers, demanding they
 # | permit the SPA to monitor all users.  Most ISPs surrendered when
@@ -638,7 +638,7 @@
 "zaniechała sprawy, ale&nbsp;uzyskała DMCA, która dała im władzę, 
po&nbsp;"
 "jaką sięgali."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 # | The SPA, which actually stands for Software Publishers Association, has
 # | been replaced in its police-like role by the Business Software Alliance. 
 # | The BSA is not, today, an official police force; unofficially, it acts
@@ -674,7 +674,7 @@
 "BSA przekazywała zawoalowane groźby, że&nbsp;osoby dzielące się "
 "oprogramowaniem będą gwałcone w&nbsp;więzieniach."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -684,7 +684,7 @@
 "przykład, komputer jednego z&nbsp;uniwersytetów z&nbsp;okolic Chicago "
 "podczas logowania się użytkownika wyświetlał taki komunikat:"
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -709,7 +709,7 @@
 "regulaminu Uniwersytetu, personel może przekazać taki dowód władzom "
 "Uniwersytetu i/lub funkcjonariuszom porządku prawnego."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -718,11 +718,11 @@
 "wszystkich, aby&nbsp;z góry zgodzili się oddać zapisane w&nbsp;niej swoje "
 "prawa."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "Złe wieści"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 # | The battle for the right to read is [-already in progress,-] {+going
 # | against us so far.+}  The enemy is organized, [-while-] {+and+} we are
 # | [-not, so it is going against us.  Here are articles about bad things that
@@ -742,7 +742,7 @@
 "artykuły o złych rzeczach, które się wydarzyły od&nbsp;czasu napisania 
tego "
 "artykułu."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -753,31 +753,31 @@
 "for rejecting the product completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -789,7 +789,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 # | If we want to stop the bad news and create some good news, we need to
 # | organize and fight.  [-The-]  {+Subscribe to the+} FSF's <a
 # | href=\"http://defectivebydesign.org\";> Defective by Design</a> campaign
@@ -819,11 +819,11 @@
 "się na&nbsp;listę mailową aby&nbsp;pomóc. <a href=\"http://www.fsf.org/";
 "associate\">Przyłączcie się do&nbsp;FSF</a> aby&nbsp;pomóc naszym 
staraniom."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Bibliografia"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -838,7 +838,7 @@
 "Krajowa Infrastruktura Informacyjna. Raport Grupy Roboczej do&nbsp;spraw "
 "Praw Własności Intelektualnej)."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -848,7 +848,7 @@
 "explanation of the White Paper: The Copyright Grab</a> (Biała Księga "
 "objaśniona. Grabież praw autorskich), Pamela Samuelson, Wired, styczeń 
1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -856,7 +856,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a> "
 "(Wyprzedane), James Boyle, New York Times, 31 marca 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -867,7 +867,7 @@
 "Private Data</a> (Dane publiczne czy&nbsp;dane prywatne), Washington Post, 4 "
 "listopada 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 # | <a [-href=\"http://www.public-domain.org/\";>Union-]
 # | 
{+href=\"https://web.archive.org/web/20151113122141/http://public-domain.org/\";>Union+}
 # | for the Public Domain</a>&mdash;an organization which aims to resist and
@@ -887,26 +887,16 @@
 "przerostu potęgi praw autorskich i&nbsp;patentów i&nbsp;powrót do&nbsp;"
 "poprzedniego stanu."
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Ten esej jest opublikowany w&nbsp;<a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Inne teksty"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">Filozofia Projektu GNU</a>"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 # | <a
 # | 
[-href=\"http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No\";
 # | id=\"COPYPROCTECTION\">Copy-]
@@ -928,6 +918,16 @@
 "Say No</a> (Zabezpieczenia przeciw kopiowaniu&nbsp;&ndash; powiedzcie nie), "
 "opublikowane w&nbsp;piśmie Computer World."
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Ten esej jest opublikowany w&nbsp;<a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/right-to-read.pot
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- po/right-to-read.pot        18 Oct 2016 16:29:50 -0000      1.49
+++ po/right-to-read.pot        6 Nov 2016 21:28:15 -0000       1.50
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -36,13 +36,13 @@
 "of the ACM</cite> (Volume 40, Number 2).</em>"
 msgstr ""
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -50,7 +50,7 @@
 "dared ask, except Dan."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -60,7 +60,7 @@
 "that only pirates would do."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -72,7 +72,7 @@
 "punishment&mdash;for not taking pains to prevent the crime."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -85,7 +85,7 @@
 "bring in enough to repay this loan.)"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -95,7 +95,7 @@
 "offering free public access to scholarly literature were a dim memory."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -106,7 +106,7 @@
 "was in prison, not for pirate reading, but for possessing a debugger."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -116,7 +116,7 @@
 "developers were sent to prison."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -124,7 +124,7 @@
 "a special firewall so that it could be used only for class exercises."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It was also possible to bypass the copyright monitors by installing a "
 "modified system kernel.  Dan would eventually find out about the free "
@@ -135,7 +135,7 @@
 "would tell you that."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -143,7 +143,7 @@
 "that could mean she loved him too."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -152,7 +152,7 @@
 "only find out if Lissa reported him."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -164,14 +164,14 @@
 "and they did not need to know what it was."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
 "all their classes."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -180,7 +180,7 @@
 "merely raised suspicion."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -192,17 +192,17 @@
 "became one of its central aims."
 msgstr ""
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list "
 "about the dangers of e-books</a>."
 msgstr ""
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr ""
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -212,7 +212,7 @@
 "href=\"/philosophy/words-to-avoid.html#Piracy\">&ldquo;Piracy&rdquo;</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -221,19 +221,19 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The following note has been updated several times since the first "
 "publication of the story."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The battle for the right to read is already being fought.  Although it may "
 "take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -246,7 +246,7 @@
 "in a form not quite as strong."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through "
 "so-called &ldquo;free trade&rdquo; treaties.  <a "
@@ -257,7 +257,7 @@
 "unjust policies that these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -268,14 +268,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a "
@@ -284,7 +284,7 @@
 "and reject nonfree programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "With Windows Vista, Microsoft admitted it had built in a back door: "
 "Microsoft can use it to forcibly install software &ldquo;upgrades,&rdquo; "
@@ -294,21 +294,21 @@
 "overcome.  Of course, Windows 10 is no better"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "One of the ideas in the story was not proposed in reality until 2002.  This "
 "is the idea that the FBI and Microsoft will keep the root passwords for your "
 "personal computers, and not let you have them."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as "
 "&ldquo;trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as "
 "ultimately put into use, it is called &ldquo;secure boot&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "What Microsoft keeps is not exactly a password in the traditional sense; no "
 "person ever types it on a terminal.  Rather, it is a signature and "
@@ -320,7 +320,7 @@
 "NSA security bugs in Windows</a> to exploit."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -329,7 +329,7 @@
 "control.  We call this <em>restricted boot</em>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "In 1997, when this story was first published, the SPA was threatening small "
 "Internet service providers, demanding they permit the SPA to monitor all "
@@ -339,7 +339,7 @@
 "the suit, but the DMCA gave it the power it sought."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The SPA, which actually stands for Software Publishers Association, has been "
 "replaced in its police-like role by the Business Software Alliance.  The BSA "
@@ -350,14 +350,14 @@
 "would be raped in prison."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
 "upon login:"
 msgstr ""
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -371,23 +371,23 @@
 "authorities and/or law enforcement officials."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The battle for the right to read is going against us so far.  The enemy is "
 "organized, and we are not."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a "
 "href=\"/philosophy/the-danger-of-ebooks.html\"> abolish readers' traditional "
@@ -400,31 +400,31 @@
 "completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -436,7 +436,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we want to stop the bad news and create some good news, we need to "
 "organize and fight.  Subscribe to the FSF's <a "
@@ -446,11 +446,11 @@
 "href=\"/help/help.html\">list of ways to participate in our work</a>."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr ""
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a "
@@ -459,27 +459,27 @@
 "[sic] Rights (1995)."
 msgstr ""
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
 "Wired, Jan. 1996"
 msgstr ""
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
 msgstr ""
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a "
 
"href=\"http://web.archive.org/web/20130508120533/http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html\";>Public
 "
 "Data or Private Data</a>, Washington Post, 4 Nov 1996."
 msgstr ""
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a "
 
"href=\"https://web.archive.org/web/20151113122141/http://public-domain.org/\";>Union
 "
@@ -487,23 +487,15 @@
 "reverse the overextension of copyright and patent powers."
 msgstr ""
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a "
-"href=\"http://shop.fsf.org/product/free-software-free-society/\";><cite>Free "
-"Software, Free Society: The Selected Essays of Richard "
-"M. Stallman</cite></a>."
-msgstr ""
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr ""
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU 
Project</a>"
 msgstr ""
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a "
 
"href=\"http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html\";
 "
@@ -511,6 +503,14 @@
 "Computer World."
 msgstr ""
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a "
+"href=\"http://shop.fsf.org/product/free-software-free-society/\";><cite>Free "
+"Software, Free Society: The Selected Essays of Richard "
+"M. Stallman</cite></a>."
+msgstr ""
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/right-to-read.pt-br-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.pt-br-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/right-to-read.pt-br-diff.html    18 Oct 2016 16:29:50 -0000      1.24
+++ po/right-to-read.pt-br-diff.html    6 Nov 2016 21:28:15 -0000       1.25
@@ -15,34 +15,71 @@
 &lt;title&gt;The Right to Read
 - GNU Project - Free Software Foundation&lt;/title&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns &gt; p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --&gt;&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/philosophy/po/right-to-read.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
-&lt;h2&gt;The Right to Read&lt;/h2&gt;
+<span class="removed"><del><strong>&lt;h2&gt;The</strong></del></span>
+<span class="inserted"><ins><em>&lt;h2 class="center"&gt;The</em></ins></span> 
Right to Read&lt;/h2&gt;
 
-&lt;p&gt;
+<span class="removed"><del><strong>&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p class="byline 
center"&gt;</em></ins></span>
 by &lt;a href="http://www.stallman.org/"&gt;&lt;strong&gt;Richard 
Stallman&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;blockquote class="note"&gt;
 &lt;p&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of eBooks&lt;/a&gt;.&lt;/p&gt;
-&lt;/blockquote&gt;</strong></del></span>
+&lt;/blockquote&gt;
 
-&lt;p&gt;
+&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;p class="center"&gt;</em></ins></span>
 &lt;em&gt;This article appeared in the February 1997 issue
 of <span 
class="removed"><del><strong>&lt;strong&gt;Communications</strong></del></span> 
<span class="inserted"><ins><em>&lt;cite&gt;Communications</em></ins></span> of 
the <span class="removed"><del><strong>ACM&lt;/strong&gt;</strong></del></span> 
<span class="inserted"><ins><em>ACM&lt;/cite&gt;</em></ins></span> (Volume 40, 
Number
 2).&lt;/em&gt;&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;hr /&gt;</em></ins></span>
 
-&lt;blockquote&gt;&lt;p&gt;
+<span 
class="removed"><del><strong>&lt;blockquote&gt;&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;hr class="thin" /&gt;
+
+&lt;div class="article"&gt;
+&lt;blockquote class="info center"&gt;&lt;p&gt;</em></ins></span>
             From &lt;cite&gt;The Road To Tycho&lt;/cite&gt;, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 &lt;/p&gt;&lt;/blockquote&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -78,7 +115,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -122,7 +162,10 @@
 knowing your computer's root password.  And neither
 the <span class="removed"><del><strong>&lt;abbr title="Federal Bureau of 
Investigation"&gt;FBI&lt;/abbr&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI</em></ins></span> nor
 Microsoft Support would tell you that.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -159,7 +202,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -174,8 +220,9 @@
 <span class="removed"><del><strong>&lt;h3 id="AuthorsNote"&gt;Author's 
Note&lt;/h3&gt;
 
 &lt;p&gt;[This</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;div class="announcement"&gt;
+&lt;div class="announcement"&gt;
 &lt;blockquote&gt;
 &lt;p&gt;&lt;a href="http://defectivebydesign.org/ebooks.html"&gt;Join our 
mailing list about the dangers of e-books&lt;/a&gt;.&lt;/p&gt;
 &lt;/blockquote&gt;
@@ -184,35 +231,46 @@
 &lt;div id="AuthorsNote"&gt;
 &lt;h3&gt;Author's Notes&lt;/h3&gt;
 
-&lt;ul&gt;
-&lt;li&gt;This story is supposedly a historical article that will be written in
+&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p&gt;This story is supposedly a historical article that will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it forwards into something more visibly
 oppressive. See &lt;a
 
href="/philosophy/words-to-avoid.html#Piracy"&gt;&ldquo;Piracy&rdquo;&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
+&lt;div class="reduced-width"&gt;
 &lt;p&gt;Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the &lt;a href="http://DefectiveByDesign.org"&gt;Defective by
 Design&lt;/a&gt; campaign.  We ask for your support.&lt;/p&gt;
-&lt;/li&gt;
 
-&lt;li&gt;
 &lt;p&gt;The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 &lt;/li&gt;
+&lt;/ul&gt;
 
-&lt;li&gt;
+&lt;blockquote class="info center"&gt;
 &lt;p&gt;The following</em></ins></span> note has been updated several times 
since the first
-publication of the <span 
class="removed"><del><strong>story.]&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>story.&lt;/p&gt;</em></ins></span>
+publication of the <span 
class="removed"><del><strong>story.]&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>story.&lt;/p&gt;
+&lt;/blockquote&gt;
 
+&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The <span class="inserted"><ins><em>battle for the</em></ins></span> right to 
read is <span class="removed"><del><strong>a battle</strong></del></span> <span 
class="inserted"><ins><em>already</em></ins></span> being <span 
class="removed"><del><strong>fought today.</strong></del></span> <span 
class="inserted"><ins><em>fought.</em></ins></span>  Although it
 may take 50 years for our <span class="removed"><del><strong>present way of 
life</strong></del></span> <span class="inserted"><ins><em>past 
freedoms</em></ins></span> to fade into obscurity, most
@@ -226,42 +284,41 @@
 distribution of programs that can break DRM a crime.</em></ins></span>  The 
European
 Union imposed similar restrictions in a 2001 copyright <span 
class="removed"><del><strong>directive.  In France, under the DADVSI law
 adopted</strong></del></span> <span 
class="inserted"><ins><em>directive,</em></ins></span> in <span 
class="removed"><del><strong>2006, mere possession of a copy of DeCSS, the free 
program
-to decrypt video on a DVD, is a crime.&lt;/p&gt;
+to decrypt video on a DVD, is</strong></del></span> a <span 
class="removed"><del><strong>crime.&lt;/p&gt;</strong></del></span>
+<span class="inserted"><ins><em>form not quite as 
strong.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;
-In 2001, Disney-funded Senator Hollings proposed a bill called the
-SSSCA that would require every new computer to have mandatory
-copy-restriction facilities that the user cannot bypass.  Following
-the Clipper chip and similar US government key-escrow proposals, this
-shows</strong></del></span> a <span class="removed"><del><strong>long-term 
trend: computer systems are increasingly set up to
-give absentees with clout control over the people actually using the
+<span class="removed"><del><strong>In 2001, Disney-funded Senator Hollings 
proposed a bill called the
+SSSCA that would require every new computer</strong></del></span>
+<span class="inserted"><ins><em>The US campaigns</em></ins></span> to <span 
class="removed"><del><strong>have mandatory
+copy-restriction facilities that</strong></del></span> <span 
class="inserted"><ins><em>impose such rules on</em></ins></span> the <span 
class="removed"><del><strong>user cannot bypass.  
Following</strong></del></span> <span class="inserted"><ins><em>rest 
of</em></ins></span> the <span class="removed"><del><strong>Clipper chip and 
similar US government key-escrow proposals, this
+shows</strong></del></span> <span class="inserted"><ins><em>world through
+so-called &ldquo;free trade&rdquo; treaties.
+&lt;a href="https://stallman.org/business-supremacy-treaties.html"&gt;
+Business-supremacy treaties&lt;/a&gt; is</em></ins></span> a <span 
class="removed"><del><strong>long-term trend: computer 
systems</strong></del></span> <span class="inserted"><ins><em>more fitting term 
for them, since
+they</em></ins></span> are <span class="removed"><del><strong>increasingly set 
up</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to give <span 
class="removed"><del><strong>absentees with clout control</strong></del></span> 
<span class="inserted"><ins><em>business dominion</em></ins></span> over <span 
class="removed"><del><strong>the people actually using the
 computer system.  The SSSCA was later renamed to the unpronounceable
-CBDTPA, which was glossed</strong></del></span>
-<span class="inserted"><ins><em>form not quite</em></ins></span> as <span 
class="removed"><del><strong>the &ldquo;Consume But Don't Try
+CBDTPA, which was glossed as the &ldquo;Consume But Don't Try
 Programming Act&rdquo;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>strong.&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;
 
-&lt;p&gt;
-The <span class="removed"><del><strong>Republicans took control of the US 
senate shortly thereafter.
+&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>nominally 
democratic
+states.</em></ins></span>  The <span class="removed"><del><strong>Republicans 
took control</strong></del></span> <span class="inserted"><ins><em>DMCA's 
policy</em></ins></span> of <span class="removed"><del><strong>the US senate 
shortly thereafter.
 They are less tied to Hollywood than the Democrats, so they did not
-press these proposals.  Now that the Democrats are back in control,
+press these proposals.  Now</strong></del></span> <span 
class="inserted"><ins><em>criminalizing programs</em></ins></span> that <span 
class="removed"><del><strong>the Democrats are back in control,
 the danger is once again higher.&lt;/p&gt;
 
 &lt;p&gt;
-In 2001 the</strong></del></span> US <span class="removed"><del><strong>began 
attempting to use the proposed Free Trade Area of
-the Americas (FTAA) treaty</strong></del></span> <span 
class="inserted"><ins><em>campaigns</em></ins></span> to impose <span 
class="removed"><del><strong>the same</strong></del></span> <span 
class="inserted"><ins><em>such</em></ins></span> rules on <span 
class="removed"><del><strong>all the countries in</strong></del></span> the 
<span class="removed"><del><strong>Western Hemisphere.  The FTAA is 
one</strong></del></span> <span 
class="inserted"><ins><em>rest</em></ins></span> of the <span 
class="inserted"><ins><em>world through</em></ins></span>
-so-called <span class="removed"><del><strong>free
-trade treaties, which</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;free trade&rdquo; treaties.
-&lt;a href="https://stallman.org/business-supremacy-treaties.html"&gt;
-Business-supremacy treaties&lt;/a&gt; is a more fitting term for them, since
-they</em></ins></span> are <span 
class="removed"><del><strong>actually</strong></del></span> designed to give 
business
-<span class="removed"><del><strong>increased power</strong></del></span> <span 
class="inserted"><ins><em>dominion</em></ins></span> over <span 
class="inserted"><ins><em>nominally</em></ins></span> democratic <span 
class="removed"><del><strong>governments; imposing laws like the
-DMCA is typical of this spirit.</strong></del></span>
-<span class="inserted"><ins><em>states.</em></ins></span>  The <span 
class="removed"><del><strong>FTAA was effectively killed by
-Lula, President</strong></del></span> <span class="inserted"><ins><em>DMCA's 
policy</em></ins></span> of <span class="removed"><del><strong>Brazil, who 
rejected the DMCA requirement and
-others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>criminalizing programs that
-break DRM is one of many unjust policies that these treaties impose
-across a wide range of fields.&lt;/p&gt;</em></ins></span>
+In 2001 the US began attempting to use the proposed Free Trade Area of
+the Americas (FTAA) treaty to impose the same rules on all the countries in
+the Western Hemisphere.  The FTAA</strong></del></span>
+<span class="inserted"><ins><em>break DRM</em></ins></span> is one of <span 
class="removed"><del><strong>the so-called free
+trade treaties, which are actually designed to give business
+increased power over democratic governments; imposing laws like the
+DMCA is typical of this spirit.  The FTAA was effectively killed by
+Lula, President</strong></del></span> <span class="inserted"><ins><em>many 
unjust policies that these treaties impose
+across a wide range</em></ins></span> of <span 
class="removed"><del><strong>Brazil, who rejected the DMCA requirement and
+others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>fields.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;
 <span class="removed"><del><strong>Since then, the</strong></del></span>
@@ -270,34 +327,44 @@
 and <span class="removed"><del><strong>Mexico</strong></del></span> <span 
class="inserted"><ins><em>South Korea</em></ins></span> through bilateral <span 
class="removed"><del><strong>&ldquo;free trade&rdquo;</strong></del></span> 
agreements, and on countries such as
 Costa Rica through another treaty, CAFTA.  <span 
class="removed"><del><strong>Ecuador's President Correa refused to sign a
 &ldquo;free trade&rdquo; agreement</strong></del></span>  <span 
class="inserted"><ins><em>Obama has escalated the
-campaign with two new proposed treaties, the TPP and the TTIP.  The
-TPP would impose the DMCA, along</em></ins></span> with <span 
class="inserted"><ins><em>many other wrongs, on 12
-countries on</em></ins></span> the <span class="removed"><del><strong>US, but 
I've heard Ecuador
-had adopted something like</strong></del></span> <span 
class="inserted"><ins><em>Pacific Ocean.  The TTIP would impose similar
+campaign</em></ins></span> with <span class="inserted"><ins><em>two new 
proposed treaties,</em></ins></span> the <span class="removed"><del><strong>US, 
but I've heard Ecuador
+had adopted something like</strong></del></span> <span 
class="inserted"><ins><em>TPP and</em></ins></span> the <span 
class="removed"><del><strong>DMCA</strong></del></span> <span 
class="inserted"><ins><em>TTIP.  The
+TPP would impose the DMCA, along with many other wrongs, on 12
+countries on the Pacific Ocean.  The TTIP would impose similar
 strictures on Europe.  All these treaties must be defeated, or
 abolished.&lt;/p&gt;
 
 &lt;p&gt;
-Even</em></ins></span> the <span 
class="removed"><del><strong>DMCA</strong></del></span> <span 
class="inserted"><ins><em>World Wide Web Consortium has fallen under the shadow 
of the
+Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
-&lt;p&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p class="emph-box"&gt;
 Nonfree software tends to have &lt;a href="/proprietary/"&gt;abusive
 features of many kinds&lt;/a&gt;, which lead to the conclusion that
 &lt;a href="/philosophy/free-software-even-more-important.html"&gt;you can
 never trust a nonfree program&lt;/a&gt;.  We must insist on free (libre)
 software only, and reject nonfree programs.&lt;/p&gt;
 
-&lt;p&gt;
+&lt;p class="inline-block"&gt;
 With Windows Vista, Microsoft admitted it had built</em></ins></span> in <span 
class="removed"><del><strong>2003.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
 downgrades.  It can also order all machines running Vista to refuse to
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
-10 is no better&lt;/p&gt;</em></ins></span>
+10 is no better&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the <span 
class="removed"><del><strong>&lt;abbr&gt;FBI&lt;/abbr&gt;</strong></del></span> 
<span class="inserted"><ins><em>FBI</em></ins></span> and Microsoft will keep 
the
@@ -330,22 +397,27 @@
 Vista's many restrictions</strong></del></span> is <span 
class="inserted"><ins><em>likely</em></ins></span> to <span 
class="removed"><del><strong>impose DRM (Digital Restrictions
 Management)</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> that <span 
class="removed"><del><strong>users can't overcome.  The 
threat</strong></del></span>
 <span class="inserted"><ins><em>control on behalf</em></ins></span> of <span 
class="removed"><del><strong>DRM is why we
-have established</strong></del></span> the <span 
class="removed"><del><strong>&lt;a href="http://DefectiveByDesign.org"&gt;
-Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>FBI when asked: it
-already &lt;a href="/proprietary/malware-microsoft.html"&gt;shows
-the NSA security bugs in Windows&lt;/a&gt; to exploit.&lt;/p&gt;
+have established</strong></del></span> the <span class="inserted"><ins><em>FBI 
when asked: it
+already</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://DefectiveByDesign.org"&gt;
+Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;shows
+the NSA security bugs in Windows&lt;/a&gt; to 
exploit.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;
-Secure boot can be implemented in a way that permits the user to
+<span class="removed"><del><strong>When</strong></del></span>
+<span class="inserted"><ins><em>Secure boot can be implemented in a way that 
permits the user to
 specify the signature key and decide what software to sign.  In
 practice, PCs designed for Windows 10 carry only Microsoft's key, and
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this &lt;em&gt;restricted
-boot&lt;/em&gt;.&lt;/p&gt;</em></ins></span>
+boot&lt;/em&gt;.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;
 &lt;p&gt;
-<span class="removed"><del><strong>When</strong></del></span>
-<span class="inserted"><ins><em>In 1997, when</em></ins></span> this story was 
first <span class="removed"><del><strong>written,</strong></del></span> <span 
class="inserted"><ins><em>published,</em></ins></span> the SPA was
+In 1997, when</em></ins></span> this story was first <span 
class="removed"><del><strong>written,</strong></del></span> <span 
class="inserted"><ins><em>published,</em></ins></span> the SPA was
 threatening small Internet service providers, demanding they permit
 the SPA to monitor all users.  Most ISPs surrendered when
 threatened, because they <span 
class="removed"><del><strong>cannot</strong></del></span> <span 
class="inserted"><ins><em>could not</em></ins></span> afford to fight back in 
court.  One
@@ -361,8 +433,13 @@
 reminiscent of the erstwhile Soviet Union, it invites people to inform
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
-software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;</em></ins></span>
+software would be <span 
class="removed"><del><strong>raped.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>raped in prison.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="reduced-width"&gt;</em></ins></span>
 &lt;p&gt;
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -384,12 +461,15 @@
 &lt;p&gt;
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.&lt;/p&gt;
-<span class="inserted"><ins><em>&lt;/li&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;/li&gt;
 &lt;/ul&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 &lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="BadNews"&gt;Bad News&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The battle for the right to read is <span class="removed"><del><strong>already 
in progress,</strong></del></span> <span class="inserted"><ins><em>going 
against us so far.</em></ins></span>
 The enemy is organized, <span 
class="removed"><del><strong>while</strong></del></span> <span 
class="inserted"><ins><em>and</em></ins></span> we are <span 
class="removed"><del><strong>not, so it is going against us.
@@ -422,14 +502,14 @@
 &lt;li&gt;&lt;p&gt;It has DRM, which is intended to block users from
 sharing copies.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;It has a back door with which Amazon</em></ins></span> can
+&lt;li&gt;&lt;p class="inline-block"&gt;It has a back door with which 
Amazon</em></ins></span> can
      <span class="removed"><del><strong>revoke at will.&lt;/li&gt;
 &lt;li&gt;&lt;a 
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151"&gt;Electronic
      Publishing:&lt;/a&gt; An article about distribution</strong></del></span> 
<span class="inserted"><ins><em>remotely erase any book.
 In 2009, it erased thousands</em></ins></span> of <span 
class="removed"><del><strong>books in
      electronic form,</strong></del></span> <span 
class="inserted"><ins><em>copies of 1984, by George Orwell.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;In case all that isn't Orwellian enough, there is a 
universal
+&lt;li&gt;&lt;p class="inline-block"&gt;In case all that isn't Orwellian 
enough, there is a universal
 back door with which Amazon can remotely change the 
software,</em></ins></span> and <span class="removed"><del><strong>copyright 
issues affecting</strong></del></span>
 <span class="inserted"><ins><em>introduce any other form of 
nastiness.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -456,6 +536,7 @@
 our work more generally.  There is also a &lt;a href="/help/help.html"&gt;list 
of ways
 to participate in</em></ins></span> our <span 
class="removed"><del><strong>work.</strong></del></span> <span 
class="inserted"><ins><em>work&lt;/a&gt;.</em></ins></span>
 &lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="References"&gt;References&lt;/h3&gt;
 
@@ -481,23 +562,32 @@
        reverse the overextension of copyright and patent powers.&lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;hr /&gt;
+<span class="inserted"><ins><em>&lt;h4&gt;Other Texts to Read&lt;/h4&gt;
+
+&lt;ul&gt;
+       &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
+       GNU Project&lt;/a&gt;&lt;/li&gt;
+       &lt;li&gt;&lt;a 
href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html";
+               id="copy-protection"&gt;Copy Protection: Just Say No&lt;/a&gt;,
+               published in Computer World.&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;</em></ins></span>
+
+&lt;hr <span class="inserted"><ins><em>class="thin"</em></ins></span> /&gt;
 &lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
 in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
 Software, Free Society: The Selected Essays of Richard
 M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;
 
-&lt;h5&gt;Other Texts to Read&lt;/h5&gt;
+<span class="removed"><del><strong>&lt;h5&gt;Other Texts to Read&lt;/h5&gt;
 
 &lt;ul&gt;
        &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
        GNU Project&lt;/a&gt;&lt;/li&gt;
-       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No";
-               id="COPYPROCTECTION"&gt;Copy</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html";
-               id="copy-protection"&gt;Copy</em></ins></span> Protection: Just 
Say No&lt;/a&gt;,
-               <span 
class="removed"><del><strong>Published</strong></del></span>
-               <span class="inserted"><ins><em>published</em></ins></span> in 
Computer World.&lt;/li&gt;
-&lt;/ul&gt;
+       &lt;li&gt;&lt;a 
href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No";
+               id="COPYPROCTECTION"&gt;Copy Protection: Just Say No&lt;/a&gt;,
+               Published in Computer World.&lt;/li&gt;
+&lt;/ul&gt;</strong></del></span>
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
@@ -557,7 +647,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/right-to-read.pt-br.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.pt-br.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- po/right-to-read.pt-br.po   18 Oct 2016 16:29:50 -0000      1.28
+++ po/right-to-read.pt-br.po   6 Nov 2016 21:28:15 -0000       1.29
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2013-05-26 23:00-0300\n"
 "Last-Translator: Hudson Flávio Meneses Lacerda <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -47,7 +47,7 @@
 "<em>Este artigo foi publicado na edição de fevereiro de 1997 de "
 "<strong>Communications of the ACM</strong> (Volume 40, Number 2).</em>"
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -55,7 +55,7 @@
 "de \"The Road to Tycho\", uma coleção de artigos sobre os antecedentes da "
 "Revolução Lunar, publicado em Luna City, em 2096."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -68,7 +68,7 @@
 "projeto bimestral. Não havia ninguém a quem ela ousasse pedir isso, exceto "
 "Dan."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -84,7 +84,7 @@
 "primário que emprestar livros era algo terrível e errado &mdash; algo que 
só "
 "piratas fariam."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -105,7 +105,7 @@
 "saber. Ele, como dono do computador, receberia a mais dura punição, por 
não "
 "ter feito os sacrifícios necessários para evitar o crime."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -128,7 +128,7 @@
 "tinha esperanças de que seus próprios artigos de pesquisa, caso citados "
 "frequentemente, rendessem o suficiente para pagar seu financiamento)."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -145,7 +145,7 @@
 "institucionais, começaram a cobrar pelo acesso. Em 2047, bibliotecas com "
 "acesso público gratuito a artigos acadêmicos eram uma lembrança distante."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -163,7 +163,7 @@
 "(estudantes afundados em dívidas eram facilmente tentados a trair). Em 2047, 
"
 "Frank estava preso, não por leitura pirata, mas por possuir um depurador."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -181,7 +181,7 @@
 "ilegais. Os desenvolvedores de ferramentas de depuração foram mandados para 
"
 "a prisão."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -195,7 +195,7 @@
 "<cite>firewall</cite> especial, de forma que podia ser usado somente para os "
 "exercícios da aula."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "It was also possible to bypass the copyright monitors by installing a "
@@ -224,7 +224,7 @@
 "sem saber a senha do administrador do seu computador. E nem o FBI nem o "
 "Suporte da Microsoft lhe diriam qual ela é."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -236,7 +236,7 @@
 "falar com ela o deixava em êxtase. E já que ela o havia escolhido para 
ajudá-"
 "la, isso poderia significar que ela o amava também."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -250,7 +250,7 @@
 "ainda era um crime, mas a SPA não ficaria sabendo automaticamente sobre ele. 
"
 "Eles só saberiam se Lissa o entregasse."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -271,7 +271,7 @@
 "Eles assumiam que você estava fazendo alguma outra coisa que era proibida, e 
"
 "não precisavam saber o que era."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -281,7 +281,7 @@
 "Eles eram banidos do sistema de computadores da faculdade, e assim, "
 "inevitavelmente, acabariam reprovados em todas as disciplinas."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -295,7 +295,7 @@
 "diferente para a disciplina; eles puniam atividades que eram danosas, não "
 "aquelas que meramente levantavam suspeitas."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -316,7 +316,7 @@
 "o direito universal à leitura rapidamente se tornou um de seus objetivos "
 "centrais."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing "
@@ -328,13 +328,13 @@
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Junte-se à nossa lista "
 "de discussão sobre os perigos dos livros eletrônicos (eBooks)</a>."
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 #, fuzzy
 #| msgid "Author's Note"
 msgid "Author's Notes"
 msgstr "Nota do autor"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -344,7 +344,7 @@
 "philosophy/words-to-avoid.html#Piracy\">&ldquo;Piracy&rdquo;</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -353,13 +353,13 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "[This note has been updated several times since the first publication of "
@@ -370,7 +370,7 @@
 msgstr ""
 "Esta nota foi atualizada várias vezes desde a primeira publicação da 
estória."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The right to read is a battle being fought today.  Although it may take "
@@ -406,7 +406,7 @@
 "de uma cópia do DeCSS, um programa livre para decodificar vídeo em um DVD, 
é "
 "considerada crime."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -417,7 +417,7 @@
 "these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -428,14 +428,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -444,7 +444,7 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -471,7 +471,7 @@
 "DRM é o motivo pelo qual iniciamos a campanha <a href=\"http://www.";
 "defectivebydesign.org/\"><em>Defective by Design</em></a>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "One of the ideas in the story was not proposed in reality until 2002.  "
@@ -486,14 +486,14 @@
 "de que o FBI e a Microsoft teriam a senha de administrador (<cite>root</"
 "cite>) dos computadores pessoais e não permitiriam que você a tivesse."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
 "into use, it is called &ldquo;secure boot&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -519,7 +519,7 @@
 "<cite>web site</cite> que coopere com ela) tenha o controle final sobre o "
 "que o usuário possa fazer com o seu computador."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -528,7 +528,7 @@
 "control.  We call this <em>restricted boot</em>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "When this story was first written, the SPA was threatening small Internet "
@@ -554,7 +554,7 @@
 "exigência e foi processado. Mais tarde, o SPA desistiu desse processo, mas "
 "conseguiu o DMCA, que lhes deu o poder que buscavam."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The SPA, which actually stands for Software Publishers Association, has "
@@ -582,7 +582,7 @@
 "ameaças levemente veladas de que as pessoas que compartilhassem software "
 "poderiam ser violentadas."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -592,7 +592,7 @@
 "imaginárias. Por exemplo, um computador numa universidade na área de 
Chigago "
 "mostra a seguinte mensagem quando você efetua o <cite>login</cite>:"
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -617,7 +617,7 @@
 "a administração poderá fornecer a evidência de tais atividades para "
 "autoridades da Universidade e/ou oficiais da lei."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -626,11 +626,11 @@
 "EUA]: pressionar quase todas as pessoas a concordarem, antecipadamente, a "
 "abdicar de seus direitos sob a mesma."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "Más notícias"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The battle for the right to read is already in progress, The enemy is "
@@ -646,7 +646,7 @@
 "artigos sobre as coisas ruins que vêm acontecendo desde a publicação "
 "original deste artigo:"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -657,31 +657,31 @@
 "for rejecting the product completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -693,7 +693,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "If we want to stop the bad news and create some good news, we need to "
@@ -716,11 +716,11 @@
 "href=\"http://www.fsf.org/associate\";>junte-se à FSF</a> para ajudar a "
 "financiar nosso trabalho."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Referências"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -732,7 +732,7 @@
 "a>] and the National Information Infrastructure: The Report of the Working "
 "Group on Intellectual Property [sic] Rights (1995)."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -742,7 +742,7 @@
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
 "Wired, Jan. 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -750,7 +750,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -760,7 +760,7 @@
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
 "Private Data</a>, Washington Post, 4 Nov 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.public-domain.org/\";>Union for the Public Domain</"
@@ -775,26 +775,16 @@
 "Uma nova organização que pretende resistir e reverter a extensão exagerada 
"
 "dos poderes dos direitos autorais e patentes."
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Este artigo foi publicado em <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Outros textos para ler"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">Filosofia do Projeto GNU</a>"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.computerworld.com/s/article/49358/";
@@ -809,6 +799,16 @@
 "Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\"> Proteção Contra 
Cópia: "
 "Apenas Diga Não</a>, publicado na revista Computer World."
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Este artigo foi publicado em <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/right-to-read.ru-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ru-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- po/right-to-read.ru-en.html 18 Oct 2016 16:29:50 -0000      1.34
+++ po/right-to-read.ru-en.html 6 Nov 2016 21:28:15 -0000       1.35
@@ -3,30 +3,60 @@
 <title>The Right to Read
 - GNU Project - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns > p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --></style>
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<h2 class="center">The Right to Read</h2>
 
-<p>
+<p class="byline center">
 by <a href="http://www.stallman.org/";><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
 <em>This article appeared in the February 1997 issue
 of <cite>Communications of the ACM</cite> (Volume 40, Number
 2).</em></p>
-<hr />
+<hr class="thin" />
 
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
             From <cite>The Road To Tycho</cite>, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 </p></blockquote>
 
+<div class="columns">
 <p>
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -62,7 +92,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -106,7 +139,10 @@
 knowing your computer's root password.  And neither
 the FBI nor
 Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -143,7 +179,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -153,6 +192,7 @@
 to Luna, where they found others who had likewise gravitated away from
 the long arm of the SPA.  When the Tycho Uprising began in 2062, the
 universal right to read soon became one of its central aims.</p>
+</div>
 
 <div class="announcement">
 <blockquote>
@@ -163,35 +203,46 @@
 <div id="AuthorsNote">
 <h3>Author's Notes</h3>
 
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it forwards into something more visibly
 oppressive. See <a
 href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>.
+</p>
+</div>
+<div class="column-limit"></div>
 </li>
 
 <li>
+<div class="reduced-width">
 <p>Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the <a href="http://DefectiveByDesign.org";>Defective by
 Design</a> campaign.  We ask for your support.</p>
-</li>
 
-<li>
 <p>The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.</p>
+</div>
+<div class="column-limit"></div>
 </li>
+</ul>
 
-<li>
+<blockquote class="info center">
 <p>The following note has been updated several times since the first
 publication of the story.</p>
+</blockquote>
 
+<ul class="no-bullet">
+<li>
+<div class="columns">
 <p>
 The battle for the right to read is already being fought.  Although it
 may take 50 years for our past freedoms to fade into obscurity, most
@@ -228,15 +279,20 @@
 Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
 Nonfree software tends to have <a href="/proprietary/">abusive
 features of many kinds</a>, which lead to the conclusion that
 <a href="/philosophy/free-software-even-more-important.html">you can
 never trust a nonfree program</a>.  We must insist on free (libre)
 software only, and reject nonfree programs.</p>
 
-<p>
+<p class="inline-block">
 With Windows Vista, Microsoft admitted it had built in a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
@@ -244,7 +300,12 @@
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
 10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the FBI and Microsoft will keep the
@@ -274,7 +335,12 @@
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this <em>restricted
 boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 In 1997, when this story was first published, the SPA was
 threatening small Internet service providers, demanding they permit
@@ -293,7 +359,12 @@
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
 software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="reduced-width">
 <p>
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -315,12 +386,15 @@
 <p>
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.</p>
+</div>
 </li>
 </ul>
+<div class="column-limit"></div>
 </div>
 
 <h3 id="BadNews">Bad News</h3>
 
+<div class="columns">
 <p>
 The battle for the right to read is going against us so far.
 The enemy is organized, and we are not.
@@ -344,10 +418,10 @@
 <li><p>It has DRM, which is intended to block users from
 sharing copies.</p></li>
 
-<li><p>It has a back door with which Amazon can remotely erase any book.
+<li><p class="inline-block">It has a back door with which Amazon can remotely 
erase any book.
 In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
 
-<li><p>In case all that isn't Orwellian enough, there is a universal
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is 
a universal
 back door with which Amazon can remotely change the software, and
 introduce any other form of nastiness.</p></li>
 </ul>
@@ -369,6 +443,7 @@
 our work more generally.  There is also a <a href="/help/help.html">list of 
ways
 to participate in our work</a>.
 </p>
+</div>
 
 <h3 id="References">References</h3>
 
@@ -394,13 +469,7 @@
        reverse the overextension of copyright and patent powers.</li>
 </ul>
 
-<hr />
-<blockquote id="fsfs"><p class="big">This essay is published
-in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Other Texts to Read</h5>
+<h4>Other Texts to Read</h4>
 
 <ul>
        <li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -409,6 +478,13 @@
                id="copy-protection">Copy Protection: Just Say No</a>,
                published in Computer World.</li>
 </ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -467,7 +543,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/10/18 16:29:50 $
+$Date: 2016/11/06 21:28:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/right-to-read.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ru.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- po/right-to-read.ru.po      18 Oct 2016 16:29:50 -0000      1.63
+++ po/right-to-read.ru.po      6 Nov 2016 21:28:15 -0000       1.64
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-09-02 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -40,7 +40,7 @@
 "<em>Эта статья появилась в февральском 
(1997&nbsp;года) выпуске "
 "<cite>Communications of the ACM</cite> (том 40, номер 2).</em>"
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -48,7 +48,7 @@
 "Из <cite>Дороги к Тихо</cite>, сборника статей о 
событиях, предшествовавших "
 "Лунной революции, опубликованного в 
Луна-Сити в 2096&nbsp;году."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -60,7 +60,7 @@
 "если бы она не смогла найти другой, она 
завалила бы свою курсовую работу. "
 "Она не осмеливалась просить никого, кроме 
Дана."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -76,7 +76,7 @@
 "приводила его в ужас. Его, как и всех, с 
начальной школы учили, что "
 "обмениваться книгами гадко и 
противно&nbsp;&mdash; так делают только пираты."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -97,7 +97,7 @@
 "владелец компьютера получил бы самое 
строгое наказание&nbsp;&mdash; за то, "
 "что не побеспокоился предотвратить 
преступление."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -120,7 +120,7 @@
 "научные статьи, если на них будут часто 
ссылаться, принесут достаточно "
 "денег, чтобы вернуть долг.)"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -137,7 +137,7 @@
 "доступ. К 2047&nbsp;году публичные библиотеки 
со свободным доступом к "
 "научной литературе стали смутным 
воспоминанием."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -156,7 +156,7 @@
 "В 2047&nbsp;году Френк сидел в тюрьме&nbsp;&mdash; не 
за пиратское чтение, а "
 "за то, что у него был отладчик."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -172,7 +172,7 @@
 "это стало их основным применением в 
реальной практике. Это значило, что они "
 "незаконны; тех, кто разрабатывал 
отладчики, отправили в тюрьму."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -186,7 +186,7 @@
 "программированию, держали в специальном 
окружении, так что им можно было "
 "пользоваться только для учебных 
упражнений."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It was also possible to bypass the copyright monitors by installing a "
 "modified system kernel.  Dan would eventually find out about the free "
@@ -204,7 +204,7 @@
 "для своего компьютера. А его ты не узнал бы 
ни от ФБР, ни от службы "
 "поддержки Microsoft."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -216,7 +216,7 @@
 "раз, когда он говорил с ней, он 
переполнялся восторгом. А раз она 
попросила "
 "о помощи именно его, это могло означать, 
что и она его любит."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -230,7 +230,7 @@
 "было преступлением, но SPA не узнал бы об 
этом автоматически. Они узнали бы, "
 "только если бы Мелисса донесла на него."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -250,7 +250,7 @@
 "поведения. Они считали это признаком того, 
что ты совершал какие-то другие "
 "запрещенные действия, и их не очень 
интересовало, какие именно."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -260,7 +260,7 @@
 "буквально за это. Вместо этого им 
закрывали доступ к вычислительным 
системам "
 "училища, а без этого было совершенно 
невозможно продолжать любые занятия."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -274,7 +274,7 @@
 "студентов по-другому: они наказывали за 
то, что было вредно, а не за то, что "
 "просто вызывало подозрения."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -294,7 +294,7 @@
 "достать. Когда в 2062&nbsp;году началось 
восстание в Тихо, всеобщее право "
 "прочесть быстро стало одной из его 
основных целей."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list "
 "about the dangers of e-books</a>."
@@ -302,11 +302,11 @@
 "<a 
href=\"http://defectivebydesign.org/ebooks.html\";>Присоединяйтесь
 к "
 "нашему списку рассылки об опасностях 
электронных книг</a>."
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr "Примечания автора"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -322,7 +322,7 @@
 "попытался развить мысль, чтобы это 
выглядело еще более жестко. См. &ldquo;<a "
 
"href=\"/philosophy/words-to-avoid.html#Piracy\">пиратство</a>&rdquo;."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -337,7 +337,7 @@
 "программного обеспечения организовал 
кампанию <a href=\"http://";
 "DefectiveByDesign.org\">Дефект гарантирован</a>. Мы 
просим вас о поддержке."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
@@ -346,7 +346,7 @@
 "свободного программного обеспечения, 
также выступает против цифрового "
 "управления ограничениями."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The following note has been updated several times since the first "
 "publication of the story."
@@ -354,7 +354,7 @@
 "Следующее примечание со времени первой 
публикации рассказа несколько раз "
 "обновлялось."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The battle for the right to read is already being fought.  Although it may "
 "take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -376,7 +376,7 @@
 "Европейский союз наложил сходные 
ограничения в директиве 2001&nbsp;года об "
 "авторском праве, но далеко не в такой 
жесткой форме."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -396,7 +396,7 @@
 "одно из несправедливых правил, которые 
эти договоры навязывают во многих "
 "сферах деятельности."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -414,7 +414,7 @@
 "навязал бы подобные же путы Европе. Все 
эти договоры нужно предотвратить или "
 "отменить."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
@@ -424,7 +424,7 @@
 "он движется к одобрению системы цифрового 
управления ограничениями как "
 "официальной части спецификаций Всемирной 
паутины."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -438,7 +438,7 @@
 "\">несвободной программе никогда нельзя 
доверять</a>.  Мы настаиваем "
 "исключительно на свободных программах и 
отвергаем несвободные."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "With Windows Vista, Microsoft admitted it had built in a back door: "
 "Microsoft can use it to forcibly install software &ldquo;upgrades,&rdquo; "
@@ -456,7 +456,7 @@
 "цифровое управление ограничениями, с 
которым пользователи не смогут "
 "справиться. Windows&nbsp;10, конечно, не лучше."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "One of the ideas in the story was not proposed in reality until 2002.  This "
 "is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -467,7 +467,7 @@
 "администратора ваших персональных 
компьютеров и не допустят, чтобы они были "
 "у вас."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
@@ -478,7 +478,7 @@
 "счете стали применять на практике, 
называется &ldquo;безопасной "
 "загрузкой&rdquo;."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "What Microsoft keeps is not exactly a password in the traditional sense; no "
 "person ever types it on a terminal.  Rather, it is a signature and "
@@ -500,7 +500,7 @@
 "\">показывает НАБ недочеты в защите Windows</a>, 
чтобы агентство их "
 "эксплуатировало."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -515,7 +515,7 @@
 "другую операционную систему (такую как 
GNU/Linux), определяет Microsoft. Мы "
 "называем это <em>ограниченной загрузкой</em>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "In 1997, when this story was first published, the SPA was threatening small "
 "Internet service providers, demanding they permit the SPA to monitor all "
@@ -533,7 +533,7 @@
 "Впоследствии SPA отказалась от 
преследования, но DMCA дал ей власть, которой "
 "она добивалась."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The SPA, which actually stands for Software Publishers Association, has been "
 "replaced in its police-like role by the Business Software Alliance.  The BSA "
@@ -553,7 +553,7 @@
 "году, выдвигались слегка прикрытые угрозы 
насилия в тюрьме над людьми, "
 "обменивавшимися программами."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -563,7 +563,7 @@
 "Например, компьютер одного из 
университетов в районе Чикаго 
демонстрировал "
 "при входе в систему такое сообщение:"
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -590,7 +590,7 @@
 "руководству Университета и/или 
должностным лицам, в обязанности которых "
 "входит охрана правопорядка."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -599,11 +599,11 @@
 "давление, чтобы они заранее соглашались 
отказаться от своих прав, "
 "предоставляемых этой поправкой."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "Плохие новости"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The battle for the right to read is going against us so far.  The enemy is "
 "organized, and we are not."
@@ -611,7 +611,7 @@
 "Битву за право прочесть мы пока 
проигрываем. Враг организован, а мы&nbsp;"
 "&mdash; нет."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -631,7 +631,7 @@
 "html\">оруэлловских черт</a>. Любой из них 
достаточно, чтобы полностью "
 "отказаться от этого продукта:"
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
@@ -641,13 +641,13 @@
 "и какую страницу читает пользователь, 
докладывает, когда пользователь "
 "подчеркивает текст и обо всех заметках, 
которые вводит пользователь."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 "В нем есть цифровое управление 
ограничениями, предназначенное для того, "
 "чтобы не дать пользователям обмениваться 
копиями."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
@@ -656,7 +656,7 @@
 "сети. В&nbsp;2009&nbsp;году компания стерла 
тысячи копий <cite>1984</cite> "
 "Джорджа Оруэлла."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
@@ -666,7 +666,7 @@
 "с помощью которой Amazon может изменять 
программы по сети, вводя какого "
 "угодно рода гадости."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -687,7 +687,7 @@
 "Таким образом, я отказываюсь идти на такие 
контракты&nbsp;&mdash; в "
 "отношении программ, электронных книг, 
музыки или чего бы то ни было еще."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we want to stop the bad news and create some good news, we need to "
 "organize and fight.  Subscribe to the FSF's <a href=\"http://";
@@ -702,11 +702,11 @@
 "a>&rdquo;, чтобы помочь. Есть также <a 
href=\"/help/help.html\">список "
 "способов принять участие в нашей 
работе</a>."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Ссылки"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -719,7 +719,7 @@
 "Рабочей группы по правам 
интеллектуальной собственности [так] 
(1995&nbsp;"
 "год)."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -729,7 +729,7 @@
 "\">Пояснение к Белой книге: Клешня 
авторского права</a>. Памела Самуэльсон, "
 "&ldquo;Уайеред&rdquo;, январь 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -737,7 +737,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Р
аспродано</a>. "
 "Джеймс Бойль, &ldquo;Нью-Йорк таймс&rdquo; 
31&nbsp;марта 1996&nbsp;года."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -748,7 +748,7 @@
 "данные и личные данные</a>. &ldquo;Вашингтон 
пост&rdquo;, 4&nbsp;ноября "
 "1996&nbsp;года."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"https://web.archive.org/web/20151113122141/http://public-domain.";
 "org/\">Union for the Public Domain</a>&mdash;an organization which aims to "
@@ -759,27 +759,17 @@
 "которой является предотвращение и отмена 
чрезмерного усиления авторского "
 "права и патентов."
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Этот очерк публикуется в сборнике <a 
href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Свободные программы, 
свободное общество: "
-"избранные очерки Ричарда М. 
Столмена</cite></a>"
-
 # type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Другие тексты по теме"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">Философия 
проекта GNU</a>"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.computerworld.com/article/2596679/networking/copy-";
 "protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -790,6 +780,16 @@
 "просто скажите &ldquo;нет&rdquo;</a>, 
опубликовано в &ldquo;Компьютер "
 "уорлд&rdquo;."
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Этот очерк публикуется в сборнике <a 
href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Свободные программы, 
свободное общество: "
+"избранные очерки Ричарда М. 
Столмена</cite></a>"
+
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>

Index: po/right-to-read.sr.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.sr.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- po/right-to-read.sr.po      18 Oct 2016 16:29:50 -0000      1.47
+++ po/right-to-read.sr.po      6 Nov 2016 21:28:15 -0000       1.48
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2009-10-17 19:01+0200\n"
 "Last-Translator: Nikola Smolenski <address@hidden>\n"
 "Language-Team:  <address@hidden>\n"
@@ -50,7 +50,7 @@
 "издању од фебруара 1997. (том 40, број 2).</em>"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -59,7 +59,7 @@
 "револуције, објављене у Луна Ситију 2096."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -72,7 +72,7 @@
 "кога би се усудила да пита, осим Дана."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -89,7 +89,7 @@
 "&mdash; нешто што би само пирати радили."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -110,7 +110,7 @@
 "добио најтежу казну &mdash; због 
непредузимања ничега да спречи злочин."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -132,7 +132,7 @@
 "често буду навођени, донети довољно да би 
могао да отплати овај дуг.)"
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -149,7 +149,7 @@
 "научној литератури су биле само бледа 
успомена."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -169,7 +169,7 @@
 "читања, већ због поседовања дебагера."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -187,7 +187,7 @@
 "били послати у затвор."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -201,7 +201,7 @@
 "тако да се могао користити само за 
студентске вежбе."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "It was also possible to bypass the copyright monitors by installing a "
@@ -230,7 +230,7 @@
 "Мајкрософтова подршка ти не би рекли тако 
нешто."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -243,7 +243,7 @@
 "могло значити да је и она волела њега."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -258,7 +258,7 @@
 "њега. Једини начин да сазнају био би да га 
Лиза пријави."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -278,7 +278,7 @@
 "забрањено, и нису морали да знају шта."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -289,7 +289,7 @@
 "и неизбежно би пали испите из свих својих 
предмета."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -303,7 +303,7 @@
 "активности које су биле штетне, не оне 
које су биле само сумњиве."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -323,20 +323,20 @@
 "почео 2062, универзално право на читање 
постало је један од његових основних "
 "циљева."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list "
 "about the dangers of e-books</a>."
 msgstr ""
 
 # type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 #, fuzzy
 #| msgid "Author's Note"
 msgid "Author's Notes"
 msgstr "Ауторова белешка"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -346,7 +346,7 @@
 "philosophy/words-to-avoid.html#Piracy\">&ldquo;Piracy&rdquo;</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -355,14 +355,14 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid "This note was updated in 2007."
 msgid ""
@@ -371,7 +371,7 @@
 msgstr "[Ова белешка је освежена 2007.]"
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The right to read is a battle being fought today.  Although it may take "
@@ -408,7 +408,7 @@
 "Србији и Црној Гори, ово је обезбеђено 
члановима 180 и 187 Закона о "
 "ауторском и сродним правима из 2004. &mdash; 
прев.]"
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -419,7 +419,7 @@
 "these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -430,14 +430,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -447,7 +447,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -470,7 +470,7 @@
 "заобиђу."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "One of the ideas in the story was not proposed in reality until 2002.  "
@@ -485,7 +485,7 @@
 "идеја да ће ФБИ и Мајкрософт чувати 
основне [<em>root</em>] лозинке за ваш "
 "лични рачунар, и неће вам дозволити да их 
имате."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
@@ -493,7 +493,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -519,7 +519,7 @@
 "Мајкрософтом, коначну контролу над оним 
што корисник може да ради на свом "
 "рачунару."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -529,7 +529,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "When this story was first written, the SPA was threatening small Internet "
@@ -556,7 +556,7 @@
 "што им је дало моћ који су тражили."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The SPA, which actually stands for Software Publishers Association, has "
@@ -584,7 +584,7 @@
 "силовани."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The university security policies described above are not imaginary.  For "
@@ -600,7 +600,7 @@
 "поруку када му приступите (наводници су у 
оригиналу):"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -625,7 +625,7 @@
 "полицији."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -633,11 +633,11 @@
 "Ово је веома занимљив приступ Четвртом 
амандману Устава САД: терати скоро "
 "сваког да пристане, унапред, да се одрекне 
својих права која им он даје."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The <a href=\"#AuthorsNote\">author's note</a> talks about the battle for "
@@ -653,7 +653,7 @@
 "чланцима о технологијама које се управо 
развијају да би вам ускратиле право "
 "на читање."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -664,31 +664,31 @@
 "for rejecting the product completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -700,7 +700,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we want to stop the bad news and create some good news, we need to "
 "organize and fight.  Subscribe to the FSF's <a href=\"http://";
@@ -711,12 +711,12 @@
 msgstr ""
 
 # type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Референце"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "The administration's &ldquo;White Paper&rdquo;: Information "
@@ -734,7 +734,7 @@
 "em>: извештај Радне групе за права на 
интелектуалну својину (1995)."
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -745,7 +745,7 @@
 "Самјуелсон, Вајрд, јан. 1996."
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -753,7 +753,7 @@
 "<em><a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a></"
 "em>, Џејмс Бојл, Њујорк тајмс, 31. март 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -764,7 +764,7 @@
 "\">Public Data or Private Data</a></em>, Вашингтон пост, 4. 
новембар 1996."
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.public-domain.org/\";>Union for the Public Domain</"
@@ -779,30 +779,19 @@
 "a></em> — организација чији је циљ отпор и 
преокретање прекомерног проширења "
 "ауторских права и патентних моћи."
 
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Овај есеј је објављен у збирци „<a 
href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Слободан софтвер, 
слободно друштво: изабрани "
-"есеји Ричарда М. Столмана</cite></a>“."
-
 # type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Остали текстови за читање"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">Филозофија 
пројекта ГНУ</a>"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.computerworld.com/s/article/49358/";
@@ -817,6 +806,17 @@
 "Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">Copy Protection: Just "
 "Say No</a></em>, Објављено у Компјутер ворлду."
 
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Овај есеј је објављен у збирци „<a 
href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Слободан софтвер, 
слободно друштво: изабрани "
+"есеји Ричарда М. Столмана</cite></a>“."
+
 # type: Content of: <div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>

Index: po/right-to-read.sv.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.sv.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/right-to-read.sv.po      18 Oct 2016 16:29:51 -0000      1.13
+++ po/right-to-read.sv.po      6 Nov 2016 21:28:15 -0000       1.14
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: web-translators <address@hidden>\n"
@@ -43,7 +43,7 @@
 "<em>Denna artikel fanns i februari numret 1997 av <strong>“Communications 
of "
 "the ACM”</strong> (årgång 40, Nummer 2).</em>"
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -51,7 +51,7 @@
 "(från “Vägen till Tycho”, en kollektion av artiklar om föregångarna 
till den "
 "Lunariska revolutionen, publicerad i Luna City år 2096)"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -63,7 +63,7 @@
 "låna en annan, så skulle hon inte klara sitt skolprojekt. Det fanns ingen "
 "hon vågade fråga, förutom Danne."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -79,7 +79,7 @@
 "sig sen barnsben att dela med sig av böcker var fel - någonting bara 
pirater "
 "gör."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -100,7 +100,7 @@
 "datorägare, skulle få ett hårt straff för att inte ha vidtagit åtgärder 
för "
 "att förhindra brott."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -123,7 +123,7 @@
 "framtida forskning skulle generera rapporter nog för att betala tillbaks "
 "studielånen)."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -139,7 +139,7 @@
 "ideella förläggare börjat ta betalt för access. Vid 2047 så var fri 
access "
 "för elever bara blott ett minne."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -158,7 +158,7 @@
 "lätt till angiveri). År 2047 satt Frasse i fängelse, inte för 
piratläsning, "
 "utan för innehav av en debugger."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -175,7 +175,7 @@
 "praktiken det vanliga användningsområdet. Av detta följde att de var "
 "olagliga, senare skickades utvecklare av sådana verktyg i fängelse."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -187,7 +187,7 @@
 "kontraktsbundna programmerare. Den debugger Danne använde på 
datavetenskapen "
 "hölls bakom en brandvägg så att den bara kunde användas för 
skoluppgifter."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "It was also possible to bypass the copyright monitors by installing a "
@@ -214,7 +214,7 @@
 "man kan inte ens installera ett om man hade ett, utan att veta om datorns "
 "hårdvaru-lösenord, vilket varken SÄPO eller Microsofts support talar om."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -227,7 +227,7 @@
 "frågade just honom om hjälp, kunde ju betyda att det kanske var ömsesidig "
 "kärlek."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -241,7 +241,7 @@
 "han som läste och inte hon. Det var fortfarande ett brott, men MSM skulle "
 "inte automatiskt få reda på det. Detta om inte Lisa angav honom."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -260,7 +260,7 @@
 "för administrationen att övervaka. Det förutsattes att man gjorde 
någonting "
 "förbjudet och de behövde inte veta exakt vad."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -270,7 +270,7 @@
 "blev de utestängda från skolans datorer och datorsystem, och skulle "
 "ofrånkomligen kugga på alla ämnen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -283,7 +283,7 @@
 "hade skolorna ett annat förhållningssätt till disciplin; de bestraffade "
 "skadliga aktiviteter, inte de som bara väckte misstanke."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -302,19 +302,19 @@
 "flyttat ifrån MSMs långa arm. När senare Tycho-upproret började 2062, så 
var "
 "allas rätt att läsa en av dess centrala mål."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list "
 "about the dangers of e-books</a>."
 msgstr ""
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 #, fuzzy
 #| msgid "Author's Note"
 msgid "Author's Notes"
 msgstr "Författarens noteringar"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -324,7 +324,7 @@
 "philosophy/words-to-avoid.html#Piracy\">&ldquo;Piracy&rdquo;</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -333,13 +333,13 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid "This note was updated in 2002."
 msgid ""
@@ -347,7 +347,7 @@
 "publication of the story."
 msgstr "Dessa noteringar uppdaterades 2002."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The right to read is a battle being fought today.  Although it may take "
@@ -377,7 +377,7 @@
 "data). Den europeiska unionen införde liknande begränsningar 2001 i ett "
 "upphovsrättsdirektiv."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -388,7 +388,7 @@
 "these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -399,14 +399,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -415,7 +415,7 @@
 "programs."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "With Windows Vista, Microsoft admitted it had built in a back door: "
 "Microsoft can use it to forcibly install software &ldquo;upgrades,&rdquo; "
@@ -425,7 +425,7 @@
 "overcome.  Of course, Windows 10 is no better"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The idea that the FBI and Microsoft will keep the root passwords for "
@@ -440,14 +440,14 @@
 "inte låta ägaren ha det, detta föreslogs dock 2002. Det kallas “trusted "
 "computing” eller “Palladium”."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
 "into use, it is called &ldquo;secure boot&rdquo;."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "What Microsoft keeps is not exactly a password in the traditional sense; no "
 "person ever types it on a terminal.  Rather, it is a signature and "
@@ -459,7 +459,7 @@
 "NSA security bugs in Windows</a> to exploit."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -468,7 +468,7 @@
 "control.  We call this <em>restricted boot</em>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "When this story was written, the SPA was threatening small Internet "
@@ -495,7 +495,7 @@
 "senare tillbaks stämningen, men fick senare lagstiftningen DMCA som ger dem "
 "makten de ville ha."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The SPA, which actually stands for Software Publisher's Association, has "
@@ -522,7 +522,7 @@
 "BSA i Argentina under 2001 framkom hot om våldäckt i fängelser mot folk 
som "
 "delade med sig av mjukvara."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The university security policies described above are not imaginary. For "
@@ -537,7 +537,7 @@
 "exempel, en dator i ett universitetsnätverk i Chicago området skriver ut "
 "följande meddelande när man loggar in:"
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -561,7 +561,7 @@
 "system personnel may provide the evidence of such monitoring to University "
 "authorities and/or law enforcement officials."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -569,11 +569,11 @@
 "Detta är en intressant tolkning av USAs “Fourth Amendment”: tvinga folk 
att "
 "hålla med, i förväg, för att sedan hävda sin rätt eferåt."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The <a href=\"/philosophy/right-to-read.html#AuthorsNote\">author's note</"
@@ -590,7 +590,7 @@
 "börjat; här följer två länkar till artiklar om teknologier som utvecklas 
för "
 "att neka dig din rätt att läsa."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -601,31 +601,31 @@
 "for rejecting the product completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -637,7 +637,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we want to stop the bad news and create some good news, we need to "
 "organize and fight.  Subscribe to the FSF's <a href=\"http://";
@@ -647,11 +647,11 @@
 "of ways to participate in our work</a>."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Referenser"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -663,7 +663,7 @@
 "National Information Infrastructure: The Report of the Working Group on "
 "Intellectual Property [sic] Rights (1995)."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -673,7 +673,7 @@
 "förklaring av detta “White Paper”: The Copyright Grab</a>, Pamela 
Samuelson, "
 "Wired, Jan. 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -681,7 +681,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -691,7 +691,7 @@
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
 "Private Data</a>, Washington Post, 4 Nov 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.public-domain.org/\";>Union for the Public Domain</"
@@ -706,27 +706,17 @@
 "en organisation med syfte att motsätta sig och försöka reversera 
uttökningen "
 "av upphovsrätten och patentlagstiftningen."
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Denna essä är publicerad i <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Andra texter att läsa"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.computerworld.com/s/article/49358/";
@@ -741,6 +731,16 @@
 "Copy_Protection_Just_Say_No\" id=\"COPYPROCTECTION\">Copy Protection: Just "
 "Say No</a>, Published in Computer World."
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Denna essä är publicerad i <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/right-to-read.tr.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.tr.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- po/right-to-read.tr.po      18 Oct 2016 16:29:51 -0000      1.45
+++ po/right-to-read.tr.po      6 Nov 2016 21:28:15 -0000       1.46
@@ -12,7 +12,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2010-01-25 16:11+0100\n"
 "Last-Translator: Tahir Emre Kalaycı <address@hidden>\n"
 "Language-Team: Turkish <address@hidden>\n"
@@ -54,7 +54,7 @@
 "1997 yayınında yer almıştır."
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -63,7 +63,7 @@
 "yazıların derlemesi olan “Tycho’ya Giden Yol”dan alınmıştır."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -76,7 +76,7 @@
 "bilgisayarını isteyebileceği biri yoktu."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -93,7 +93,7 @@
 "öğretilmişti, bunu yalnızca korsanlar yapardı."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -114,7 +114,7 @@
 "sahibi olarak, o, suçu önlemediği için ciddi bir ceza alabilirdi. "
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -137,7 +137,7 @@
 "yapılırsa, bunların yeterli ücreti sağlayacağını ummaktaydı.)"
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -154,7 +154,7 @@
 "kütüphaneler geçmişte kalmıştı."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -174,7 +174,7 @@
 "bunun nedeni yasak okuma yapması değil, hata ayıklayıcıyı 
bulundurmasıydı."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -193,7 +193,7 @@
 "hapse gönderildi."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -208,7 +208,7 @@
 "alıştırmaları için kullanılabilmekteydi."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "It was also possible to bypass the copyright monitors by installing a "
@@ -237,7 +237,7 @@
 "abbr> ya da Microsoft Destek size şifreyi söylemezdi."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -250,7 +250,7 @@
 "seçmiş olması da Lissa’nın da Dan’ı sevdiği anlamına gelebilirdi. "
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -265,7 +265,7 @@
 "bildirirse bulabilirlerdi."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -285,7 +285,7 @@
 "yasak şeyin ne olduğunu bilmeleri gerekmezdi."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -297,7 +297,7 @@
 "neden olmaktaydı."
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -312,7 +312,7 @@
 "etkinlikleri cezalandırmaktaydı. "
 
 # type: Content of: <p>
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -332,20 +332,20 @@
 "insanları tanıdılar. 2062 yılında, Tycho İsyanı başladığında, 
evrensel okuma "
 "hakkı, ana amaçlarından biri haline geldi."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing list "
 "about the dangers of e-books</a>."
 msgstr ""
 
 # type: Content of: <h3>
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 #, fuzzy
 #| msgid "Author's Note"
 msgid "Author's Notes"
 msgstr "Yazarın Notu"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -355,7 +355,7 @@
 "philosophy/words-to-avoid.html#Piracy\">&ldquo;Piracy&rdquo;</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -364,13 +364,13 @@
 "Design</a> campaign.  We ask for your support."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid "This note was updated in 2007."
 msgid ""
@@ -379,7 +379,7 @@
 msgstr "Bu not 2007 yılında güncellenmiştir."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The right to read is a battle being fought today.  Although it may take "
@@ -414,7 +414,7 @@
 "kabul edilen DADVSI yasasıyla DeCSS'nin, DVD'deki videoları çözmek için "
 "program, bir kopyasına sadece sahip olmak bile suç sayılmaktadır."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -425,7 +425,7 @@
 "these treaties impose across a wide range of fields."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
 "South Korea through bilateral agreements, and on countries such as Costa "
@@ -436,14 +436,14 @@
 "be defeated, or abolished."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
 "official part of the web specifications."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Nonfree software tends to have <a href=\"/proprietary/\">abusive features of "
 "many kinds</a>, which lead to the conclusion that <a href=\"/philosophy/free-"
@@ -453,7 +453,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "Vista also gives Microsoft additional powers; for instance, Microsoft can "
@@ -480,7 +480,7 @@
 "kampanyasını oluşturduk."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "One of the ideas in the story was not proposed in reality until 2002.  "
@@ -495,7 +495,7 @@
 "<abbr>FBI</abbr>’ın ve Microsoft’un kişisel bilgisayarlar için kök 
şifreleri "
 "tutması ve onlara sahip olmanıza izin vermemesi fikridir."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
@@ -503,7 +503,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "What Microsoft keeps is not exactly a password in the traditional sense; "
@@ -528,7 +528,7 @@
 "Microsoft ile işbirliği yapan herhangi bir web sitesinin, kullanıcının "
 "bilgisayarıyla yapabilecekleri üzerinde tam bir denetim sağlamasına 
elverir."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -538,7 +538,7 @@
 msgstr ""
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "When this story was first written, the SPA was threatening small Internet "
@@ -566,7 +566,7 @@
 "şeyi elde etti. "
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The SPA, which actually stands for Software Publishers Association, has "
@@ -595,7 +595,7 @@
 "bulunmuştur."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -606,7 +606,7 @@
 "bilgisayarda aşağıdaki mesajı görürsünüz:"
 
 # type: Content of: <blockquote><p>
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -631,7 +631,7 @@
 "veya kanun yürütme birimlerine bildirir."
 
 # type: Content of: <p>
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -639,11 +639,11 @@
 "Bu, Dördüncü Değişikliğe ilişkin ilginç bir yaklaşımdır: herkese 
ikna olması "
 "için baskı uygulayın, böylece haklarından vazgeçsinler."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The <a href=\"#AuthorsNote\">author's note</a> talks about the battle for "
@@ -659,7 +659,7 @@
 "aşağıda okuma hakkınızı engellemek üzere geliştirilmiş teknolojiler "
 "hakkındaki iki yazının bağlantısını bulabilirsiniz."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Today's commercial e-books <a href=\"/philosophy/the-danger-of-ebooks.html"
 "\"> abolish readers' traditional freedoms</a>.  Amazon's e-book reader "
@@ -670,31 +670,31 @@
 "for rejecting the product completely:"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
 "any notes the user enters."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
 "of nastiness."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Amazon's e-book distribution is oppressive, too.  It identifies the user and "
 "records what books the user obtains.  It also requires users to agree to an "
@@ -706,7 +706,7 @@
 "else."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we want to stop the bad news and create some good news, we need to "
 "organize and fight.  Subscribe to the FSF's <a href=\"http://";
@@ -717,12 +717,12 @@
 msgstr ""
 
 # type: Content of: <h3>
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Kaynakça"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "The administration's &ldquo;White Paper&rdquo;: Information "
@@ -741,7 +741,7 @@
 "Rights (1995)."
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -752,7 +752,7 @@
 "Wired, Jan. 1996"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -760,7 +760,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -771,7 +771,7 @@
 "Private Data</a>, Washington Post, 4 Nov 1996."
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.public-domain.org/\";>Union for the Public Domain</"
@@ -786,30 +786,19 @@
 "(Kamusal Alan için Birlik)</a>&mdash;Telif hakları ve patent güçlerinin "
 "genişlemesine karşı durmayı ve tersine çevirmeyi hedefleyen bir 
organizasyon"
 
-# type: Content of: <h4>
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Bu yazı <a href=\"http://shop.fsf.org/product/free-software-free-society/";
-"\"><cite>Özgür Yazılım, Özgür Toplum:  Richard M. Stallman'ın Seçme "
-"Yazıları</cite></a> kitabında yayınlanmıştır."
-
 # type: Content of: <p>
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Okunabilecek diğer metinler"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">GNU Projesinin Felsefesi</a>"
 
 # type: Content of: <ul><li>
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.computerworld.com/s/article/49358/";
@@ -825,6 +814,17 @@
 "Say No (Kopya Koruma: Sadece Hayır Deyin)</a>, Computer World'te "
 "yayınlanmıştır."
 
+# type: Content of: <h4>
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Bu yazı <a href=\"http://shop.fsf.org/product/free-software-free-society/";
+"\"><cite>Özgür Yazılım, Özgür Toplum:  Richard M. Stallman'ın Seçme "
+"Yazıları</cite></a> kitabında yayınlanmıştır."
+
 # type: Content of: <div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>

Index: po/right-to-read.uk-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.uk-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/right-to-read.uk-diff.html       31 Oct 2016 22:57:29 -0000      1.1
+++ po/right-to-read.uk-diff.html       6 Nov 2016 21:28:15 -0000       1.2
@@ -15,30 +15,70 @@
 &lt;title&gt;The Right to Read
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;style type="text/css" media="print,screen"&gt;&lt;!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+<span class="removed"><del><strong>hr</strong></del></span>
+<span class="inserted"><ins><em>.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li</em></ins></span> {
+   margin: <span class="removed"><del><strong>1.2em</strong></del></span> 0;
+}
+<span class="removed"><del><strong>#content ul</strong></del></span>
+<span class="inserted"><ins><em>#AuthorsNote</em></ins></span> li p {
+   margin-top: 1em;
+}
+#AuthorsNote <span class="removed"><del><strong>ul</strong></del></span> li 
<span class="inserted"><ins><em>p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns &gt; p:first-child,
+    #AuthorsNote li p.inline-block</em></ins></span> {
+      margin-top: <span 
class="removed"><del><strong>1.3em;</strong></del></span> <span 
class="inserted"><ins><em>0;</em></ins></span>
+   }
+<span class="removed"><del><strong>#content 
div.announcement</strong></del></span>
+   <span class="inserted"><ins><em>#AuthorsNote .columns 
p.emph-box</em></ins></span> { <span 
class="removed"><del><strong>margin-bottom: 2em;</strong></del></span>
+      <span class="inserted"><ins><em>margin: .5em 6%;
+   }</em></ins></span>
+}
 --&gt;&lt;/style&gt;
 &lt;!--#include virtual="/philosophy/po/right-to-read.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
-&lt;h2&gt;The Right to Read&lt;/h2&gt;
+<span class="removed"><del><strong>&lt;h2&gt;The</strong></del></span>
+<span class="inserted"><ins><em>&lt;h2 class="center"&gt;The</em></ins></span> 
Right to Read&lt;/h2&gt;
 
-&lt;p&gt;
+<span class="removed"><del><strong>&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p class="byline 
center"&gt;</em></ins></span>
 by &lt;a href="http://www.stallman.org/"&gt;&lt;strong&gt;Richard 
Stallman&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
 
-&lt;p&gt;
+<span class="removed"><del><strong>&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;p class="center"&gt;</em></ins></span>
 &lt;em&gt;This article appeared in the February 1997 issue
 of &lt;cite&gt;Communications of the ACM&lt;/cite&gt; (Volume 40, Number
 2).&lt;/em&gt;&lt;/p&gt;
-&lt;hr /&gt;
+&lt;hr <span class="inserted"><ins><em>class="thin"</em></ins></span> /&gt;
 
-&lt;blockquote&gt;&lt;p&gt;
+<span 
class="removed"><del><strong>&lt;blockquote&gt;&lt;p&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;div class="article"&gt;
+&lt;blockquote class="info center"&gt;&lt;p&gt;</em></ins></span>
             From &lt;cite&gt;The Road To Tycho&lt;/cite&gt;, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 &lt;/p&gt;&lt;/blockquote&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -74,7 +114,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -118,7 +161,10 @@
 knowing your computer's root password.  And neither
 the FBI nor
 Microsoft Support would tell you that.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -155,7 +201,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -165,6 +214,7 @@
 to Luna, where they found others who had likewise gravitated away from
 the long arm of the SPA.  When the Tycho Uprising began in 2062, the
 universal right to read soon became one of its central aims.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
 &lt;div class="announcement"&gt;
 &lt;blockquote&gt;
@@ -175,35 +225,51 @@
 &lt;div id="AuthorsNote"&gt;
 &lt;h3&gt;Author's Notes&lt;/h3&gt;
 
-&lt;ul&gt;
-&lt;li&gt;This story is supposedly a historical article that will be written in
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;This</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p&gt;This</em></ins></span> story is supposedly a historical article that 
will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it forwards into something more visibly
 oppressive. See &lt;a
 
href="/philosophy/words-to-avoid.html#Piracy"&gt;&ldquo;Piracy&rdquo;&lt;/a&gt;.
+<span class="inserted"><ins><em>&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;</em></ins></span>
 &lt;/li&gt;
 
 &lt;li&gt;
+<span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 &lt;p&gt;Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the &lt;a href="http://DefectiveByDesign.org"&gt;Defective by
 Design&lt;/a&gt; campaign.  We ask for your support.&lt;/p&gt;
-&lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;The <span class="inserted"><ins><em>Electronic Frontier Foundation, a 
separate organization not
+<span class="inserted"><ins><em>&lt;p&gt;The Electronic Frontier Foundation, a 
separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;</em></ins></span>
 &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;The</em></ins></span> following note has been updated several times 
since the first
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
+&lt;blockquote class="info center"&gt;</em></ins></span>
+&lt;p&gt;The following note has been updated several times since the first
 publication of the story.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/blockquote&gt;
 
+&lt;ul class="no-bullet"&gt;
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The battle for the right to read is already being fought.  Although it
 may take 50 years for our past freedoms to fade into obscurity, most
@@ -251,23 +317,35 @@
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.&lt;/p&gt;
 
-&lt;p&gt;
+<span class="removed"><del><strong>&lt;p&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;div class="columns"&gt;
+&lt;p class="emph-box"&gt;</em></ins></span>
 Nonfree software tends to have &lt;a href="/proprietary/"&gt;abusive
 features of many kinds&lt;/a&gt;, which <span 
class="removed"><del><strong>support</strong></del></span> <span 
class="inserted"><ins><em>lead to</em></ins></span> the conclusion that
 &lt;a href="/philosophy/free-software-even-more-important.html"&gt;you can
 never trust a nonfree program&lt;/a&gt;.  We must insist on free (libre)
 software only, and reject nonfree programs.&lt;/p&gt;
 
-&lt;p&gt;
-<span class="inserted"><ins><em>With Windows Vista, Microsoft admitted it had 
built in a back door:
+<span class="inserted"><ins><em>&lt;p class="inline-block"&gt;
+With Windows Vista, Microsoft admitted it had built in a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
 downgrades.  It can also order all machines running Vista to refuse to
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
 10 is no better&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
-&lt;p&gt;</em></ins></span>
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
+&lt;p&gt;
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the FBI and Microsoft will keep the
 root passwords for your personal computers, and not let you have
@@ -296,7 +374,12 @@
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this &lt;em&gt;restricted
 boot&lt;/em&gt;.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 In 1997, when this story was first published, the SPA was
 threatening small Internet service providers, demanding they permit
@@ -315,7 +398,12 @@
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
 software would be raped in prison.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;/li&gt;
 
+&lt;li&gt;
+&lt;div class="reduced-width"&gt;</em></ins></span>
 &lt;p&gt;
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -337,12 +425,15 @@
 &lt;p&gt;
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 &lt;/li&gt;
 &lt;/ul&gt;
+<span class="inserted"><ins><em>&lt;div 
class="column-limit"&gt;&lt;/div&gt;</em></ins></span>
 &lt;/div&gt;
 
 &lt;h3 id="BadNews"&gt;Bad News&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;
 The battle for the right to read is <span class="removed"><del><strong>already 
in progress,</strong></del></span> <span class="inserted"><ins><em>going 
against us so far.</em></ins></span>
 The enemy is organized, <span 
class="removed"><del><strong>while</strong></del></span> <span 
class="inserted"><ins><em>and</em></ins></span> we are <span 
class="removed"><del><strong>not, so it is going against 
us.</strong></del></span> <span class="inserted"><ins><em>not.</em></ins></span>
@@ -367,10 +458,14 @@
 &lt;li&gt;&lt;p&gt;It has DRM, which is intended to block users from
 sharing copies.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;It has a back door with which Amazon can remotely erase any 
book.
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;It</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;li&gt;&lt;p 
class="inline-block"&gt;It</em></ins></span> has a back door with which Amazon 
can remotely erase any book.
 In 2009, it erased thousands of copies of 1984, by George 
Orwell.&lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;In case all that isn't Orwellian enough, there is a 
universal
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;li&gt;&lt;p 
class="inline-block"&gt;In</em></ins></span> case all that isn't Orwellian 
enough, there is a universal
 back door with which Amazon can remotely change the software, and
 introduce any other form of nastiness.&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -389,10 +484,11 @@
 FSF's &lt;a href="http://defectivebydesign.org"&gt; Defective by 
Design&lt;/a&gt;
 campaign <span class="removed"><del><strong>has made a start; subscribe to the 
campaign's mailing
 list</strong></del></span> to lend a hand.  <span 
class="removed"><del><strong>And</strong></del></span>  <span 
class="inserted"><ins><em>You
-can</em></ins></span> &lt;a href="http://www.fsf.org/associate"&gt;join the 
FSF&lt;/a&gt; to <span class="removed"><del><strong>help 
fund</strong></del></span> <span class="inserted"><ins><em>support
-our work more generally.  There is also a &lt;a href="/help/help.html"&gt;list 
of ways
-to participate in</em></ins></span> our <span 
class="removed"><del><strong>work.</strong></del></span> <span 
class="inserted"><ins><em>work&lt;/a&gt;.</em></ins></span>
+can</em></ins></span> &lt;a href="http://www.fsf.org/associate"&gt;join the 
FSF&lt;/a&gt; to <span class="removed"><del><strong>help 
fund</strong></del></span> <span 
class="inserted"><ins><em>support</em></ins></span>
+our <span class="removed"><del><strong>work.</strong></del></span> <span 
class="inserted"><ins><em>work more generally.  There is also a &lt;a 
href="/help/help.html"&gt;list of ways
+to participate in our work&lt;/a&gt;.</em></ins></span>
 &lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
 &lt;h3 id="References"&gt;References&lt;/h3&gt;
 
@@ -418,13 +514,15 @@
        reverse the overextension of copyright and patent powers.&lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;hr /&gt;
+<span class="removed"><del><strong>&lt;hr /&gt;
 &lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
 in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
 Software, Free Society: The Selected Essays of Richard
 M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;
 
-&lt;h5&gt;Other Texts to Read&lt;/h5&gt;
+&lt;h5&gt;Other</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h4&gt;Other</em></ins></span> Texts to 
<span class="removed"><del><strong>Read&lt;/h5&gt;</strong></del></span> <span 
class="inserted"><ins><em>Read&lt;/h4&gt;</em></ins></span>
 
 &lt;ul&gt;
        &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
@@ -433,6 +531,13 @@
                id="copy-protection"&gt;Copy Protection: Just Say No&lt;/a&gt;,
                published in Computer World.&lt;/li&gt;
 &lt;/ul&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;hr class="thin" /&gt;
+&lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
+in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
+Software, Free Society: The Selected Essays of Richard
+M. 
Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;</em></ins></span>
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
@@ -491,7 +596,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/10/31 22:57:29 $
+$Date: 2016/11/06 21:28:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/right-to-read.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.uk.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- po/right-to-read.uk.po      18 Oct 2016 16:29:51 -0000      1.41
+++ po/right-to-read.uk.po      6 Nov 2016 21:28:15 -0000       1.42
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
-"POT-Creation-Date: 2016-10-18 16:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-08-04 07:51+0200\n"
 "Last-Translator: Andriy Bandura <address@hidden>\n"
 "Language-Team: Ukrainian <>\n"
@@ -41,7 +41,7 @@
 "<em>Ця стаття появилася в лютневому випуску 
за 1997 рік <cite>Communications "
 "of the ACM</cite> (том 40, № 2).</em>"
 
-#. type: Content of: <blockquote><p>
+#. type: Content of: <div><blockquote><p>
 msgid ""
 "From <cite>The Road To Tycho</cite>, a collection of articles about the "
 "antecedents of the Lunarian Revolution, published in Luna City in 2096."
@@ -49,7 +49,7 @@
 "З <cite>Дороги до Тихо</cite>, збірки статей про 
події, що передували "
 "Місячній революції, опублікованій в 
Луна-Сіті в 2096&nbsp;році."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For Dan Halbert, the road to Tycho began in college&mdash;when Lissa Lenz "
 "asked to borrow his computer.  Hers had broken down, and unless she could "
@@ -61,7 +61,7 @@
 "вона не змогла знайти інший, вона завалила 
б свою курсову роботу. Вона не "
 "наважувалася просити нікого, крім Дана. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This put Dan in a dilemma.  He had to help her&mdash;but if he lent her his "
 "computer, she might read his books.  Aside from the fact that you could go "
@@ -77,7 +77,7 @@
 "спершу шокувала його. Як і усі інші, з 
початкової школи він був привчений, "
 "що обмінюватися книгами огидно і 
неправильно - так чинять лише пірати. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "And there wasn't much chance that the SPA&mdash;the Software Protection "
 "Authority&mdash;would fail to catch him.  In his software class, Dan had "
@@ -98,7 +98,7 @@
 "отримав би найсуворіше покарання&nbsp;&nbsp; 
за те, що не потурбувався "
 "запобігти злочину."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, Lissa did not necessarily intend to read his books.  She might "
 "want the computer only to write her midterm.  But Dan knew she came from a "
@@ -121,7 +121,7 @@
 "якщо на них будуть часто посилатися, 
принесуть достатньо грошей, щоб "
 "повернути борг.) "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later on, Dan would learn there was a time when anyone could go to the "
 "library and read journal articles, and even books, without having to pay.  "
@@ -138,7 +138,7 @@
 "2047&nbsp;році публічні бібліотеки з вільним 
доступом до наукової літератури "
 "стали невиразним спогадом. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "There were ways, of course, to get around the SPA and Central Licensing.  "
 "They were themselves illegal.  Dan had had a classmate in software, Frank "
@@ -157,7 +157,7 @@
 "У 2047&nbsp;році Френк сидів у в'язниці&nbsp;&mdash; 
не через піратське "
 "читання, а через володіння зневадником."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan would later learn that there was a time when anyone could have debugging "
 "tools.  There were even free debugging tools available on CD or downloadable "
@@ -173,7 +173,7 @@
 "це стало їхнім основним застосуванням у 
реальній практиці. Це означало, що "
 "вони незаконні; усіх, хто розробляв 
зневадники, відправили у в'язницю."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Programmers still needed debugging tools, of course, but debugger vendors in "
 "2047 distributed numbered copies only, and only to officially licensed and "
@@ -187,7 +187,7 @@
 "спеціальному середовищі, тому ним можна 
булокористуватися тільки для "
 "навчальних вправ."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It was also possible to bypass the copyright monitors by installing a "
 "modified system kernel.  Dan would eventually find out about the free "
@@ -205,7 +205,7 @@
 "комп'ютера. А його ти не дізнався б ні від 
ФБР, ні від служби "
 "підтримкиMicrosoft."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan concluded that he couldn't simply lend Lissa his computer.  But he "
 "couldn't refuse to help her, because he loved her.  Every chance to speak "
@@ -217,7 +217,7 @@
 "коли він говорив з нею, він переповнювався 
почуттями. А позаяк вона "
 "попросила про допомогу саме його, це могло 
означати, що й вона його любить. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Dan resolved the dilemma by doing something even more unthinkable&mdash;he "
 "lent her the computer, and told her his password.  This way, if Lissa read "
@@ -231,7 +231,7 @@
 "не дізнався б про це автоматично. Вони 
довідалися б тільки у випадку  доносу "
 "Лізи на нього."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Of course, if the school ever found out that he had given Lissa his own "
 "password, it would be curtains for both of them as students, regardless of "
@@ -251,7 +251,7 @@
 "перевірку твоєї поведінки. Вони вважали 
це ознакою того, що ти робив якісь "
 "інші заборонені дії, і їх не дуже цікавило, 
які саме. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Students were not usually expelled for this&mdash;not directly.  Instead "
 "they were banned from the school computer systems, and would inevitably fail "
@@ -261,7 +261,7 @@
 "за це. Замість цього їм закривали доступ 
до обчислювальних систем училища, а "
 "без цього було неможливо продовжувати 
будь-які заняття. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Later, Dan would learn that this kind of university policy started only in "
 "the 1980s, when university students in large numbers began using computers.  "
@@ -275,7 +275,7 @@
 "дисципліни студентів по-іншому: вони 
карали за те, що було шкідливо, а не за "
 "те, що просто викликало підозри. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Lissa did not report Dan to the SPA.  His decision to help her led to their "
 "marriage, and also led them to question what they had been taught about "
@@ -295,7 +295,7 @@
 "2062&nbsp;році почалося повстання в Тихо, 
всезагальне право читати швидко "
 "стало однією з його основних цілей."
 
-#. type: Content of: <div><blockquote><p>
+#. type: Content of: <div><div><blockquote><p>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://defectivebydesign.org/ebooks.html\";>Join our mailing "
@@ -307,11 +307,11 @@
 "<a href=\"http://defectivebydesign.org/ebooks.html\";>Приєднуйтесь 
до нашого "
 "списку розсилки про небезпеки електронних
 книг</a>."
 
-#. type: Content of: <div><h3>
+#. type: Content of: <div><div><h3>
 msgid "Author's Notes"
 msgstr "Зауваження автора"
 
-#. type: Content of: <div><ul><li>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -327,7 +327,7 @@
 "розвинути думку, щоб це виглядало ще 
жорсткіше. Див. &ldquo;<a href=\"/"
 "philosophy/words-to-avoid.html#Piracy\">піратство</a>&rdquo;."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Computer-enforced restrictions on lending or reading books (and other kinds "
 "of published works) are known as DRM, short for &ldquo;Digital Restrictions "
@@ -342,20 +342,20 @@
 "забезпечення організував кампанію <a 
href=\"http://DefectiveByDesign.org";
 "\">Дефект гарантований</a>. Ми просимо вас 
про підтримку."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The Electronic Frontier Foundation, a separate organization not related to "
 "the Free Software Foundation, also campaigns against DRM."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><blockquote><p>
 msgid ""
 "The following note has been updated several times since the first "
 "publication of the story."
 msgstr ""
 "Ця примітка оновлювалася кілька разів з 
часу першої публікації оповідання."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The battle for the right to read is already being fought.  Although it may "
 "take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -377,7 +377,7 @@
 "також інших робіт). Європейський союз 
наклав подібні обмеження в директиві "
 "2001&nbsp;року про авторське право."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The US campaigns to impose such rules on the rest of the world through so-"
 "called &ldquo;free trade&rdquo; treaties.  <a href=\"https://stallman.org/";
@@ -396,7 +396,7 @@
 "злочинні, представляє тільки одне з 
несправедливих правил, які ці договори "
 "нав'язують у багатьох сферах діяльності."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "The US has imposed DMCA requirements on Australia, Panama, Colombia and "
@@ -427,7 +427,7 @@
 "проводиться наостанок тими, хто не 
пройшов на наступний термін після виборів "
 "2016&nbsp;року."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Even the World Wide Web Consortium has fallen under the shadow of the "
 "copyright industry; it is on the verge of approving a DRM system as an "
@@ -437,7 +437,7 @@
 "авторського права; він рухається до сх
валення системи цифрового керування "
 "обмеженнями як офіційної частини 
специфікацій Всесвітньої павутини."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "Nonfree software tends to have <a href=\"/proprietary/\">abusive features "
@@ -458,7 +458,7 @@
 "ніколи не можна довіряти</a>. Ми 
наполягаємо виключно на вільних програмах 
і "
 "відкидаємо невільні."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 #, fuzzy
 #| msgid ""
 #| "With Windows Vista, Microsoft admitted it had built in a back door: "
@@ -483,7 +483,7 @@
 "затискала користувачів головним чином 
для того, щоб нав'язати цифрове "
 "керування обмеженнями, з якими 
користувачі не зможуть впоратися."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "One of the ideas in the story was not proposed in reality until 2002.  This "
 "is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -493,7 +493,7 @@
 "про те, що ФБР і Microsoft будуть зберігати 
паролі системного адміністратора "
 "ваших персональних комп'ютерів і не 
допустять, щоб вони були у вас."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The proponents of this scheme gave early versions names such as &ldquo;"
 "trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as ultimately put "
@@ -504,7 +504,7 @@
 "стали застосовувати на практиці, 
називається &ldquo;безпечним "
 "завантаженням&rdquo;."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "What Microsoft keeps is not exactly a password in the traditional sense; no "
 "person ever types it on a terminal.  Rather, it is a signature and "
@@ -525,7 +525,7 @@
 "просять: вона вже <a 
href=\"/proprietary/malware-microsoft.html\">показує "
 "НАБ недоліки в захисті Windows</a>, щоб 
агентство їх експлуатувало."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "Secure boot can be implemented in a way that permits the user to specify the "
 "signature key and decide what software to sign.  In practice, PCs designed "
@@ -540,7 +540,7 @@
 "операційну систему (таку як GNU/Linux), 
визначає Microsoft. Ми називаємо це "
 "<em>обмеженим завантаженням</em>."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "In 1997, when this story was first published, the SPA was threatening small "
 "Internet service providers, demanding they permit the SPA to monitor all "
@@ -557,7 +557,7 @@
 "відмовився  виконати вимогу, і на нього 
подали в суд. Згодом SPA відмовилася "
 "від переслідування, але отримала DMCA, який 
надав бажану для них владу."
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The SPA, which actually stands for Software Publishers Association, has been "
 "replaced in its police-like role by the Business Software Alliance.  The BSA "
@@ -576,7 +576,7 @@
 "році, висувалися злегка прикриті загрози 
насильства над людьми, які "
 "обмінювалися програмами. "
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "The university security policies described above are not imaginary.  For "
 "example, a computer at one Chicago-area university displayed this message "
@@ -586,7 +586,7 @@
 "комп'ютер одного з університетів в районі 
Чикаго демонстрував при вході в "
 "систему таке повідомлення: "
 
-#. type: Content of: <div><ul><li><blockquote><p>
+#. type: Content of: <div><div><ul><li><div><blockquote><p>
 msgid ""
 "This system is for the use of authorized users only.  Individuals using this "
 "computer system without authority or in the excess of their authority are "
@@ -612,7 +612,7 @@
 "спостереження як свідчення керівництву 
Університету та/або посадовим особам, "
 "в обов'язки яких входить охорона 
правопорядку. "
 
-#. type: Content of: <div><ul><li><p>
+#. type: Content of: <div><div><ul><li><div><p>
 msgid ""
 "This is an interesting approach to the Fourth Amendment: pressure most "
 "everyone to agree, in advance, to waive their rights under it."
@@ -621,11 +621,11 @@
 "вони заздалегідь погоджувалися 
відмовитися від своїх прав, які надаються "
 "цією поправкою. "
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Bad News"
 msgstr "Погані новини"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The battle for the right to read is already in progress, The enemy is "
@@ -637,7 +637,7 @@
 "Битва за право прочитати вже триває. Ворог 
організований, а ми&nbsp;&nbsp; "
 "ні, тому в цьому ми слабші. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "Today's commercial ebooks <a href=\"/philosophy/the-danger-of-ebooks.html"
@@ -665,7 +665,7 @@
 "href=\"/proprietary/malware-kindle-swindle.html\">орвелівських 
рис</a>. "
 "Кожної з них досить, щоби повністю 
відмовитися від цього продукту:"
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It spies on everything the user does: it reports which book the user is "
 "reading, and which page, and it reports when the user highlights text, and "
@@ -675,13 +675,13 @@
 "сторінку читає користувач, доповідає, 
коли користувач підкреслює текст і "
 "повідомляє всі нотатки, які вводить 
користувач."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid "It has DRM, which is intended to block users from sharing copies."
 msgstr ""
 "У ньому є цифрове керування обмеженнями, 
призначене для того, щоб не дати "
 "користувачам обмінюватися копіями."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "It has a back door with which Amazon can remotely erase any book.  In 2009, "
 "it erased thousands of copies of 1984, by George Orwell."
@@ -690,7 +690,7 @@
 "мережі. У&nbsp;2009&nbsp;році компанія стерла 
тисячі копій <cite>1984</cite> "
 "Джорджа Орвела."
 
-#. type: Content of: <ul><li><p>
+#. type: Content of: <div><div><ul><li><p>
 msgid ""
 "In case all that isn't Orwellian enough, there is a universal back door with "
 "which Amazon can remotely change the software, and introduce any other form "
@@ -700,7 +700,7 @@
 "допомогою якої Amazon може змінювати 
програми по мережі, вводячи яку "
 "завгодно гидоту."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "Amazon's e-book distribution is oppressive, too.  It identifies the user "
@@ -727,7 +727,7 @@
 "обмінюватися копіями; однак щоб бути 
цілком чистими, нам насамперед не слід "
 "погоджуватися на таке."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "If we want to stop the bad news and create some good news, we need to "
@@ -750,11 +750,11 @@
 "І <a href=\"http://www.fsf.org/associate\";>приєднуйтесь до 
ФВПЗ</a>, щоб "
 "допомогти нашій роботі."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "References"
 msgstr "Посилання"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "The administration's &ldquo;White Paper&rdquo;: Information Infrastructure "
 "Task Force, Intellectual Property [<a href=\"/philosophy/not-ipr.html\">sic</"
@@ -766,7 +766,7 @@
 "\">так</a>] і національна інформаційна 
інфраструктура: звіт Робочої групи з "
 "прав інтелектуальної власності [так] 
(1995&nbsp;рік)."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.wired.com/wired/archive/4.01/white.paper_pr.html\";>An "
 "explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, "
@@ -776,7 +776,7 @@
 "\">Пояснення до Білої книги: Клешня 
авторського права</a>. Памела "
 "Самуельсон, &ldquo;Уайеред&rdquo;, січень 1996."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Sold Out</a>, "
 "James Boyle, New York Times, 31 March 1996"
@@ -784,7 +784,7 @@
 "<a href=\"http://www.law.duke.edu/boylesite/sold_out.htm\";>Р
озпродано</a>."
 "Джеймс Бойль, &ldquo;Нью-Йорк таймс&rdquo; 
31&nbsp;березня 1996&nbsp;року."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://web.archive.org/web/20130508120533/http://www.interesting-";
 "people.org/archives/interesting-people/199611/msg00012.html\">Public Data or "
@@ -795,7 +795,7 @@
 "та особисті дані</a>. &ldquo;Вашингтон 
пост&rdquo;, 4&nbsp;листопада "
 "1996&nbsp;року."
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"http://www.public-domain.org/\";>Union for the Public Domain</"
@@ -810,26 +810,16 @@
 "&mdash; організація, метою якої є запобігання 
та скасуваннянадмірного "
 "посилення авторського права і патентів."
 
-#. type: Content of: <blockquote><p>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>."
-msgstr ""
-"Цей нарис опублікований у збірнику <a 
href=\"http://shop.fsf.org/product/";
-"free-software-free-society/\"><cite>Вільні програми, 
вільне суспільство: "
-"вибрані нариси Річарда М. Столмена</cite></a>"
-
-#. type: Content of: <h5>
+#. type: Content of: <div><h4>
 msgid "Other Texts to Read"
 msgstr "Інші тексти по темі"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"/philosophy/philosophy.html\">Philosophy of the GNU Project</a>"
 msgstr "<a href=\"/philosophy/philosophy.html\">Філософія 
проекту GNU</a>"
 
-#. type: Content of: <ul><li>
+#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"http://www.computerworld.com/article/2596679/networking/copy-";
 "protection--just-say-no.html\" id=\"copy-protection\">Copy Protection: Just "
@@ -840,6 +830,16 @@
 "просто скажіть &ldquo;ні&rdquo;</a>, опубліковано 
в &ldquo;Computer "
 "World&rdquo;."
 
+#. type: Content of: <blockquote><p>
+msgid ""
+"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
+"software-free-society/\"><cite>Free Software, Free Society: The Selected "
+"Essays of Richard M. Stallman</cite></a>."
+msgstr ""
+"Цей нарис опублікований у збірнику <a 
href=\"http://shop.fsf.org/product/";
+"free-software-free-society/\"><cite>Вільні програми, 
вільне суспільство: "
+"вибрані нариси Річарда М. Столмена</cite></a>"
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/surveillance-vs-democracy.es-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.es-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- po/surveillance-vs-democracy.es-en.html     2 Nov 2016 12:57:37 -0000       
1.28
+++ po/surveillance-vs-democracy.es-en.html     6 Nov 2016 21:28:15 -0000       
1.29
@@ -2,19 +2,31 @@
 <!-- Parent-Version: 1.77 -->
 <title>How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+--></style>
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
 
-<p>by <a href="http://www.stallman.org/";>Richard Stallman</a></p>
+<p class="byline center">by <a href="http://www.stallman.org/";>Richard 
Stallman</a></p>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
-<blockquote><p>A version of this article was first published in Wired
+<blockquote class="center"><p>A version of this article was first published in 
Wired
 in October 2013.</p></blockquote>
 
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /></a>
 <p>&ldquo;How did they find out I'm a dog?&rdquo;</p>
@@ -30,7 +42,8 @@
 is not exceeded?  It is the level beyond which surveillance starts to
 interfere with the functioning of democracy, in that whistleblowers
 (such as Snowden) are likely to be caught.</p>
-
+</div>
+<div class="columns" style="clear:both">
 <p>Faced with government secrecy, we the people depend on
 whistleblowers
 to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";>tell
@@ -60,9 +73,11 @@
 suffice to protect whistleblowers if &ldquo;catching the
 whistleblower&rdquo; is grounds for access sufficient to identify him
 or her.  We need to go further.</p>
+</div>
 
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a 
Democracy</h3>
 
+<div class="columns">
 <p>If whistleblowers don't dare reveal crimes and lies, we lose the
 last shred of effective control over our government and institutions.
 That's why surveillance that enables the state to find out who has
@@ -91,9 +106,11 @@
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.</p>
+</div>
 
-<h3>Information, Once Collected, Will Be Misused</h3>
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
 
+<div  class="columns">
 <p>When people recognize that the level of general surveillance is too
 high, the first response is to propose limits on access to the
 accumulated data.  That sounds nice, but it won't fix the problem, not
@@ -140,9 +157,11 @@
 launch a massive fishing expedition against any person.  To make
 journalism and democracy safe, we must limit the accumulation of data
 that is easily accessible to the state.</p>
+</div>
 
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
 
+<div class="columns">
 <p>The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to <a
 href="https://en.necessaryandproportionate.org/text";>prevent the
@@ -170,9 +189,11 @@
 regime would have to implement surveillance afresh, and it would only
 collect data starting at that date.  As for suspending or momentarily
 ignoring this law, the idea would hardly make sense.</p>
+</div>
 
-<h3>First, Don't Be Foolish</h3>
+<h3 class="subheader">First, Don't Be Foolish</h3>
 
+<div class="columns">
 <p>To have privacy, you must not throw it away: the first one who has
 to protect your privacy is you.  Avoid identifying yourself to web
 sites, contact them with Tor, and use browsers that block the schemes
@@ -213,9 +234,11 @@
 movements, but not all of them.  Clearly, the better solution is to
 make all these systems stop surveilling people other than legitimate
 suspects.</p>
+</div>
 
-<h3>We Must Design Every System for Privacy</h3>
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
 
+<div class="columns">
 <p>If we don't want a total surveillance society, we must consider
 surveillance a kind of social pollution, and limit the surveillance
 impact of each new digital system just as we limit the environmental
@@ -233,9 +256,11 @@
 period.  The same benefit, with no surveillance!</p>
 
 <p>We need to design such privacy into all our digital systems.</p>
+</div>
 
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
 
+<div class="columns">
 <p>One way to make monitoring safe for privacy is
 to <a name="dispersal">keep the data dispersed and inconvenient to
 access</a>.  Old-fashioned security cameras were no threat to privacy(<a 
href="#privatespace">*</a>).
@@ -267,9 +292,11 @@
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.</p>
+</div>
 
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce 
Surveillance</h3>
 
+<div class="columns">
 <p>Most data collection comes from people's own digital activities.
 Usually the data is collected first by companies.  But when it comes
 to the threat to privacy and democracy, it makes no difference whether
@@ -325,9 +352,11 @@
 customers' credit card details.  An anonymous payment system would end
 this danger: a security hole in the site can't hurt you if the site
 knows nothing about you.</p>
+</div>
 
-<h3>Remedy for Travel Surveillance</h3>
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
 
+<div class="columns">
 <p>We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
 recognize all license plates, and
@@ -382,9 +411,11 @@
 remains &ldquo;out&rdquo; for too long, the station where it was
 borrowed can inform headquarters; in that case, it could send the
 borrower's identity immediately.</p>
+</div>
 
-<h3>Remedy for Communications Dossiers</h3>
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
 
+<div class="columns">
 <p>Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
@@ -422,9 +453,11 @@
 some user of my email service, and my email service would know only
 that I received mail from some user of your email service, but it
 would be hard to determine that you had sent mail to me.</p>
+</div>
 
-<h3>But Some Surveillance Is Necessary</h3>
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
 
+<div class="columns">
 <p>For the state to find criminals, it needs to be able to investigate
 specific crimes, or specific suspected planned crimes, under a court
 order.  With the Internet, the power to tap phone conversations would
@@ -458,9 +491,10 @@
 
 <p>However, journalism must be protected from surveillance even when
 it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
 
-<hr />
-
+<div class="reduced-width">
 <p>Digital technology has brought about a tremendous increase in the
 level of surveillance of our movements, actions, and communications.
 It is far more than we experienced in the 1990s, and <a
@@ -480,6 +514,8 @@
 a grave surveillance deficit, and ought to be surveilled more than the
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -538,7 +574,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/11/02 12:57:37 $
+$Date: 2016/11/06 21:28:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/surveillance-vs-democracy.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.es.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- po/surveillance-vs-democracy.es.po  2 Nov 2016 12:53:40 -0000       1.65
+++ po/surveillance-vs-democracy.es.po  6 Nov 2016 21:28:15 -0000       1.66
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-11-02 13:48+0100\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-11-02 13:12+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -41,11 +41,11 @@
 "Una versión de este artículo se publicó por primera vez en octubre de 
2013, "
 "en Wired."
 
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
 msgid "<a href=\"/graphics/dog.html\">"
 msgstr "<a href=\"/graphics/dog.html\">"
 
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
 msgid ""
 "Cartoon of a dog, wondering at the three ads that popped up on his computer "
 "screen..."
@@ -54,15 +54,15 @@
 "pantalla de su ordenador..."
 
 # type: Content of: <div><p>
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
 msgid "</a>"
 msgstr "</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "«¿Cómo habrán descubierto que soy un perro?»"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Thanks to Edward Snowden's disclosures, we know that the current level of "
 "general surveillance in society is incompatible with human rights.  The "
@@ -84,7 +84,7 @@
 "interferir con el funcionamiento de la democracia, cuando existe la "
 "posibilidad de que los denunciantes (como Snowden) sean atrapados."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Faced with government secrecy, we the people depend on whistleblowers to <a "
 "href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";>tell us what "
@@ -101,7 +101,7 @@
 "debemos reducir la vigilancia hasta el punto en que los denunciantes sepan "
 "que no corren peligro."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -131,7 +131,7 @@
 "\"http://www.wired.com/opinion/2013/10/149481/\";>eso no protegerá nuestra "
 "privacidad una vez que pongamos los pies en Internet</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
@@ -149,11 +149,11 @@
 "al denunciante» es una justificación para acceder a los datos necesarios "
 "para identificarlo. Tenemos que ir más allá."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "The Upper Limit on Surveillance in a Democracy"
 msgstr "El límite máximo de la vigilancia en una democracia"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
 "of effective control over our government and institutions.  That's why "
@@ -166,7 +166,7 @@
 "quién se ha comunicado con un reportero es demasiada vigilancia, una "
 "vigilancia que la democracia no puede soportar."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
 "the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
@@ -197,7 +197,7 @@
 "marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
 "verizon-2013-06-07\">otras empresas</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
@@ -217,12 +217,12 @@
 "que la vigilancia es excesiva se alcanza cuando el Estado puede averiguar "
 "quién se comunicó con un periodista o un disidente conocidos."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Information, Once Collected, Will Be Misused"
 msgstr ""
 "Una vez que se haya obtenido la información, será usada incorrectamente"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
@@ -246,7 +246,7 @@
 "que el denunciante haya sido acusado de «espionaje», la búsqueda del 
«espía» "
 "servirá de excusa para obtener el acceso al material recopilado."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
 "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
@@ -278,7 +278,7 @@
 "aumentado con los <a href=\"https://theyarewatching.org/issues/risks-";
 "increase-once-data-shared\">nuevos sistemas digitales</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -297,7 +297,7 @@
 "wikipedia.org/wiki/Campos_de_concentración_en_los_Estados_Unidos\">Estados "
 "Unidos de América</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Personal data collected by the state is also likely to be obtained by "
 "outside crackers that break the security of the servers, even by <a href="
@@ -311,7 +311,7 @@
 "articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first."
 "shtml\">informáticos al servicio de países enemigos</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
 "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
@@ -322,7 +322,7 @@
 "government-is-blamed-for-wiretapping-scandal.html\">subvertir directamente "
 "la democracia</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Total surveillance accessible to the state enables the state to launch a "
 "massive fishing expedition against any person.  To make journalism and "
@@ -335,11 +335,11 @@
 "democracia, debemos limitar la acumulación de datos que son de fácil acceso 
"
 "para el Estado."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Robust Protection for Privacy Must Be Technical"
 msgstr "Para que la protección de la privacidad sea robusta, debe ser 
técnica"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The Electronic Frontier Foundation and other organizations propose a set of "
 "legal principles designed to <a href=\"https://en.necessaryandproportionate.";
@@ -357,7 +357,7 @@
 "siempre y cuando se adopten completamente y se apliquen sin excepción para "
 "siempre."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -368,7 +368,7 @@
 "Enmiendas de la FISA), suspendidas o <a href=\"http://www.nytimes.";
 "com/2009/04/16/us/16nsa.html\">ignoradas</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Meanwhile, demagogues will cite the usual excuses as grounds for total "
 "surveillance; any terrorist attack, even one that kills just a handful of "
@@ -379,7 +379,7 @@
 "no mate más que a un puñado de personas, puede magnificarse para servir de "
 "justificación."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If limits on access to the data are set aside, it will be as if they had "
 "never existed: years worth of dossiers would suddenly become available for "
@@ -402,11 +402,11 @@
 "los datos solo a partir de esa fecha. En cuanto a suspender o ignorar "
 "momentáneamente esta ley, la idea apenas tendría sentido."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "First, Don't Be Foolish"
 msgstr "En primer lugar, no sea incauto"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "To have privacy, you must not throw it away: the first one who has to "
 "protect your privacy is you.  Avoid identifying yourself to web sites, "
@@ -421,7 +421,7 @@
 "Privacy Guard</cite> para cifrar los correos electrónicos. Pague con dinero "
 "en efectivo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Keep your own data; don't store your data in a company's &ldquo;"
 "convenient&rdquo; server.  It's safe, however, to entrust a data backup to a "
@@ -435,7 +435,7 @@
 "enviarla al servidor usted cifre todos los datos, incluyendo el nombre de "
 "los archivos, en su propio ordenador y utilizando software libre."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy's sake, you must avoid nonfree software since, as a consequence "
 "of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -454,7 +454,7 @@
 "informáticas, pues esto supone el envío de todos los datos pertinentes al "
 "servidor."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -478,7 +478,7 @@
 "incluso si a usted no le importaría revelar el suyo, pues tales sistemas "
 "presionan a las personas para que renuncien a su privacidad."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Self-protection is essential, but even the most rigorous self-protection is "
 "insufficient to protect your privacy on or from systems that don't belong to "
@@ -498,11 +498,11 @@
 "que todos estos sistemas dejen de vigilar a las personas que no sean "
 "legítimamente sospechosas."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "We Must Design Every System for Privacy"
 msgstr "Debemos diseñar todos los sistemas de modo que respeten la privacidad"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we don't want a total surveillance society, we must consider surveillance "
 "a kind of social pollution, and limit the surveillance impact of each new "
@@ -514,7 +514,7 @@
 "cada nuevo sistema digital podría tener sobre la vigilancia, de la misma "
 "forma en que limitamos el impacto ambiental de las construcciones físicas."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For example: &ldquo;smart&rdquo; meters for electricity are touted for "
 "sending the power company moment-by-moment data about each customer's "
@@ -539,17 +539,17 @@
 "cualquier período de tiempo con el promedio del consumo en ese periodo. La "
 "misma utilidad, ¡sin vigilancia!"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid "We need to design such privacy into all our digital systems."
 msgstr ""
 "Debemos incorporar la privacidad en el diseño de todos nuestros sistemas "
 "digitales."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Collecting Data: Leaving It Dispersed"
 msgstr "Remedio para la recolección de datos: dejarlos dispersos"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
 "the data dispersed and inconvenient to access</a>.  Old-fashioned security "
@@ -570,7 +570,7 @@
 "denunciara algún delito. No sería factible recolectar físicamente millones 
"
 "de cintas cada día y verlas o copiarlas."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Nowadays, security cameras have become surveillance cameras: they are "
 "connected to the Internet so recordings can be collected in a data center "
@@ -587,7 +587,7 @@
 "todo el tiempo en la calle a los periodistas sospechosos para ver con "
 "quiénes hablan."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet-connected cameras often have lousy digital security themselves, "
 "which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-";
@@ -611,7 +611,7 @@
 "ocasionalmente, pero se debe limitar la acumulación sistemática de tales "
 "datos en Internet."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
 "points at the inside of a store, or at the street.  Any camera pointed at "
@@ -623,11 +623,11 @@
 "Toda  cámara dirigida por alguien hacia el espacio privado de otra persona "
 "constituye una violación de la privacidad, pero esa es otra cuestión."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Internet Commerce Surveillance"
 msgstr "Remedio para la vigilancia del comercio en Internet"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Most data collection comes from people's own digital activities.  Usually "
 "the data is collected first by companies.  But when it comes to the threat "
@@ -642,7 +642,7 @@
 "ello se encarga una empresa, porque el Estado puede acceder sistemáticamente 
"
 "a los datos recolectados por las empresas."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -674,7 +674,7 @@
 "compañías hacen ellas mismas un uso inapropiado de esos datos o se lo "
 "facilitan a corredores de datos."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The goal of making journalism and democracy safe therefore requires that we "
 "reduce the data collected about people by any organization, not just by the "
@@ -691,7 +691,7 @@
 "más tiempo del que sea necesario para tratar alguna situación relacionada "
 "con nosotros."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One of the motives for the current level of surveillance of the Internet is "
 "that sites are financed through advertising based on tracking users' "
@@ -710,7 +710,7 @@
 "Todos somos conscientes de que las «políticas de privacidad» son más 
excusas "
 "para violar la privacidad que compromisos para defenderla."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
@@ -734,7 +734,7 @@
 "taler.net/\">GNU Taler</a>. Ahora solo necesitamos acuerdos comerciales "
 "adecuados y que el Estado no los obstruya."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A further threat from sites' collection of personal data is that security "
 "breakers might get in, take it, and misuse it.  This includes customers' "
@@ -748,11 +748,11 @@
 "una falla de seguridad en el sitio no puede hacer daño si el sitio no sabe "
 "nada de nosotros."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Travel Surveillance"
 msgstr "Remedio para la vigilancia en los viajes"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We must convert digital toll collection to anonymous payment (using digital "
 "cash, for instance).  License-plate recognition systems recognize all "
@@ -775,7 +775,7 @@
 "datos a disposición en Internet; el acceso a los datos debe limitarse a la "
 "búsqueda de una lista de números de placa por orden judicial."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a href="
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
@@ -786,7 +786,7 @@
 "technology-and-liberty-racial-justice/victory-federal-court-recognizes"
 "\">imposición de una pena sin juicio previo</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It is acceptable to have a list of people whose person and luggage will be "
 "searched with extra care, and anonymous passengers on domestic flights could "
@@ -802,7 +802,7 @@
 "vuelos a aquellos ciudadanos extranjeros que no tengan permiso para ingresar "
 "al país. Esto debería bastar para cualquier propósito legítimo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Many mass transit systems use some kind of smart cards or RFIDs for "
 "payment.  These systems accumulate personal data: if you once make the "
@@ -820,7 +820,7 @@
 "dos cosas unidas contribuyen a la vigilancia masiva. La recolección de datos 
"
 "debe ser reducida."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Navigation services do surveillance: the user's computer tells the map "
 "service the user's location and where the user wants to go; then the server "
@@ -844,7 +844,7 @@
 "la ruta y mostrarla, sin que el usuario tenga que comunicar a nadie en "
 "ningún momento el lugar donde se encuentra o a donde desea dirigirse."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Systems for borrowing bicycles, etc., can be designed so that the borrower's "
 "identity is known only inside the station where the item was borrowed.  "
@@ -877,11 +877,11 @@
 "informar a la oficina principal, y en ese caso podría también enviar "
 "inmediatamente los datos del prestatario."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Communications Dossiers"
 msgstr "Remedio para los expedientes de comunicaciones"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
@@ -909,7 +909,7 @@
 "sounds-nsa-tracking-your-location\">la NSA recoge los datos sobre la "
 "ubicación de los celulares</a> en masa."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unmonitored communication is impossible where systems create such dossiers.  "
 "So it should be illegal to create or keep them.  ISPs and phone companies "
@@ -922,7 +922,7 @@
 "información por mucho tiempo, a menos que exista una orden judicial para "
 "vigilar a una cierta persona."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
@@ -945,7 +945,7 @@
 "retomara este tipo de vigilancia, no conseguiría los datos sobre todas las "
 "llamadas telefónicas anteriores a esa fecha."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy about who you exchange email with, a simple partial solution is "
 "for you and others to use email services in a country that would never "
@@ -971,11 +971,11 @@
 "servicio, pero sería difícil determinar que usted es el remitente y yo el "
 "destinatario."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "But Some Surveillance Is Necessary"
 msgstr "Pero algo de vigilancia es necesaria"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For the state to find criminals, it needs to be able to investigate specific "
 "crimes, or specific suspected planned crimes, under a court order.  With the "
@@ -995,7 +995,7 @@
 "impedimos que los sistemas digitales acumulen información masiva <i>a "
 "priori</i>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1020,7 +1020,7 @@
 "\">el uso de la fuerza disminuyó en un 60%</a>. La Unión Estadounidense por 
"
 "las Libertades Civiles está a favor de esto."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1044,7 +1044,7 @@
 "accidente nuclear de Fukushima y la crisis fiscal de 2008) supera en mucho "
 "el del terrorismo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, journalism must be protected from surveillance even when it is "
 "carried out as part of a business."
@@ -1052,7 +1052,7 @@
 "De todos modos, el periodismo debe ser protegido de la vigilancia incluso "
 "cuando se lleva a cabo como parte de una actividad empresarial."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Digital technology has brought about a tremendous increase in the level of "
 "surveillance of our movements, actions, and communications.  It is far more "
@@ -1070,7 +1070,7 @@
 "el uso de los datos acumulados por parte del Estado no modificarán la "
 "situación. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Companies are designing even more intrusive surveillance.  Some project that "
 "pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1087,7 +1087,7 @@
 "imprevisibles, pero el peligro para la democracia está fuera de discusión. "
 "Existe y es tangible hoy."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unless we believe that our free countries previously suffered from a grave "
 "surveillance deficit, and ought to be surveilled more than the Soviet Union "

Index: po/surveillance-vs-democracy.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.fr-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/surveillance-vs-democracy.fr-en.html     22 Oct 2016 19:28:26 -0000      
1.31
+++ po/surveillance-vs-democracy.fr-en.html     6 Nov 2016 21:28:15 -0000       
1.32
@@ -2,19 +2,31 @@
 <!-- Parent-Version: 1.77 -->
 <title>How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+--></style>
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
 
-<p>by <a href="http://www.stallman.org/";>Richard Stallman</a></p>
+<p class="byline center">by <a href="http://www.stallman.org/";>Richard 
Stallman</a></p>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
-<blockquote><p>A version of this article was first published in Wired
+<blockquote class="center"><p>A version of this article was first published in 
Wired
 in October 2013.</p></blockquote>
 
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /></a>
 <p>&ldquo;How did they find out I'm a dog?&rdquo;</p>
@@ -30,7 +42,8 @@
 is not exceeded?  It is the level beyond which surveillance starts to
 interfere with the functioning of democracy, in that whistleblowers
 (such as Snowden) are likely to be caught.</p>
-
+</div>
+<div class="columns" style="clear:both">
 <p>Faced with government secrecy, we the people depend on
 whistleblowers
 to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";>tell
@@ -60,9 +73,11 @@
 suffice to protect whistleblowers if &ldquo;catching the
 whistleblower&rdquo; is grounds for access sufficient to identify him
 or her.  We need to go further.</p>
+</div>
 
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a 
Democracy</h3>
 
+<div class="columns">
 <p>If whistleblowers don't dare reveal crimes and lies, we lose the
 last shred of effective control over our government and institutions.
 That's why surveillance that enables the state to find out who has
@@ -91,9 +106,11 @@
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.</p>
+</div>
 
-<h3>Information, Once Collected, Will Be Misused</h3>
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
 
+<div  class="columns">
 <p>When people recognize that the level of general surveillance is too
 high, the first response is to propose limits on access to the
 accumulated data.  That sounds nice, but it won't fix the problem, not
@@ -140,9 +157,11 @@
 launch a massive fishing expedition against any person.  To make
 journalism and democracy safe, we must limit the accumulation of data
 that is easily accessible to the state.</p>
+</div>
 
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
 
+<div class="columns">
 <p>The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to <a
 href="https://en.necessaryandproportionate.org/text";>prevent the
@@ -170,9 +189,11 @@
 regime would have to implement surveillance afresh, and it would only
 collect data starting at that date.  As for suspending or momentarily
 ignoring this law, the idea would hardly make sense.</p>
+</div>
 
-<h3>First, Don't Be Foolish</h3>
+<h3 class="subheader">First, Don't Be Foolish</h3>
 
+<div class="columns">
 <p>To have privacy, you must not throw it away: the first one who has
 to protect your privacy is you.  Avoid identifying yourself to web
 sites, contact them with Tor, and use browsers that block the schemes
@@ -213,9 +234,11 @@
 movements, but not all of them.  Clearly, the better solution is to
 make all these systems stop surveilling people other than legitimate
 suspects.</p>
+</div>
 
-<h3>We Must Design Every System for Privacy</h3>
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
 
+<div class="columns">
 <p>If we don't want a total surveillance society, we must consider
 surveillance a kind of social pollution, and limit the surveillance
 impact of each new digital system just as we limit the environmental
@@ -233,9 +256,11 @@
 period.  The same benefit, with no surveillance!</p>
 
 <p>We need to design such privacy into all our digital systems.</p>
+</div>
 
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
 
+<div class="columns">
 <p>One way to make monitoring safe for privacy is
 to <a name="dispersal">keep the data dispersed and inconvenient to
 access</a>.  Old-fashioned security cameras were no threat to privacy(<a 
href="#privatespace">*</a>).
@@ -267,9 +292,11 @@
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.</p>
+</div>
 
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce 
Surveillance</h3>
 
+<div class="columns">
 <p>Most data collection comes from people's own digital activities.
 Usually the data is collected first by companies.  But when it comes
 to the threat to privacy and democracy, it makes no difference whether
@@ -325,9 +352,11 @@
 customers' credit card details.  An anonymous payment system would end
 this danger: a security hole in the site can't hurt you if the site
 knows nothing about you.</p>
+</div>
 
-<h3>Remedy for Travel Surveillance</h3>
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
 
+<div class="columns">
 <p>We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
 recognize all license plates, and
@@ -382,9 +411,11 @@
 remains &ldquo;out&rdquo; for too long, the station where it was
 borrowed can inform headquarters; in that case, it could send the
 borrower's identity immediately.</p>
+</div>
 
-<h3>Remedy for Communications Dossiers</h3>
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
 
+<div class="columns">
 <p>Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
@@ -422,9 +453,11 @@
 some user of my email service, and my email service would know only
 that I received mail from some user of your email service, but it
 would be hard to determine that you had sent mail to me.</p>
+</div>
 
-<h3>But Some Surveillance Is Necessary</h3>
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
 
+<div class="columns">
 <p>For the state to find criminals, it needs to be able to investigate
 specific crimes, or specific suspected planned crimes, under a court
 order.  With the Internet, the power to tap phone conversations would
@@ -458,9 +491,10 @@
 
 <p>However, journalism must be protected from surveillance even when
 it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
 
-<hr />
-
+<div class="reduced-width">
 <p>Digital technology has brought about a tremendous increase in the
 level of surveillance of our movements, actions, and communications.
 It is far more than we experienced in the 1990s, and <a
@@ -480,6 +514,8 @@
 a grave surveillance deficit, and ought to be surveilled more than the
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -538,7 +574,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/10/22 19:28:26 $
+$Date: 2016/11/06 21:28:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/surveillance-vs-democracy.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.fr.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- po/surveillance-vs-democracy.fr.po  22 Oct 2016 18:56:02 -0000      1.80
+++ po/surveillance-vs-democracy.fr.po  6 Nov 2016 21:28:15 -0000       1.81
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-10-22 20:54+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -40,11 +40,11 @@
 "Une version de cet article a été initialement publiée dans Wired en 
octobre "
 "2013."
 
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
 msgid "<a href=\"/graphics/dog.html\">"
 msgstr "<a href=\"/graphics/dog.html\">"
 
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
 msgid ""
 "Cartoon of a dog, wondering at the three ads that popped up on his computer "
 "screen..."
@@ -52,15 +52,15 @@
 "Dessin d'un chien que trois pop-ups publicitaires sur son écran d'ordinateur 
"
 "rendent perplexe..."
 
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
 msgid "</a>"
 msgstr "</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "« Comment ont-ils découvert que je suis un chien ? »"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Thanks to Edward Snowden's disclosures, we know that the current level of "
 "general surveillance in society is incompatible with human rights.  The "
@@ -83,7 +83,7 @@
 "la démocratie : lorsque des lanceurs d'alerte comme Snowden sont "
 "susceptibles d'être arrêtés."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Faced with government secrecy, we the people depend on whistleblowers to <a "
 "href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";>tell us what "
@@ -101,7 +101,7 @@
 "démocratique sur l'État, nous devons réduire la surveillance jusqu'à un "
 "point où les lanceurs d'alerte se sentent en sécurité."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -130,7 +130,7 @@
 "href=\"http://www.wired.com/opinion/2013/10/149481/\";>cela ne protège pas "
 "notre vie privée dès l'instant où nous mettons les pieds sur Internet</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
@@ -149,11 +149,11 @@
 "un motif valable pour accéder à des données permettant de l'identifier. 
Nous "
 "devons aller plus loin encore."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "The Upper Limit on Surveillance in a Democracy"
 msgstr "Le niveau de surveillance à ne pas dépasser dans une démocratie"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
 "of effective control over our government and institutions.  That's why "
@@ -166,7 +166,7 @@
 "permet à l'État de savoir qui a parlé à un journaliste va trop loin – 
au "
 "delà de ce que peut supporter la démocratie."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
 "the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
@@ -197,7 +197,7 @@
 "verizon-2013-06-07\">aux autres opérateurs</a>, pour tous les relevés "
 "téléphoniques de chaque résident."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
@@ -217,11 +217,11 @@
 "devient trop importante quand l'État peut trouver qui a parlé à une 
personne "
 "connue comme journaliste ou comme opposant."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Information, Once Collected, Will Be Misused"
 msgstr "L'information, une fois collectée, sera utilisée à de mauvaises 
fins"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
@@ -247,7 +247,7 @@
 "« espion » fournira une excuse pour avoir accès à l'ensemble des "
 "informations."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
 "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
@@ -279,7 +279,7 @@
 "s'est amplifiée avec les <a href=\"https://theyarewatching.org/issues/risks-";
 "increase-once-data-shared\"> nouveaux systèmes numériques</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -297,7 +297,7 @@
 "citizens/\">en Europe</a> et <a href=\"https://fr.wikipedia.org/wiki/";
 "Internement_des_Nippo-Am%C3%A9ricains\"> aux États-Unis</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Personal data collected by the state is also likely to be obtained by "
 "outside crackers that break the security of the servers, even by <a href="
@@ -311,7 +311,7 @@
 "\"https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-";
 "revealed-even-worse-than-first.shtml\"> au service d'États hostiles</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
 "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
@@ -322,7 +322,7 @@
 "macedonia-government-is-blamed-for-wiretapping-scandal.html\"> corrompre la "
 "démocratie directement</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Total surveillance accessible to the state enables the state to launch a "
 "massive fishing expedition against any person.  To make journalism and "
@@ -335,11 +335,11 @@
 "devons limiter l'accumulation des données qui sont facilement accessibles à 
"
 "l'État."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Robust Protection for Privacy Must Be Technical"
 msgstr "Une protection solide de la vie privée doit être technique"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The Electronic Frontier Foundation and other organizations propose a set of "
 "legal principles designed to <a href=\"https://en.necessaryandproportionate.";
@@ -359,7 +359,7 @@
 "intégralité et qu'on les faisait respecter sans la moindre exception, à 
tout "
 "jamais."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -370,7 +370,7 @@
 "dite <cite>FISA Amendments Act</cite>), suspendus ou <a href=\"http://www.";
 "nytimes.com/2009/04/16/us/16nsa.html\">ignorés</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Meanwhile, demagogues will cite the usual excuses as grounds for total "
 "surveillance; any terrorist attack, even one that kills just a handful of "
@@ -381,7 +381,7 @@
 "attaque faisant un nombre réduit de victimes, peut être montée en épingle 
"
 "pour leur en donner l'opportunité."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If limits on access to the data are set aside, it will be as if they had "
 "never existed: years worth of dossiers would suddenly become available for "
@@ -404,11 +404,11 @@
 "données à partir de ce moment-là seulement. Quant à suspendre cette loi 
ou "
 "ne pas l'appliquer momentanément, cela n'aurait presque aucun sens."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "First, Don't Be Foolish"
 msgstr "En premier lieu, ne soyez pas imprudent"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "To have privacy, you must not throw it away: the first one who has to "
 "protect your privacy is you.  Avoid identifying yourself to web sites, "
@@ -424,7 +424,7 @@
 "abbr> (le gardien de la vie privée) pour chiffrer le contenu de vos "
 "courriels. Payez en liquide."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Keep your own data; don't store your data in a company's &ldquo;"
 "convenient&rdquo; server.  It's safe, however, to entrust a data backup to a "
@@ -438,7 +438,7 @@
 "envoyer au serveur vous les chiffriez avec un logiciel libre sur votre "
 "propre ordinateur (y compris les noms de fichiers)."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy's sake, you must avoid nonfree software since, as a consequence "
 "of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -455,7 +455,7 @@
 "a> : outre que cela donne à d'autres la maîtrise de votre informatique, 
cela "
 "vous oblige à fournir toutes les données pertinentes au serveur."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -479,7 +479,7 @@
 "vôtre, car cela pousserait d'autres personnes à abandonner leurs droits à "
 "une vie privée."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Self-protection is essential, but even the most rigorous self-protection is "
 "insufficient to protect your privacy on or from systems that don't belong to "
@@ -499,11 +499,11 @@
 "meilleure solution est d'obliger ces systèmes à cesser de surveiller les "
 "gens qui sont pas légitimement suspects."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "We Must Design Every System for Privacy"
 msgstr "Nous devons intégrer à chaque système le respect de la vie privée"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we don't want a total surveillance society, we must consider surveillance "
 "a kind of social pollution, and limit the surveillance impact of each new "
@@ -516,7 +516,7 @@
 "la même manière que nous limitons l'impact des objets manufacturés sur "
 "l'environnement."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For example: &ldquo;smart&rdquo; meters for electricity are touted for "
 "sending the power company moment-by-moment data about each customer's "
@@ -540,17 +540,17 @@
 "consommation moyenne de ses voisins au cours de la période de son choix. "
 "Mêmes avantages, sans la surveillance !"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid "We need to design such privacy into all our digital systems."
 msgstr ""
 "Il nous faut intégrer le respect de la vie privée à tous nos systèmes "
 "numériques, dès leur conception."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Collecting Data: Leaving It Dispersed"
 msgstr "Remède à la collecte de données : les garder dispersées"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
 "the data dispersed and inconvenient to access</a>.  Old-fashioned security "
@@ -572,7 +572,7 @@
 "aurait été impossible de rassembler physiquement des millions de bandes par 
"
 "jour, puis de les visionner ou de les copier."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Nowadays, security cameras have become surveillance cameras: they are "
 "connected to the Internet so recordings can be collected in a data center "
@@ -589,7 +589,7 @@
 "être pas loin où les journalistes « suspects » pourront être pistés 
sans "
 "interruption dans la rue afin de surveiller qui sont leurs interlocuteurs."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet-connected cameras often have lousy digital security themselves, "
 "which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-";
@@ -613,7 +613,7 @@
 "photos et des enregistrements vidéo une fois de temps en temps, mais on doit 
"
 "limiter l'accumulation systématique de ces données."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
 "points at the inside of a store, or at the street.  Any camera pointed at "
@@ -625,11 +625,11 @@
 "caméra pointée par quelqu'un vers l'espace privé de quelqu'un d'autre 
viole "
 "sa vie privée, mais c'est une autre question."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Internet Commerce Surveillance"
 msgstr "Remède à la surveillance du commerce sur Internet"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Most data collection comes from people's own digital activities.  Usually "
 "the data is collected first by companies.  But when it comes to the threat "
@@ -645,7 +645,7 @@
 "rassemblées par les entreprises sont systématiquement mises à la 
disposition "
 "de l'État."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -677,7 +677,7 @@
 "plus, beaucoup de ces entreprises en font elle-mêmes mauvais usage, ou bien "
 "les fournissent à des courtiers en données."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The goal of making journalism and democracy safe therefore requires that we "
 "reduce the data collected about people by any organization, not just by the "
@@ -695,7 +695,7 @@
 "garder que pour une période dépassant de peu le strict minimum nécessaire 
au "
 "traitement de ces transactions."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One of the motives for the current level of surveillance of the Internet is "
 "that sites are financed through advertising based on tracking users' "
@@ -715,7 +715,7 @@
 "« politiques relatives à la vie privée » sont davantage un prétexte 
pour "
 "violer celle-ci qu'un engagement à la respecter."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
@@ -740,7 +740,7 @@
 "Taler</a>. Tout ce dont nous avons besoin maintenant, ce sont d'accords "
 "commerciaux adaptés et que l'État n'y fasse pas obstruction."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A further threat from sites' collection of personal data is that security "
 "breakers might get in, take it, and misuse it.  This includes customers' "
@@ -754,11 +754,11 @@
 "faille de sécurité du site ne peut pas vous nuire si le site ne sait rien 
de "
 "vous."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Travel Surveillance"
 msgstr "Remède à la surveillance des déplacements"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We must convert digital toll collection to anonymous payment (using digital "
 "cash, for instance).  License-plate recognition systems recognize all "
@@ -782,7 +782,7 @@
 "Internet ; l'accès aux données doit être limité à la recherche d'une 
série "
 "de plaques minéralogiques faisant l'objet d'une décision de justice."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a href="
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
@@ -792,7 +792,7 @@
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
 "justice/victory-federal-court-recognizes\">punishment without trial</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It is acceptable to have a list of people whose person and luggage will be "
 "searched with extra care, and anonymous passengers on domestic flights could "
@@ -809,7 +809,7 @@
 "des États-Unis si elles n'ont pas la permission d'y rentrer. Cela devrait "
 "suffire à toutes les fins légitimes."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Many mass transit systems use some kind of smart cards or RFIDs for "
 "payment.  These systems accumulate personal data: if you once make the "
@@ -826,7 +826,7 @@
 "L'un dans l'autre, cela équivaut à un système de surveillance à grande "
 "échelle. Il faut diminuer cette collecte de données."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Navigation services do surveillance: the user's computer tells the map "
 "service the user's location and where the user wants to go; then the server "
@@ -850,7 +850,7 @@
 "calculer l'itinéraire et l'afficher, sans jamais dire à qui que ce soit "
 "l'endroit où l'utilisateur veut aller."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Systems for borrowing bicycles, etc., can be designed so that the borrower's "
 "identity is known only inside the station where the item was borrowed.  "
@@ -881,11 +881,11 @@
 "informer le siège social et, dans ce cas, lui envoyer immédiatement "
 "l'identité du client."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Communications Dossiers"
 msgstr "Remède aux dossiers sur les communications"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
@@ -913,7 +913,7 @@
 "sounds-nsa-tracking-your-location\">la NSA collecte les coordonnées "
 "géographiques des téléphones mobiles</a>, en masse."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unmonitored communication is impossible where systems create such dossiers.  "
 "So it should be illegal to create or keep them.  ISPs and phone companies "
@@ -927,7 +927,7 @@
 "longtemps, sauf décision judiciaire leur enjoignant de surveiller une "
 "personne ou un groupe en particulier."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
@@ -950,7 +950,7 @@
 "effectivement à faire cette sorte de surveillance, il n'obtiendrait pas les "
 "données sur les appels téléphoniques passés avant cette date."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy about who you exchange email with, a simple partial solution is "
 "for you and others to use email services in a country that would never "
@@ -975,11 +975,11 @@
 "de courriel, mais il serait difficile de déterminer que c'était moi le "
 "destinataire."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "But Some Surveillance Is Necessary"
 msgstr "Mais un minimum de surveillance est nécessaire."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For the state to find criminals, it needs to be able to investigate specific "
 "crimes, or specific suspected planned crimes, under a court order.  With the "
@@ -999,7 +999,7 @@
 "après les faits, si (comme je le recommande) nous empêchons les systèmes "
 "numériques d'accumuler d'énormes dossiers avant les faits."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1026,7 +1026,7 @@
 "kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">l'usage de la "
 "force diminuer de près de 60 %</a>. L'ACLU y est favorable."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1050,7 +1050,7 @@
 "nucléaires de Fukushima ou à la crise financière de 2008) dépasse de loin 
"
 "celui du terrorisme."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, journalism must be protected from surveillance even when it is "
 "carried out as part of a business."
@@ -1058,7 +1058,7 @@
 "Cependant, le journalisme doit être protégé contre la surveillance, même "
 "s'il est réalisé dans un cadre commercial."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Digital technology has brought about a tremendous increase in the level of "
 "surveillance of our movements, actions, and communications.  It is far more "
@@ -1076,7 +1076,7 @@
 "l'utilisation par l'État des données accumulées, telles qu'elles sont "
 "proposées, qui y changeraient quoi que ce soit."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Companies are designing even more intrusive surveillance.  Some project that "
 "pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1094,7 +1094,7 @@
 "n'est pas du domaine de la spéculation. Il existe bien et il est visible "
 "aujourd'hui."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unless we believe that our free countries previously suffered from a grave "
 "surveillance deficit, and ought to be surveilled more than the Soviet Union "

Index: po/surveillance-vs-democracy.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/surveillance-vs-democracy.it-en.html     27 Oct 2016 20:58:40 -0000      
1.24
+++ po/surveillance-vs-democracy.it-en.html     6 Nov 2016 21:28:15 -0000       
1.25
@@ -2,19 +2,31 @@
 <!-- Parent-Version: 1.77 -->
 <title>How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+--></style>
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
 
-<p>by <a href="http://www.stallman.org/";>Richard Stallman</a></p>
+<p class="byline center">by <a href="http://www.stallman.org/";>Richard 
Stallman</a></p>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
-<blockquote><p>A version of this article was first published in Wired
+<blockquote class="center"><p>A version of this article was first published in 
Wired
 in October 2013.</p></blockquote>
 
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /></a>
 <p>&ldquo;How did they find out I'm a dog?&rdquo;</p>
@@ -30,7 +42,8 @@
 is not exceeded?  It is the level beyond which surveillance starts to
 interfere with the functioning of democracy, in that whistleblowers
 (such as Snowden) are likely to be caught.</p>
-
+</div>
+<div class="columns" style="clear:both">
 <p>Faced with government secrecy, we the people depend on
 whistleblowers
 to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";>tell
@@ -60,9 +73,11 @@
 suffice to protect whistleblowers if &ldquo;catching the
 whistleblower&rdquo; is grounds for access sufficient to identify him
 or her.  We need to go further.</p>
+</div>
 
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a 
Democracy</h3>
 
+<div class="columns">
 <p>If whistleblowers don't dare reveal crimes and lies, we lose the
 last shred of effective control over our government and institutions.
 That's why surveillance that enables the state to find out who has
@@ -91,9 +106,11 @@
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.</p>
+</div>
 
-<h3>Information, Once Collected, Will Be Misused</h3>
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
 
+<div  class="columns">
 <p>When people recognize that the level of general surveillance is too
 high, the first response is to propose limits on access to the
 accumulated data.  That sounds nice, but it won't fix the problem, not
@@ -140,9 +157,11 @@
 launch a massive fishing expedition against any person.  To make
 journalism and democracy safe, we must limit the accumulation of data
 that is easily accessible to the state.</p>
+</div>
 
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
 
+<div class="columns">
 <p>The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to <a
 href="https://en.necessaryandproportionate.org/text";>prevent the
@@ -170,9 +189,11 @@
 regime would have to implement surveillance afresh, and it would only
 collect data starting at that date.  As for suspending or momentarily
 ignoring this law, the idea would hardly make sense.</p>
+</div>
 
-<h3>First, Don't Be Foolish</h3>
+<h3 class="subheader">First, Don't Be Foolish</h3>
 
+<div class="columns">
 <p>To have privacy, you must not throw it away: the first one who has
 to protect your privacy is you.  Avoid identifying yourself to web
 sites, contact them with Tor, and use browsers that block the schemes
@@ -213,9 +234,11 @@
 movements, but not all of them.  Clearly, the better solution is to
 make all these systems stop surveilling people other than legitimate
 suspects.</p>
+</div>
 
-<h3>We Must Design Every System for Privacy</h3>
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
 
+<div class="columns">
 <p>If we don't want a total surveillance society, we must consider
 surveillance a kind of social pollution, and limit the surveillance
 impact of each new digital system just as we limit the environmental
@@ -233,9 +256,11 @@
 period.  The same benefit, with no surveillance!</p>
 
 <p>We need to design such privacy into all our digital systems.</p>
+</div>
 
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
 
+<div class="columns">
 <p>One way to make monitoring safe for privacy is
 to <a name="dispersal">keep the data dispersed and inconvenient to
 access</a>.  Old-fashioned security cameras were no threat to privacy(<a 
href="#privatespace">*</a>).
@@ -267,9 +292,11 @@
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.</p>
+</div>
 
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce 
Surveillance</h3>
 
+<div class="columns">
 <p>Most data collection comes from people's own digital activities.
 Usually the data is collected first by companies.  But when it comes
 to the threat to privacy and democracy, it makes no difference whether
@@ -325,9 +352,11 @@
 customers' credit card details.  An anonymous payment system would end
 this danger: a security hole in the site can't hurt you if the site
 knows nothing about you.</p>
+</div>
 
-<h3>Remedy for Travel Surveillance</h3>
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
 
+<div class="columns">
 <p>We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
 recognize all license plates, and
@@ -382,9 +411,11 @@
 remains &ldquo;out&rdquo; for too long, the station where it was
 borrowed can inform headquarters; in that case, it could send the
 borrower's identity immediately.</p>
+</div>
 
-<h3>Remedy for Communications Dossiers</h3>
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
 
+<div class="columns">
 <p>Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
@@ -422,9 +453,11 @@
 some user of my email service, and my email service would know only
 that I received mail from some user of your email service, but it
 would be hard to determine that you had sent mail to me.</p>
+</div>
 
-<h3>But Some Surveillance Is Necessary</h3>
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
 
+<div class="columns">
 <p>For the state to find criminals, it needs to be able to investigate
 specific crimes, or specific suspected planned crimes, under a court
 order.  With the Internet, the power to tap phone conversations would
@@ -458,9 +491,10 @@
 
 <p>However, journalism must be protected from surveillance even when
 it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
 
-<hr />
-
+<div class="reduced-width">
 <p>Digital technology has brought about a tremendous increase in the
 level of surveillance of our movements, actions, and communications.
 It is far more than we experienced in the 1990s, and <a
@@ -480,6 +514,8 @@
 a grave surveillance deficit, and ought to be surveilled more than the
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -538,7 +574,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/10/27 20:58:40 $
+$Date: 2016/11/06 21:28:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/surveillance-vs-democracy.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- po/surveillance-vs-democracy.it.po  27 Oct 2016 20:58:40 -0000      1.80
+++ po/surveillance-vs-democracy.it.po  6 Nov 2016 21:28:15 -0000       1.81
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-10-27 22:24+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian\n"
@@ -39,11 +39,11 @@
 "La prima versione di questo articolo è stata pubblicata su Wired nel mese di 
"
 "ottobre 2013."
 
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
 msgid "<a href=\"/graphics/dog.html\">"
 msgstr "<a href=\"/graphics/dog.html\">"
 
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
 msgid ""
 "Cartoon of a dog, wondering at the three ads that popped up on his computer "
 "screen..."
@@ -52,15 +52,15 @@
 "pubblicitari sul suo monitor..."
 
 # type: Content of: <table><tr><td>
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
 msgid "</a>"
 msgstr "</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "&ldquo;Come fanno a sapere che sono un cane?&rdquo;"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Thanks to Edward Snowden's disclosures, we know that the current level of "
 "general surveillance in society is incompatible with human rights.  The "
@@ -81,7 +81,7 @@
 "accade quando la sorveglianza interferisce con il funzionamento della "
 "democrazia: quando gli informatori (come Snowden) possono essere scoperti."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Faced with government secrecy, we the people depend on whistleblowers to <a "
 "href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";>tell us what "
@@ -97,7 +97,7 @@
 "democratico sullo stato, dobbiamo ridurre la sorveglianza fino a un punto in "
 "cui tutti gli informatori sappiano che non possono essere scoperti."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -125,7 +125,7 @@
 "opinion/2013/10/149481/\">non è in grado di proteggere la nostra privacy</a> 
"
 "quando mettiamo piede su Internet."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
@@ -142,11 +142,11 @@
 "nostri dossier virtuali. Ciò non basterà a proteggere gli informatori se "
 "“beccarli” è motivo sufficiente a identificarli. Dobbiamo spingerci 
oltre."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "The Upper Limit on Surveillance in a Democracy"
 msgstr "Il limite massimo di sorveglianza in una democrazia"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
 "of effective control over our government and institutions.  That's why "
@@ -159,7 +159,7 @@
 "scoprire chi ha parlato con un giornalista è eccessiva; più di quanto sia "
 "ammissibile in democrazia."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
 "the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
@@ -188,7 +188,7 @@
 "\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-";
 "verizon-2013-06-07\"> agli altri gestori</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
@@ -206,11 +206,11 @@
 "cui la sorveglianza diventa eccessiva è quello in cui lo stato può scoprire 
"
 "chi ha parlato con un certo giornalista o dissidente noto."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Information, Once Collected, Will Be Misused"
 msgstr "Una volta raccolte, le informazioni saranno usate in modi impropri"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
@@ -232,7 +232,7 @@
 "l’accesso ai dati, per cui se un informatore viene accusato di 
“spionaggio”, "
 "localizzare la “spia” fornirà la scusa per accedere ai materiali 
accumulati."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
 "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
@@ -263,7 +263,7 @@
 "più comune con <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">i nuovi sistemi digitali</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -281,7 +281,7 @@
 "\"https://en.wikipedia.org/wiki/Japanese_American_internment\";> negli Stati "
 "Uniti</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Personal data collected by the state is also likely to be obtained by "
 "outside crackers that break the security of the servers, even by <a href="
@@ -294,7 +294,7 @@
 "\"https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-";
 "revealed-even-worse-than-first.shtml\">lavorano per potenze nemiche</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
 "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
@@ -304,7 +304,7 @@
 "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">sovvertire la democrazia</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Total surveillance accessible to the state enables the state to launch a "
 "massive fishing expedition against any person.  To make journalism and "
@@ -316,11 +316,11 @@
 "il giornalismo e la democrazia, dobbiamo limitare l’accumulazione di dati "
 "facilmente accessibili allo stato."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Robust Protection for Privacy Must Be Technical"
 msgstr "Una forte tutela della privacy dev’essere tecnica"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The Electronic Frontier Foundation and other organizations propose a set of "
 "legal principles designed to <a href=\"https://en.necessaryandproportionate.";
@@ -337,7 +337,7 @@
 "difenderebbero adeguatamente le libertà democratiche, se venissero adottati "
 "completamente e fatti rispettare senza eccezioni per sempre."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -348,7 +348,7 @@
 "sospese o <a href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";> "
 "ignorate</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Meanwhile, demagogues will cite the usual excuses as grounds for total "
 "surveillance; any terrorist attack, even one that kills just a handful of "
@@ -358,7 +358,7 @@
 "sorveglianza totale; qualsiasi attacco terroristico, persino se uccide solo "
 "poche persone, può essere strumentalizzato a questo fine."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If limits on access to the data are set aside, it will be as if they had "
 "never existed: years worth of dossiers would suddenly become available for "
@@ -380,11 +380,11 @@
 "da quel momento. Quanto a sospendere o ignorare temporaneamente questa "
 "legge, l’idea sarebbe priva di senso."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "First, Don't Be Foolish"
 msgstr "Primo, non essere sciocchi"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "To have privacy, you must not throw it away: the first one who has to "
 "protect your privacy is you.  Avoid identifying yourself to web sites, "
@@ -399,7 +399,7 @@
 "Inoltre è bene usare GNU Privacy Guard per cifrare il contenuto dei propri "
 "messaggi e pagare sempre in contanti."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Keep your own data; don't store your data in a company's &ldquo;"
 "convenient&rdquo; server.  It's safe, however, to entrust a data backup to a "
@@ -413,7 +413,7 @@
 "archivio, nomi di file compresi, sia criptato con software libero sul vostro "
 "computer prima dell'upload."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy's sake, you must avoid nonfree software since, as a consequence "
 "of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -430,7 +430,7 @@
 "a>; oltre a dare il controllo delle vostre operazioni informatiche ad altri, "
 "vi costringe a consegnare ad un server tutti i relativi dati."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -453,7 +453,7 @@
 "anche se questo non costituisce un problema per l'individuo in sè, mette "
 "pressione agli altri affinché cedano la propria privacy."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Self-protection is essential, but even the most rigorous self-protection is "
 "insufficient to protect your privacy on or from systems that don't belong to "
@@ -471,11 +471,11 @@
 "la migliore soluzione sarebbe che tutti questi sistemi smettessero di "
 "sorvegliare persone non sospette."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "We Must Design Every System for Privacy"
 msgstr "Dobbiamo progettare tutti i sistemi tenendo a mente la privacy"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we don't want a total surveillance society, we must consider surveillance "
 "a kind of social pollution, and limit the surveillance impact of each new "
@@ -487,7 +487,7 @@
 "ogni nuovo sistema digitale proprio come limitiamo l’impatto ambientale "
 "delle costruzioni fisiche."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For example: &ldquo;smart&rdquo; meters for electricity are touted for "
 "sending the power company moment-by-moment data about each customer's "
@@ -511,17 +511,17 @@
 "l’andamento medio dei consumi di quel periodo. Stessi vantaggi, nessuna "
 "sorveglianza!"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid "We need to design such privacy into all our digital systems."
 msgstr ""
 "Dobbiamo incorporare la privacy in questo modo in tutti i nostri sistemi "
 "digitali."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Collecting Data: Leaving It Dispersed"
 msgstr "Un rimedio alla raccolta dei dati: lasciarli dispersi"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
 "the data dispersed and inconvenient to access</a>.  Old-fashioned security "
@@ -542,7 +542,7 @@
 "fattibile raccogliere fisicamente milioni di nastri ogni giorno e guardarli "
 "o copiarli tutti."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Nowadays, security cameras have become surveillance cameras: they are "
 "connected to the Internet so recordings can be collected in a data center "
@@ -559,7 +559,7 @@
 "sospetti vengano seguiti per le strade costantemente per scoprire con chi "
 "parlano."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet-connected cameras often have lousy digital security themselves, "
 "which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-";
@@ -581,7 +581,7 @@
 "liberi di pubblicare foto e video ogni tanto, ma l’accumulazione 
sistematica "
 "di tali dati su Internet dev’essere limitata."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
 "points at the inside of a store, or at the street.  Any camera pointed at "
@@ -593,11 +593,11 @@
 "verso la strada. Qualsiasi telecamera puntata da qualcuno verso lo spazio "
 "privato di qualcun altro viola la privacy, ma questa è un'altra questione."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Internet Commerce Surveillance"
 msgstr "Un rimedio alla sorveglianza dell’e-commerce"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Most data collection comes from people's own digital activities.  Usually "
 "the data is collected first by companies.  But when it comes to the threat "
@@ -612,7 +612,7 @@
 "un’impresa, perché i dati raccolti dalle società sono sistematicamente a "
 "disposizione dello stato."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -642,7 +642,7 @@
 "Tra l'altro, molte di quelle aziende fanno cattivo uso dei dati, "
 "direttamente o tramite trafficanti di dati."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The goal of making journalism and democracy safe therefore requires that we "
 "reduce the data collected about people by any organization, not just by the "
@@ -658,7 +658,7 @@
 "nostre transazioni, non devono poterle conservare più del breve tempo "
 "strettamente necessario a interagire con noi."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One of the motives for the current level of surveillance of the Internet is "
 "that sites are financed through advertising based on tracking users' "
@@ -677,7 +677,7 @@
 "le “politiche sulla privacy” sono più una scusa per violare la privacy 
che "
 "un impegno a rispettarla."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
@@ -701,7 +701,7 @@
 "si chiama <a href=\"http://taler.net/\";>GNU Taler</a>. Ora ci occorrono solo "
 "dei modelli di business adatti, che non vengano intralciati dallo stato."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A further threat from sites' collection of personal data is that security "
 "breakers might get in, take it, and misuse it.  This includes customers' "
@@ -714,11 +714,11 @@
 "di pagamenti anonimi porrebbe fine a questo rischio: una falla di sicurezza "
 "in un sito non può danneggiarvi se il sito non sa niente di voi."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Travel Surveillance"
 msgstr "Un rimedio alla sorveglianza dei trasporti"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We must convert digital toll collection to anonymous payment (using digital "
 "cash, for instance).  License-plate recognition systems recognize all "
@@ -742,7 +742,7 @@
 "andrebbe limitato alle ricerche di numeri di targa soggetti a ordini del "
 "tribunale."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a href="
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
@@ -752,7 +752,7 @@
 "href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-";
 "racial-justice/victory-federal-court-recognizes\"> pena senza processo</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It is acceptable to have a list of people whose person and luggage will be "
 "searched with extra care, and anonymous passengers on domestic flights could "
@@ -768,7 +768,7 @@
 "paese, d’imbarcarsi sui voli che hanno il paese come destinazione. Questo "
 "dovrebbe essere sufficiente per tutti gli scopi legittimi."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Many mass transit systems use some kind of smart cards or RFIDs for "
 "payment.  These systems accumulate personal data: if you once make the "
@@ -784,7 +784,7 @@
 "associati a ogni carta. Tutto ciò si somma fino a costituire una "
 "sorveglianza imponente. Questa raccolta di dati dev’essere ridotta."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Navigation services do surveillance: the user's computer tells the map "
 "service the user's location and where the user wants to go; then the server "
@@ -807,7 +807,7 @@
 "precedenza), calcolare il percorso e visualizzarlo, senza mai dire a nessuno "
 "dove si trova l’utente e dove vuole andare."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Systems for borrowing bicycles, etc., can be designed so that the borrower's "
 "identity is known only inside the station where the item was borrowed.  "
@@ -839,11 +839,11 @@
 "prestito può informare la sede centrale; in quel caso potrebbe inviare "
 "immediatamente l’identità dell’utente."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Communications Dossiers"
 msgstr "Un rimedio ai dossier sulle comunicazioni"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
@@ -870,7 +870,7 @@
 "nsa-tracking-your-location\">raccolga in massa i dati</a> di localizzazione "
 "dei telefoni cellulari."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unmonitored communication is impossible where systems create such dossiers.  "
 "So it should be illegal to create or keep them.  ISPs and phone companies "
@@ -883,7 +883,7 @@
 "concesso mantenere queste informazioni per lunghi periodi, in assenza di un "
 "mandato del tribunale a sorvegliare un dato soggetto."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
@@ -906,7 +906,7 @@
 "genere di sorveglianza, non raccoglierebbe dati su tutte le conversazioni "
 "telefoniche anteriori a quel periodo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy about who you exchange email with, a simple partial solution is "
 "for you and others to use email services in a country that would never "
@@ -929,11 +929,11 @@
 "B, ma sarebbe difficile per chi intercetta capire che le persone A e B si "
 "sono scambiate messaggi."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "But Some Surveillance Is Necessary"
 msgstr "Ma una certa dose di sorveglianza è necessaria"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For the state to find criminals, it needs to be able to investigate specific "
 "crimes, or specific suspected planned crimes, under a court order.  With the "
@@ -952,7 +952,7 @@
 "informatori dopo il fatto, se (come consigliamo) evitiamo che i sistemi "
 "digitali accumulino immensi dossier prima del fatto."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -977,7 +977,7 @@
 "com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">diminuito "
 "del 60%</a>). L’ACLU è favorevole a questo provvedimento."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -999,7 +999,7 @@
 "pensi al disastro di British Petroleum, all’incidente di Fukushima e alla "
 "crisi fiscale del 2008) è infinitamente maggiore di quello del terrorismo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, journalism must be protected from surveillance even when it is "
 "carried out as part of a business."
@@ -1007,7 +1007,7 @@
 "Il giornalismo, però, dev’essere protetto dalla sorveglianza anche quando 
è "
 "condotto nell’ambito di un’impresa."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Digital technology has brought about a tremendous increase in the level of "
 "surveillance of our movements, actions, and communications.  It is far more "
@@ -1024,7 +1024,7 @@
 "Ferro</a> negli anni Ottanta, e le suggerite limitazioni legali all’uso dei 
"
 "dati accumulati da parte dello stato non cambierebbero la situazione."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Companies are designing even more intrusive surveillance.  Some project that "
 "pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1041,7 +1041,7 @@
 "ma la minaccia alla democrazia non è speculazione: esiste ed è visibile già
 "
 "oggi."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unless we believe that our free countries previously suffered from a grave "
 "surveillance deficit, and ought to be surveilled more than the Soviet Union "

Index: po/surveillance-vs-democracy.ja-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ja-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/surveillance-vs-democracy.ja-en.html     31 Oct 2016 04:28:15 -0000      
1.9
+++ po/surveillance-vs-democracy.ja-en.html     6 Nov 2016 21:28:15 -0000       
1.10
@@ -2,19 +2,31 @@
 <!-- Parent-Version: 1.77 -->
 <title>How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+--></style>
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
 
-<p>by <a href="http://www.stallman.org/";>Richard Stallman</a></p>
+<p class="byline center">by <a href="http://www.stallman.org/";>Richard 
Stallman</a></p>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
-<blockquote><p>A version of this article was first published in Wired
+<blockquote class="center"><p>A version of this article was first published in 
Wired
 in October 2013.</p></blockquote>
 
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /></a>
 <p>&ldquo;How did they find out I'm a dog?&rdquo;</p>
@@ -30,7 +42,8 @@
 is not exceeded?  It is the level beyond which surveillance starts to
 interfere with the functioning of democracy, in that whistleblowers
 (such as Snowden) are likely to be caught.</p>
-
+</div>
+<div class="columns" style="clear:both">
 <p>Faced with government secrecy, we the people depend on
 whistleblowers
 to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";>tell
@@ -60,9 +73,11 @@
 suffice to protect whistleblowers if &ldquo;catching the
 whistleblower&rdquo; is grounds for access sufficient to identify him
 or her.  We need to go further.</p>
+</div>
 
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a 
Democracy</h3>
 
+<div class="columns">
 <p>If whistleblowers don't dare reveal crimes and lies, we lose the
 last shred of effective control over our government and institutions.
 That's why surveillance that enables the state to find out who has
@@ -91,9 +106,11 @@
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.</p>
+</div>
 
-<h3>Information, Once Collected, Will Be Misused</h3>
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
 
+<div  class="columns">
 <p>When people recognize that the level of general surveillance is too
 high, the first response is to propose limits on access to the
 accumulated data.  That sounds nice, but it won't fix the problem, not
@@ -140,9 +157,11 @@
 launch a massive fishing expedition against any person.  To make
 journalism and democracy safe, we must limit the accumulation of data
 that is easily accessible to the state.</p>
+</div>
 
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
 
+<div class="columns">
 <p>The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to <a
 href="https://en.necessaryandproportionate.org/text";>prevent the
@@ -170,9 +189,11 @@
 regime would have to implement surveillance afresh, and it would only
 collect data starting at that date.  As for suspending or momentarily
 ignoring this law, the idea would hardly make sense.</p>
+</div>
 
-<h3>First, Don't Be Foolish</h3>
+<h3 class="subheader">First, Don't Be Foolish</h3>
 
+<div class="columns">
 <p>To have privacy, you must not throw it away: the first one who has
 to protect your privacy is you.  Avoid identifying yourself to web
 sites, contact them with Tor, and use browsers that block the schemes
@@ -213,9 +234,11 @@
 movements, but not all of them.  Clearly, the better solution is to
 make all these systems stop surveilling people other than legitimate
 suspects.</p>
+</div>
 
-<h3>We Must Design Every System for Privacy</h3>
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
 
+<div class="columns">
 <p>If we don't want a total surveillance society, we must consider
 surveillance a kind of social pollution, and limit the surveillance
 impact of each new digital system just as we limit the environmental
@@ -233,9 +256,11 @@
 period.  The same benefit, with no surveillance!</p>
 
 <p>We need to design such privacy into all our digital systems.</p>
+</div>
 
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
 
+<div class="columns">
 <p>One way to make monitoring safe for privacy is
 to <a name="dispersal">keep the data dispersed and inconvenient to
 access</a>.  Old-fashioned security cameras were no threat to privacy(<a 
href="#privatespace">*</a>).
@@ -267,9 +292,11 @@
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.</p>
+</div>
 
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce 
Surveillance</h3>
 
+<div class="columns">
 <p>Most data collection comes from people's own digital activities.
 Usually the data is collected first by companies.  But when it comes
 to the threat to privacy and democracy, it makes no difference whether
@@ -325,9 +352,11 @@
 customers' credit card details.  An anonymous payment system would end
 this danger: a security hole in the site can't hurt you if the site
 knows nothing about you.</p>
+</div>
 
-<h3>Remedy for Travel Surveillance</h3>
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
 
+<div class="columns">
 <p>We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
 recognize all license plates, and
@@ -382,9 +411,11 @@
 remains &ldquo;out&rdquo; for too long, the station where it was
 borrowed can inform headquarters; in that case, it could send the
 borrower's identity immediately.</p>
+</div>
 
-<h3>Remedy for Communications Dossiers</h3>
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
 
+<div class="columns">
 <p>Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
@@ -422,9 +453,11 @@
 some user of my email service, and my email service would know only
 that I received mail from some user of your email service, but it
 would be hard to determine that you had sent mail to me.</p>
+</div>
 
-<h3>But Some Surveillance Is Necessary</h3>
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
 
+<div class="columns">
 <p>For the state to find criminals, it needs to be able to investigate
 specific crimes, or specific suspected planned crimes, under a court
 order.  With the Internet, the power to tap phone conversations would
@@ -458,9 +491,10 @@
 
 <p>However, journalism must be protected from surveillance even when
 it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
 
-<hr />
-
+<div class="reduced-width">
 <p>Digital technology has brought about a tremendous increase in the
 level of surveillance of our movements, actions, and communications.
 It is far more than we experienced in the 1990s, and <a
@@ -480,6 +514,8 @@
 a grave surveillance deficit, and ought to be surveilled more than the
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -538,7 +574,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/10/31 04:28:15 $
+$Date: 2016/11/06 21:28:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/surveillance-vs-democracy.ja.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ja.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/surveillance-vs-democracy.ja.po  31 Oct 2016 04:28:15 -0000      1.35
+++ po/surveillance-vs-democracy.ja.po  6 Nov 2016 21:28:15 -0000       1.36
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-08-29 13:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -35,25 +35,25 @@
 msgid "A version of this article was first published in Wired in October 2013."
 msgstr 
"この小論の版は最初にWiredで013年10月に発表されました。"
 
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
 msgid "<a href=\"/graphics/dog.html\">"
 msgstr "<a href=\"/graphics/dog.html\">"
 
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
 msgid ""
 "Cartoon of a dog, wondering at the three ads that popped up on his computer "
 "screen..."
 msgstr 
"コンピュータの画面に現れた三つの広告を訝る犬の漫画..."
 
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
 msgid "</a>"
 msgstr "</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "「どうやって、わたしが犬だとわかったんだろう?」"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Thanks to Edward Snowden's disclosures, we know that the current level of "
 "general surveillance in society is incompatible with human rights.  The "
@@ -74,7 +74,7 @@
 
"それは民主主義の機能と干渉し始める監視のレベルを越えたもので、(スノーデンのよ"
 "うな)告発者が捕まってしまうようなものでしょう。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Faced with government secrecy, we the people depend on whistleblowers to <a "
 "href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";>tell us what "
@@ -89,7 +89,7 @@
 
"監視が程度を越えていることを意味します。国に対する民主的な制御を回復するに"
 "は、告発者が自分が安全だ
とわかる点まで監視を削減しなければなりません。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -118,7 +118,7 @@
 
"opinion/2013/10/149481/\">ひとたび、インターネットに足を踏みå…
¥ã‚Œã‚Œã°ã€ãã‚Œ(だ"
 
"け)ではわたしたちのプライバシーを守れないでしょう</a>。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
@@ -135,11 +135,11 @@
 "て、告発者を同定するのに充
分なアクセスが許されるとすれば、この法案は告発者を"
 "守るのに充分ではないでしょう。もっと先に行く必
要があります。"
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "The Upper Limit on Surveillance in a Democracy"
 msgstr "民主主義における監視の上限"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
 "of effective control over our government and institutions.  That's why "
@@ -151,7 +151,7 @@
 
"すことを可能とするような監視はやりすぎで、民主主義が耐え得る度を越しているの"
 "です。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
 "the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
@@ -180,7 +180,7 @@
 
"の会社からも</a>実効的に収集していることを、スノーデンはわたしたちに示したの"
 "です。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
@@ -198,11 +198,11 @@
 
"られているジャーナリストや知られている反体制派と話した人を探し出せるという点"
 "です。"
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Information, Once Collected, Will Be Misused"
 msgstr "情報は一度集積されれば悪用される"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
@@ -223,7 +223,7 @@
 "者
が「スパイ活動」と訴えられれば、「スパイ」を探すという言い訳で、集積された"
 "データへのアクセスすることになるでしょう。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
 "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
@@ -253,7 +253,7 @@
 "risks-increase-once-data-shared\">新しいディジタル・システム
</a>に拡張されて"
 "います。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -270,7 +270,7 @@
 "citizens/\">ヨーロッパ</a>と<a href=\"https://en.wikipedia.org/wiki/";
 
"Japanese_American_internment\">合衆国</a>からの例で示されるように。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Personal data collected by the state is also likely to be obtained by "
 "outside crackers that break the security of the servers, even by <a href="
@@ -283,7 +283,7 @@
 "articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first."
 
"shtml\">敵対的な国のために働いているクラッカー</a>かも知れません。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
 "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
@@ -293,7 +293,7 @@
 "com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-"
 
"scandal.html\">民主主義を直接転覆させる</a>ことができます。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Total surveillance accessible to the state enables the state to launch a "
 "massive fishing expedition against any person.  To make journalism and "
@@ -304,11 +304,11 @@
 "始めることを可能とします。ジャーナリズム
と民主主義を安全にするためには、国に"
 
"よって簡単にアクセス可能なデータの集積を制限をしなければなりません。"
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Robust Protection for Privacy Must Be Technical"
 msgstr "プライバシの堅
牢な保護は技術的でなければならない"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The Electronic Frontier Foundation and other organizations propose a set of "
 "legal principles designed to <a href=\"https://en.necessaryandproportionate.";
@@ -323,7 +323,7 @@
 
"のとして含みます。ですから、結果として、民主主義の自由を保護するにå
……分となる"
 "でしょう。もし、完全に採択され、例外なしに永久
に実施されるのであれば。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -333,7 +333,7 @@
 "諜å 
±æ´»å‹•èª¿æŸ»æ³•ä¿®æ­£æ³•ã«è¦‹ã‚‰ã‚Œã‚‹ã‚ˆã†ã«)、停止、あるいは<a 
href=\"http://www.";
 "nytimes.com/2009/04/16/us/16nsa.html\">無視される</a>のです。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Meanwhile, demagogues will cite the usual excuses as grounds for total "
 "surveillance; any terrorist attack, even one that kills just a handful of "
@@ -343,7 +343,7 @@
 "でしょう。テロリストの攻撃、たった数人の人々
を殺すものでさえ、そのいいわけに"
 "機会を与える誇大宣伝となるでしょう。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If limits on access to the data are set aside, it will be as if they had "
 "never existed: years worth of dossiers would suddenly become available for "
@@ -364,11 +364,11 @@
 "データを集積するだ
けです。この法律を停止したり一時的に無視するに関する限り、"
 "この考えは意味を持つとは言い難いものでしょう。"
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "First, Don't Be Foolish"
 msgstr "まず、バカなことはおやめなさい"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "To have privacy, you must not throw it away: the first one who has to "
 "protect your privacy is you.  Avoid identifying yourself to web sites, "
@@ -382,7 +382,7 @@
 
"しょう。GNUプライバシ・ガードを使って、メールの中身を暗号化しましょう。現金で"
 "買い物をしましょう。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Keep your own data; don't store your data in a company's &ldquo;"
 "convenient&rdquo; server.  It's safe, however, to entrust a data backup to a "
@@ -395,7 +395,7 @@
 "アーカイブし、アーカイブå…
¨ä½“を暗号化するのであれば、商用サービスへのデータの"
 "バックアップを信用するのは、しかしながら、安å…
¨ã§ã—ょう。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy's sake, you must avoid nonfree software since, as a consequence "
 "of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -412,7 +412,7 @@
 
"サービス</a>を避けましょう。すべての関連するデータをサーバに譲り渡すことをそ"
 "れは要求するのです。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -434,7 +434,7 @@
 "としても、そのシステムはほかの人々
にかれらのプライバシを諦める圧力となります"
 "から。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Self-protection is essential, but even the most rigorous self-protection is "
 "insufficient to protect your privacy on or from systems that don't belong to "
@@ -451,11 +451,11 @@
 "できません。明らかに、すべてのこういったシステム
を(妥当な容疑がある場合以外"
 "は)人々
を監視しないように停止するのがもっともよい解決策です。"
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "We Must Design Every System for Privacy"
 msgstr "プライバシのためにすべてのシステム
を設計しなければならない"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we don't want a total surveillance society, we must consider surveillance "
 "a kind of social pollution, and limit the surveillance impact of each new "
@@ -466,7 +466,7 @@
 "そして、それぞれの新しいディジタルシステム
の監視の影響を限定しなくてはなりま"
 
"せん。ちょうど、建築物の環境への影響を限定するように。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For example: &ldquo;smart&rdquo; meters for electricity are touted for "
 "sending the power company moment-by-moment data about each customer's "
@@ -486,17 +486,17 @@
 "き、メータに送信できます。個々
の顧客は任意の指定された期間で自分の使用を平均"
 
"使用のパターンと比較できます。同じ利便性を監視なしでできるのです!"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid "We need to design such privacy into all our digital systems."
 msgstr ""
 "すべてのわたしたちのディジタル・システム
で、このようなプライバシを設計する必"
 "要があります。"
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Collecting Data: Leaving It Dispersed"
 msgstr "データの集積に対する対策: 
まき散らしたままにする"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
 "the data dispersed and inconvenient to access</a>.  Old-fashioned security "
@@ -515,7 +515,7 @@
 "て通報された場所だ
けでアクセスされました。毎日数百万本のテープを物理的に集積"
 "し、視聴したりコピーすることは不可能でした。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Nowadays, security cameras have become surveillance cameras: they are "
 "connected to the Internet so recordings can be collected in a data center "
@@ -530,7 +530,7 @@
 
"が街で常時追跡され、誰と話したかを見られるという日が来ることをもたらすでしょ"
 "う。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet-connected cameras often have lousy digital security themselves, "
 "which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-";
@@ -552,7 +552,7 @@
 
"像を自由に投稿できるべきですが、インターネットにおけるそのようなデータのシス"
 "テマチックな集積は制限されなくてはなりません。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
 "points at the inside of a store, or at the street.  Any camera pointed at "
@@ -564,11 +564,11 @@
 
"ほかの誰かによって向けられているどんなカメラもプライバシを侵害しますが、これ"
 "は別の問題です。"
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Internet Commerce Surveillance"
 msgstr "インターネット・コマースの監視の対策"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Most data collection comes from people's own digital activities.  Usually "
 "the data is collected first by companies.  But when it comes to the threat "
@@ -582,7 +582,7 @@
 
"がありません。なぜなら、会社によって集積されたデータはシステマチックに国に利"
 "用可能だからです。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -611,7 +611,7 @@
 "るに過ぎません。加
えて、多くのそういった会社は、データを直接に悪用したり、"
 "データ・ブローカーに提供したりするのです。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The goal of making journalism and democracy safe therefore requires that we "
 "reduce the data collected about people by any organization, not just by the "
@@ -627,7 +627,7 @@
 "タルデータについて必要なå 
´åˆã¯ã€ã‚ãŸã—たちとやりとりするどうしても必要な短い"
 
"期間を越えて保持することが許されるべきではありません。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One of the motives for the current level of surveillance of the Internet is "
 "that sites are financed through advertising based on tracking users' "
@@ -645,7 +645,7 @@
 "るべきå…
¬ç´„よりはプライバシを侵害する言い訳となっている現状について、わたした"
 "ちはよく知っています。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
@@ -668,7 +668,7 @@
 "href=\"http://taler.net/\";>GNU 
Taler</a>と呼ばれます。今や、適切なビジネスの"
 "取り決めが必要なだ
けで、国家はそれを妨害しなければいいのです。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A further threat from sites' collection of personal data is that security "
 "breakers might get in, take it, and misuse it.  This includes customers' "
@@ -681,11 +681,11 @@
 
"リティ・ホールは、サイトがあなたについてなにも知らなければ、あなたを害するこ"
 "とはできません。"
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Travel Surveillance"
 msgstr "旅行の監視の対策"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We must convert digital toll collection to anonymous payment (using digital "
 "cash, for instance).  License-plate recognition systems recognize all "
@@ -707,7 +707,7 @@
 
"るのではない、というものです。そして、データへのアクセスは裁判所の令状にある"
 "ナンバーのリストに限って探索されるべきです。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a href="
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
@@ -718,7 +718,7 @@
 "racial-justice/victory-federal-court-recognizes\">裁判なしの罰</a>だ
からで"
 "す。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It is acceptable to have a list of people whose person and luggage will be "
 "searched with extra care, and anonymous passengers on domestic flights could "
@@ -732,7 +732,7 @@
 "できます。ある国へのフライトの搭乗を、その国へのå…
¥å›½ãŒã¾ã£ãŸãè¨±ã•ã‚Œã¦ã„ない"
 
"非市民に対して禁止するのも容認できます。これはすべての妥当な目的にå
……分です。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Many mass transit systems use some kind of smart cards or RFIDs for "
 "payment.  These systems accumulate personal data: if you once make the "
@@ -747,7 +747,7 @@
 "さらに、それぞれのカードに関連してすべての旅
程を記録するでしょう。合わせて、"
 
"大量監視となります。こういったデータの集積は削減されるべきです。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Navigation services do surveillance: the user's computer tells the map "
 "service the user's location and where the user wants to go; then the server "
@@ -768,7 +768,7 @@
 
"算し、表示できます。ユーザがどこにいてどこに行きたいかを誰にも伝えることな"
 "く、です。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Systems for borrowing bicycles, etc., can be designed so that the borrower's "
 "identity is known only inside the station where the item was borrowed.  "
@@ -797,11 +797,11 @@
 "えられます。このå 
´åˆã«ã¯ã€ã‚¹ãƒ†ãƒ¼ã‚·ãƒ§ãƒ³ã‹ã‚‰å€Ÿã‚ŠãŸäººã®ã‚¢ã‚¤ãƒ‡ãƒ³ãƒ†ã‚£ãƒ†ã‚£ãŒç›´ã¡ã«"
 "送られるでしょう。"
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Communications Dossiers"
 msgstr "通信の記録の対策"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
@@ -826,7 +826,7 @@
 
"technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSAは携帯"
 "電話の位置情報の集積</a>を大量に行っているようです。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unmonitored communication is impossible where systems create such dossiers.  "
 "So it should be illegal to create or keep them.  ISPs and phone companies "
@@ -838,7 +838,7 @@
 "に対し調査する法廷の命令なしに長期間に渡ってこの情å 
±ã‚’保持することを許される"
 "べきではありません。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
@@ -860,7 +860,7 @@
 
"の監視を再開したならば、その時点よりも前に作成されたå
…¨å“¡ã®é€šè©±è¨˜éŒ²ã«ã¤ã„て"
 "データを取得しないでしょう。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy about who you exchange email with, a simple partial solution is "
 "for you and others to use email services in a country that would never "
@@ -882,11 +882,11 @@
 "るユーザからわたしがメールを受け取ったことだ
けがわかり、しかし、あなたがわた"
 
"しにメールを送ったことを確定させるのは困難である、というシステãƒ
 ã§ã™ã€‚"
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "But Some Surveillance Is Necessary"
 msgstr "しかし、ある監視は必要だ"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For the state to find criminals, it needs to be able to investigate specific "
 "crimes, or specific suspected planned crimes, under a court order.  With the "
@@ -903,7 +903,7 @@
 
"(わたしが推奨するように)わたしたちが事前に大量の書類を集積するディジタル・シ"
 "ステムを禁止すれば。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -926,7 +926,7 @@
 
"kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">警察の武器の使用"
 
"が60%降下したそうです</a>。ACLUはこれを好ましく考えています。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -947,7 +947,7 @@
 "の危険(BP社の原油流出事故
、福島の原子炉溶融、2008年の世界金融危機を考えてみて"
 "ください)は、テロリズムによる危険を小さく見せます。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, journalism must be protected from surveillance even when it is "
 "carried out as part of a business."
@@ -955,7 +955,7 @@
 "しかしながら、ジャーナリズム
は監視から守られるべきです。たとえ、それが、ビジ"
 "ネスの一部として実施されている時でも。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Digital technology has brought about a tremendous increase in the level of "
 "surveillance of our movements, actions, and communications.  It is far more "
@@ -971,7 +971,7 @@
 
"集積されたデータの国による使用に関して提案されている法的制限では、それを変え"
 "られないでしょう。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Companies are designing even more intrusive surveillance.  Some project that "
 "pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -987,7 +987,7 @@
 "可能ですが、民主主義への脅
威は憶測ではありません。それは現に有り、見えている"
 "のです。"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unless we believe that our free countries previously suffered from a grave "
 "surveillance deficit, and ought to be surveilled more than the Soviet Union "

Index: po/surveillance-vs-democracy.lt-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.lt-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/surveillance-vs-democracy.lt-diff.html   22 Oct 2016 18:29:16 -0000      
1.9
+++ po/surveillance-vs-democracy.lt-diff.html   6 Nov 2016 21:28:15 -0000       
1.10
@@ -14,19 +14,36 @@
 &lt;!-- Parent-Version: 1.77 --&gt;
 &lt;title&gt;How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation&lt;/title&gt;
-<span class="inserted"><ins><em>&lt;!-- GNUN: localize URL 
/graphics/dog.small.jpg --&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+--&gt;&lt;/style&gt;
+&lt;!-- GNUN: localize URL /graphics/dog.small.jpg --&gt;</em></ins></span>
 &lt;!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" 
--&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
-&lt;h2&gt;How Much Surveillance Can Democracy Withstand?&lt;/h2&gt;
+<span class="removed"><del><strong>&lt;h2&gt;How</strong></del></span>
+<span class="inserted"><ins><em>&lt;h2 class="center"&gt;How</em></ins></span> 
Much Surveillance Can Democracy Withstand?&lt;/h2&gt;
 
-&lt;p&gt;by &lt;a href="http://www.stallman.org/"&gt;Richard 
Stallman&lt;/a&gt;&lt;/p&gt;
+<span class="removed"><del><strong>&lt;p&gt;by</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p class="byline 
center"&gt;by</em></ins></span> &lt;a 
href="http://www.stallman.org/"&gt;Richard Stallman&lt;/a&gt;&lt;/p&gt;
+
+<span 
class="removed"><del><strong>&lt;blockquote&gt;&lt;p&gt;A</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;!-- rms: I deleted the link because of 
Wired's announced
-     anti-ad-block system --&gt;</em></ins></span>
-&lt;blockquote&gt;&lt;p&gt;A version of this article was first published in 
<span class="removed"><del><strong>&lt;a 
href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/"&gt;Wired&lt;/a&gt;</strong></del></span>
 <span class="inserted"><ins><em>Wired</em></ins></span>
+     anti-ad-block system --&gt;
+&lt;blockquote class="center"&gt;&lt;p&gt;A</em></ins></span> version of this 
article was first published in <span class="removed"><del><strong>&lt;a 
href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/"&gt;Wired&lt;/a&gt;</strong></del></span>
 <span class="inserted"><ins><em>Wired</em></ins></span>
 in October 2013.&lt;/p&gt;&lt;/blockquote&gt;
 
-<span class="inserted"><ins><em>&lt;div class="pict medium"&gt;
+<span class="inserted"><ins><em>&lt;div class="article"&gt;
+
+&lt;div id="intro"&gt;
+&lt;div class="pict wide"&gt;
 &lt;a href="/graphics/dog.html"&gt;
 &lt;img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /&gt;&lt;/a&gt;
 &lt;p&gt;&ldquo;How did they find out I'm a dog?&rdquo;&lt;/p&gt;
@@ -42,7 +59,8 @@
 is not exceeded?  It is the level beyond which surveillance starts to
 interfere with the functioning of democracy, in that whistleblowers
 (such as Snowden) are likely to be caught.&lt;/p&gt;
-
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="columns" style="clear:both"&gt;</em></ins></span>
 &lt;p&gt;Faced with government secrecy, we the people depend on
 whistleblowers
 to &lt;a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama"&gt;tell
@@ -73,8 +91,12 @@
 whistleblower&rdquo; is grounds for access sufficient to identify him
 or her.  We need to go further.&lt;/p&gt;
 
-&lt;h3&gt;The Upper Limit on Surveillance in a Democracy&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;The</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
+&lt;h3 class="subheader" style="clear: both"&gt;The</em></ins></span> Upper 
Limit on Surveillance in a Democracy&lt;/h3&gt;
+
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;If whistleblowers don't dare reveal crimes and lies, we lose the
 last shred of effective control over our government and institutions.
 That's why surveillance that enables the state to find out who has
@@ -104,8 +126,12 @@
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.&lt;/p&gt;
 
-&lt;h3&gt;Information, Once Collected, Will Be Misused&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Information,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Information,</em></ins></span> Once Collected, 
Will Be Misused&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div  class="columns"&gt;</em></ins></span>
 &lt;p&gt;When people recognize that the level of general surveillance is too
 high, the first response is to propose limits on access to the
 accumulated data.  That sounds nice, but it won't fix the problem, not
@@ -154,8 +180,12 @@
 journalism and democracy safe, we must limit the accumulation of data
 that is easily accessible to the state.&lt;/p&gt;
 
-&lt;h3&gt;Robust Protection for Privacy Must Be Technical&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Robust</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Robust</em></ins></span> Protection for Privacy 
Must Be Technical&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to &lt;a
 href="https://en.necessaryandproportionate.org/text"&gt;prevent the
@@ -184,8 +214,12 @@
 collect data starting at that date.  As for suspending or momentarily
 ignoring this law, the idea would hardly make sense.&lt;/p&gt;
 
-&lt;h3&gt;First, Don't Be Foolish&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;First,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
+&lt;h3 class="subheader"&gt;First,</em></ins></span> Don't Be 
Foolish&lt;/h3&gt;
+
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;To have privacy, you must not throw it away: the first one who has
 to protect your privacy is you.  Avoid identifying yourself to web
 sites, contact them with Tor, and use browsers that block the schemes
@@ -227,8 +261,12 @@
 make all these systems stop surveilling people other than legitimate
 suspects.&lt;/p&gt;
 
-&lt;h3&gt;We Must Design Every System for Privacy&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;We</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;We</em></ins></span> Must Design Every System for 
Privacy&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;If we don't want a total surveillance society, we must consider
 surveillance a kind of social pollution, and limit the surveillance
 impact of each new digital system just as we limit the environmental
@@ -247,8 +285,12 @@
 
 &lt;p&gt;We need to design such privacy into all our digital systems.&lt;/p&gt;
 
-&lt;h3&gt;Remedy for Collecting Data: Leaving It Dispersed&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Remedy</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
+&lt;h3 class="subheader"&gt;Remedy</em></ins></span> for Collecting Data: 
Leaving It Dispersed&lt;/h3&gt;
+
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;One way to make monitoring safe for privacy is
 to &lt;a name="dispersal"&gt;keep the data dispersed and inconvenient to
 access&lt;/a&gt;.  Old-fashioned security cameras were no threat to 
privacy(&lt;a href="#privatespace"&gt;*&lt;/a&gt;).
@@ -282,9 +324,11 @@
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
-&lt;h3 id="digitalcash"&gt;Remedy for Internet Commerce Surveillance&lt;/h3&gt;
+&lt;h3 <span 
class="removed"><del><strong>id="digitalcash"&gt;Remedy</strong></del></span> 
<span class="inserted"><ins><em>id="digitalcash" 
class="subheader"&gt;Remedy</em></ins></span> for Internet Commerce 
Surveillance&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;Most data collection comes from people's own digital activities.
 Usually the data is collected first by companies.  But when it comes
 to the threat to privacy and democracy, it makes no difference whether
@@ -341,8 +385,12 @@
 this danger: a security hole in the site can't hurt you if the site
 knows nothing about you.&lt;/p&gt;
 
-&lt;h3&gt;Remedy for Travel Surveillance&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Remedy</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Remedy</em></ins></span> for Travel 
Surveillance&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
 recognize all license plates, and
@@ -398,8 +446,12 @@
 borrowed can inform headquarters; in that case, it could send the
 borrower's identity immediately.&lt;/p&gt;
 
-&lt;h3&gt;Remedy for Communications Dossiers&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Remedy</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
+&lt;h3 class="subheader"&gt;Remedy</em></ins></span> for Communications 
Dossiers&lt;/h3&gt;
+
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
@@ -438,8 +490,12 @@
 that I received mail from some user of your email service, but it
 would be hard to determine that you had sent mail to me.&lt;/p&gt;
 
-&lt;h3&gt;But Some Surveillance Is Necessary&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;But</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;But</em></ins></span> Some Surveillance Is 
Necessary&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;For the state to find criminals, it needs to be able to investigate
 specific crimes, or specific suspected planned crimes, under a court
 order.  With the Internet, the power to tap phone conversations would
@@ -474,8 +530,11 @@
 &lt;p&gt;However, journalism must be protected from surveillance even when
 it is carried out as part of a business.&lt;/p&gt;
 
-&lt;hr /&gt;
+<span class="removed"><del><strong>&lt;hr /&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="reduced-width"&gt;</em></ins></span>
 &lt;p&gt;Digital technology has brought about a tremendous increase in the
 level of surveillance of our movements, actions, and communications.
 It is far more than we experienced in the 1990s, and &lt;a <span 
class="removed"><del><strong>href="http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html"&gt;far</strong></del></span>
@@ -495,6 +554,8 @@
 a grave surveillance deficit, and ought to be surveilled more than the
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;/div&gt;</em></ins></span>
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
@@ -553,7 +614,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/10/22 18:29:16 $
+$Date: 2016/11/06 21:28:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/surveillance-vs-democracy.lt.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.lt.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/surveillance-vs-democracy.lt.po  22 Oct 2016 18:29:16 -0000      1.15
+++ po/surveillance-vs-democracy.lt.po  6 Nov 2016 21:28:15 -0000       1.16
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2015-12-16 13:11+0100\n"
 "Last-Translator: Donatas Klimašauskas <address@hidden>\n"
 "Language-Team: Lithuanian <address@hidden>\n"
@@ -36,29 +36,29 @@
 msgid "A version of this article was first published in Wired in October 2013."
 msgstr ""
 
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
 #, fuzzy
 #| msgid "<a href=\"/education/education.html\">Education</a>"
 msgid "<a href=\"/graphics/dog.html\">"
 msgstr "<a href=\"/education/education.html\">Å vietimas</a>"
 
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
 msgid ""
 "Cartoon of a dog, wondering at the three ads that popped up on his computer "
 "screen..."
 msgstr ""
 
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
 #, fuzzy
 #| msgid "</a>"
 msgid "</a>"
 msgstr "</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Thanks to Edward Snowden's disclosures, we know that the current level of "
 "general surveillance in society is incompatible with human rights.  The "
@@ -79,7 +79,7 @@
 "lygis, už kurio sekimas pradeda kirstis su demokratijos funkcionavimu, su "
 "kuriuo informatoriai (tokie kaip Snowden) yra tikėtina, kad bus pagauti."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Faced with government secrecy, we the people depend on whistleblowers to <a "
 "href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";>tell us what "
@@ -95,7 +95,7 @@
 "Mūsų demokratinės valstybės kontrolės atgavimui, mes privalome 
sumažinti "
 "sekimą tiek, jog informatoriai žinotų, kad yra saugūs."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
@@ -136,7 +136,7 @@
 "www.wired.com/opinion/2013/10/149481/\">tai neapsaugos mūsų privatumo, kai "
 "įžengiame į internetą</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
@@ -154,11 +154,11 @@
 "pagrindas gauti prieigą, pakankamą jį arba ją identifikuoti.  Mums reikia 
"
 "žengti toliau."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "The Upper Limit on Surveillance in a Democracy"
 msgstr "Viršutinė sekimo demokratijoje riba"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
 "of effective control over our government and institutions.  That's why "
@@ -170,7 +170,7 @@
 "Štai todėl sekimas, kuris valstybę įgalina išsiaiškinti kas kalbėjo su 
"
 "žurnalistu yra per daug sekimo &ndash; per daug ištverti demokratijai."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "An unnamed U.S. government official ominously told journalists in 2011 "
@@ -213,7 +213,7 @@
 "\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-";
 "verizon-2013-06-07\">iš kitų kompanijų irgi</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
@@ -232,11 +232,11 @@
 "valstybė gali sužinoti kas kalbėjo su žinomu žurnalistu arba žinomu "
 "disidentu."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Information, Once Collected, Will Be Misused"
 msgstr "Informacija, surinkus, bus netinkamai panaudota"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
@@ -258,7 +258,7 @@
 "apkaltinamas &bdquo;špionažu&ldquo;, to &bdquo;šnipo&ldquo; suradimas bus "
 "pasiteisinimas prieigai prie sukauptos medžiagos."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "In addition, the state's surveillance staff will misuse the data for "
@@ -299,7 +299,7 @@
 "vairuotojo licencijų įrašų siekiant surasti ką nors simpatiško</a> 
&ndash; "
 "praktika, žinoma kaip &bdquo;valstybinio numerio paieška 
pasimatymui&ldquo;."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -317,7 +317,7 @@
 "a> ir <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment";
 "\">JAV</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Personal data collected by the state is also likely to be obtained by "
 "outside crackers that break the security of the servers, even by <a href="
@@ -331,7 +331,7 @@
 "revealed-even-worse-than-first.shtml\">įsilaužėliai, dirbantys 
priešiškoms "
 "valstybėms</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
 "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
@@ -341,7 +341,7 @@
 "www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-"
 "wiretapping-scandal.html\">nusmukdyti demokratiją tiesiogiai</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Total surveillance accessible to the state enables the state to launch a "
 "massive fishing expedition against any person.  To make journalism and "
@@ -353,11 +353,11 @@
 "demokratiją saugiomis, mes privalome apriboti duomenų, kurie yra lengvai "
 "prieinami valstybei, kaupimą."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Robust Protection for Privacy Must Be Technical"
 msgstr "Tvirta privatumo apsauga privalo būti technine"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The Electronic Frontier Foundation and other organizations propose a set of "
 "legal principles designed to <a href=\"https://en.necessaryandproportionate.";
@@ -373,7 +373,7 @@
 "adekvatūs demokratinių laisvių apsaugai &ndash; jei bus visiškai priimti 
ir "
 "be išimčių privalomai užtikrinti amžinai."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -383,7 +383,7 @@
 "gali būti atšauktos (kaip pagal FISA pataisų aktą), atidėtos arba <a 
href="
 "\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignoruojamos</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Meanwhile, demagogues will cite the usual excuses as grounds for total "
 "surveillance; any terrorist attack, even one that kills just a handful of "
@@ -393,7 +393,7 @@
 "visiškam sekimui; bet kokia teroristinė ataka, net kuria nužudoma tik "
 "keletas žmonių, gali būti išpūsta pateikti progą."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If limits on access to the data are set aside, it will be as if they had "
 "never existed: years worth of dossiers would suddenly become available for "
@@ -415,11 +415,11 @@
 "duomenis tik nuo tada.  Kas liečia atidėjimą arba laikiną šio įstatymo "
 "ignoravimą, tokią idėją būtų sunku logiškai pagrįsti."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "First, Don't Be Foolish"
 msgstr "Pirma, nebūkite kvaili"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "To have privacy, you must not throw it away: the first one who has to "
 "protect your privacy is you.  Avoid identifying yourself to web sites, "
@@ -433,7 +433,7 @@
 "kurias jos naudoja lankytojų stebėjimui.  Naudokite GNU Privacy Guard savo "
 "el. pašto turinio užšifravimui.  Už pirkinius atsiskaitykite grynais."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Keep your own data; don't store your data in a company's &ldquo;"
 "convenient&rdquo; server.  It's safe, however, to entrust a data backup to a "
@@ -448,7 +448,7 @@
 "pavadinimus, prieš jį išsiųsdami, savo paties kompiuteryje užšifruosite 
su "
 "laisva programine įranga."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy's sake, you must avoid nonfree software since, as a consequence "
 "of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -465,7 +465,7 @@
 "jūsų kompiuterinių skaičiavimų kontrolės atidavimo kitiems, šitam iš 
jūsų "
 "reikia, kad perduotumėte tam serveriui visus susijusius duomenis."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -488,7 +488,7 @@
 "jūs ketinate pateikti savąjį, kadangi jos spaudžia kitus žmones 
atsisakyti "
 "savo privatumo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Self-protection is essential, but even the most rigorous self-protection is "
 "insufficient to protect your privacy on or from systems that don't belong to "
@@ -506,11 +506,11 @@
 "geresnis sprendimas yra sustabdyti visas šitas sistemas nuo kitų žmonių, 
nei "
 "tikri įtariamieji, sekimo."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "We Must Design Every System for Privacy"
 msgstr "Mes privalome kiekvieną sistemą projektuoti privatumui"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we don't want a total surveillance society, we must consider surveillance "
 "a kind of social pollution, and limit the surveillance impact of each new "
@@ -522,7 +522,7 @@
 "naujai skaitmeninei sistemai lygiai taip pat, kaip mes apribojame gamtinės "
 "aplinkos poveikį fizinėms konstrukcijoms."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For example: &ldquo;smart&rdquo; meters for electricity are touted for "
 "sending the power company moment-by-moment data about each customer's "
@@ -546,16 +546,16 @@
 "periodu, su vidutiniu vartojimo modeliu tam periodui.  Tokia pati nauda, be "
 "jokio sekimo!"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid "We need to design such privacy into all our digital systems."
 msgstr ""
 "Mums reikia projektuoti tokį privatumą visose mūsų skaitmeninėse 
sistemose."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Collecting Data: Leaving It Dispersed"
 msgstr "Duomenų rinkimo ištaisymas: palikti juos išbarstytus"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
 "the data dispersed and inconvenient to access</a>.  Old-fashioned security "
@@ -575,7 +575,7 @@
 "kuriose kas nors pranešė apie nusikaltimą.  Nebūtų įmanoma fiziškai 
surinkti "
 "milijonus kasečių kiekvieną dieną ir jas peržiūrėti arba nukopijuoti."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Nowadays, security cameras have become surveillance cameras: they are "
 "connected to the Internet so recordings can be collected in a data center "
@@ -590,7 +590,7 @@
 "atpažinimo progresu galime sulaukti dienos, kada įtariamus žurnalistus, 
kad "
 "pamatyti su kuo jie šneka, bus galima stebėti gatvėje visą laiką."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "Internet-connected cameras often have lousy digital security themselves, "
@@ -621,7 +621,7 @@
 "nuotraukas ir video įrašus, bet sistemiškas tokių duomenų internete 
kaupimas "
 "privalo būti apribotas."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
 "points at the inside of a store, or at the street.  Any camera pointed at "
@@ -633,11 +633,11 @@
 "kas nors nukreipia į kieno nors privačią erdvę, pažeidžia privatumą, 
bet tai "
 "yra kita problema."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Internet Commerce Surveillance"
 msgstr "Internetinės komercijos sekimo ištaisymas"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Most data collection comes from people's own digital activities.  Usually "
 "the data is collected first by companies.  But when it comes to the threat "
@@ -651,7 +651,7 @@
 "tiesiogiai atlieka valstybė, ar susitarta su verslu, nes tie duomenys, "
 "kuriuos kompanijos renka, yra sistemiškai prieinami valstybei."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
@@ -686,7 +686,7 @@
 "sakant, JAV vyriausybė neturi tų duomenų, bet praktine prasme galima "
 "laikyti, kad ji juos turi."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The goal of making journalism and democracy safe therefore requires that we "
 "reduce the data collected about people by any organization, not just by the "
@@ -703,7 +703,7 @@
 "juos laikyti ilgiau, nei trumpą laiką, kuris neatskiriamai būtinas jų "
 "reikalams su mumis."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One of the motives for the current level of surveillance of the Internet is "
 "that sites are financed through advertising based on tracking users' "
@@ -722,7 +722,7 @@
 "yra labiau pasiteisinimai pažeisti privatumą, nei įsipareigojimai jį "
 "išlaikyti."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "We could correct both problems by adopting a system of anonymous "
@@ -755,7 +755,7 @@
 "pirma buvo sukurta 1980&ndash;1990&nbsp;m. laikotarpyje</a>; mums reikia tik "
 "tinkamų verslui planų ir, kad valstybė jiems nekliudytų."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A further threat from sites' collection of personal data is that security "
 "breakers might get in, take it, and misuse it.  This includes customers' "
@@ -768,11 +768,11 @@
 "mokėjimų sistema šį pavojų užbaigtų: svetainės saugumo skylė negali 
jums "
 "pakenkti jei ta svetainė apie jus nieko nežino."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Travel Surveillance"
 msgstr "Keliavimo sekimo ištaisymas"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We must convert digital toll collection to anonymous payment (using digital "
 "cash, for instance).  License-plate recognition systems recognize all "
@@ -796,7 +796,7 @@
 "duomenų turėtų būti apribota valstybinių numerių pagal teismo 
sprendimus "
 "sąrašo ieškojimu."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a href="
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
@@ -806,7 +806,7 @@
 "href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-";
 "racial-justice/victory-federal-court-recognizes\">bausmė be teismo</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It is acceptable to have a list of people whose person and luggage will be "
 "searched with extra care, and anonymous passengers on domestic flights could "
@@ -822,7 +822,7 @@
 "valstybę, įlipti skrydžiams į tą valstybę.  Šito turėtų pakakti 
visiems "
 "teisėtiems tikslams."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Many mass transit systems use some kind of smart cards or RFIDs for "
 "payment.  These systems accumulate personal data: if you once make the "
@@ -838,7 +838,7 @@
 "keliones susietas su kiekviena kortele.  Kartu jie prilygsta masiniam "
 "sekimui.  Šis duomenų rinkimas privalo būti sumažintas."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Navigation services do surveillance: the user's computer tells the map "
 "service the user's location and where the user wants to go; then the server "
@@ -861,7 +861,7 @@
 "apskaičiuoti maršrutą ir jį pavaizduoti, niekam niekada nepranešant kur 
tas "
 "naudotojas yra ar kur nori keliauti."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Systems for borrowing bicycles, etc., can be designed so that the borrower's "
 "identity is known only inside the station where the item was borrowed.  "
@@ -891,11 +891,11 @@
 "stotis iš kurios jis buvo pasiskolintas gali būstinę informuoti; tuo 
atveju, "
 "ji galėtų besiskolinančiojo tapatybę išsiųsti nedelsiant."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Communications Dossiers"
 msgstr "Komunikacinių asmeninių įrašų ištaisymas"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
@@ -921,7 +921,7 @@
 "security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location"
 "\">NSA korinio ryšio telefonų vietos duomenis renka</a> masiškai."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unmonitored communication is impossible where systems create such dossiers.  "
 "So it should be illegal to create or keep them.  ISPs and phone companies "
@@ -933,7 +933,7 @@
 "telefoninio ryšio kompanijoms turi būti neleidžiama labai ilgai laikyti 
šią "
 "informaciją, nesant teismo sprendimo sekti tam tikrą pusę."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
@@ -956,7 +956,7 @@
 "vyriausybė vėl pradėtų atlikti tokio tipo sekimą, ji negautų duomenų 
apie "
 "kiekvieno telefoninius skambučius, atliktus iki to laiko."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy about who you exchange email with, a simple partial solution is "
 "for you and others to use email services in a country that would never "
@@ -979,11 +979,11 @@
 "paštą iš kažkokio jūsų el. pašto paslaugos naudotojo, bet būtų sunku 
"
 "nustatyti, kad jūs man išsiuntėte paštą."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "But Some Surveillance Is Necessary"
 msgstr "Bet kažkiek sekimo yra būtina"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For the state to find criminals, it needs to be able to investigate specific "
 "crimes, or specific suspected planned crimes, under a court order.  With the "
@@ -1002,7 +1002,7 @@
 "po fakto, jei prieš tokį faktą (kaip aš rekomendavau) mes neleisime "
 "skaitmeninėms sistemoms masiškai kaupti asmeninius įrašus."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1027,7 +1027,7 @@
 "ubiquitous-surveillance-police-edition\">jos jėgos panaudojimas sumažėjo "
 "60&nbsp;%</a>.  ACLU šitam teikia pirmenybę."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1048,7 +1048,7 @@
 "reikalingo lygio.  Šių operacijų pavojus (apsvarstykite BP naftos 
išliejimą, "
 "išsilydimus Fukušimoje ir 2008&nbsp;m. fiskalinę krizę) pranoksta 
terorizmą."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, journalism must be protected from surveillance even when it is "
 "carried out as part of a business."
@@ -1056,7 +1056,7 @@
 "Tačiau, žurnalistika privalo būti apsaugota nuo sekimo, net kai ji yra "
 "vykdoma kaip verslo dalis."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "Digital technology has brought about a tremendous increase in the level "
@@ -1081,7 +1081,7 @@
 "laikotarpiu, ir pasiūlytos teisinės tų sukauptų duomenų valstybinio "
 "naudojimo ribos to nepakeistų."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "Companies are designing even more intrusive surveillance.  Some project "
@@ -1105,7 +1105,7 @@
 "\">kaip žmonės galvoja</a>.  Tokios galimybės yra neišmatuojamos; bet 
grėsmė "
 "demokratijai nėra spekuliacija.  Ji egzistuoja ir yra matoma šiandien."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unless we believe that our free countries previously suffered from a grave "
 "surveillance deficit, and ought to be surveilled more than the Soviet Union "

Index: po/surveillance-vs-democracy.nl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.nl-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/surveillance-vs-democracy.nl-diff.html   22 Oct 2016 18:29:16 -0000      
1.8
+++ po/surveillance-vs-democracy.nl-diff.html   6 Nov 2016 21:28:15 -0000       
1.9
@@ -14,19 +14,35 @@
 &lt;!-- Parent-Version: 1.77 --&gt;
 &lt;title&gt;How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation&lt;/title&gt;
-<span class="inserted"><ins><em>&lt;!-- GNUN: localize URL 
/graphics/dog.small.jpg --&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+--&gt;&lt;/style&gt;
+&lt;!-- GNUN: localize URL /graphics/dog.small.jpg --&gt;</em></ins></span>
 &lt;!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" 
--&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
-&lt;h2&gt;How Much Surveillance Can Democracy Withstand?&lt;/h2&gt;
+<span class="removed"><del><strong>&lt;h2&gt;How</strong></del></span>
+<span class="inserted"><ins><em>&lt;h2 class="center"&gt;How</em></ins></span> 
Much Surveillance Can Democracy Withstand?&lt;/h2&gt;
 
-&lt;p&gt;by &lt;a href="http://www.stallman.org/"&gt;Richard 
Stallman&lt;/a&gt;&lt;/p&gt;
+<span class="removed"><del><strong>&lt;p&gt;by</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p class="byline 
center"&gt;by</em></ins></span> &lt;a 
href="http://www.stallman.org/"&gt;Richard Stallman&lt;/a&gt;&lt;/p&gt;
 
 &lt;!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system --&gt;
-&lt;blockquote&gt;&lt;p&gt;A version of this article was first published in 
Wired
+<span 
class="removed"><del><strong>&lt;blockquote&gt;&lt;p&gt;A</strong></del></span>
+<span class="inserted"><ins><em>&lt;blockquote 
class="center"&gt;&lt;p&gt;A</em></ins></span> version of this article was 
first published in Wired
 in October 2013.&lt;/p&gt;&lt;/blockquote&gt;
 
-<span class="inserted"><ins><em>&lt;div class="pict medium"&gt;
+<span class="inserted"><ins><em>&lt;div class="article"&gt;
+
+&lt;div id="intro"&gt;
+&lt;div class="pict wide"&gt;
 &lt;a href="/graphics/dog.html"&gt;
 &lt;img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /&gt;&lt;/a&gt;
 &lt;p&gt;&ldquo;How did they find out I'm a dog?&rdquo;&lt;/p&gt;
@@ -42,7 +58,8 @@
 is not exceeded?  It is the level beyond which surveillance starts to
 interfere with the functioning of democracy, in that whistleblowers
 (such as Snowden) are likely to be caught.&lt;/p&gt;
-
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="columns" style="clear:both"&gt;</em></ins></span>
 &lt;p&gt;Faced with government secrecy, we the people depend on
 whistleblowers
 to &lt;a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama"&gt;tell
@@ -73,8 +90,12 @@
 whistleblower&rdquo; is grounds for access sufficient to identify him
 or her.  We need to go further.&lt;/p&gt;
 
-&lt;h3&gt;The Upper Limit on Surveillance in a Democracy&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;The</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader" style="clear: both"&gt;The</em></ins></span> Upper 
Limit on Surveillance in a Democracy&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;If whistleblowers don't dare reveal crimes and lies, we lose the
 last shred of effective control over our government and institutions.
 That's why surveillance that enables the state to find out who has
@@ -104,8 +125,12 @@
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.&lt;/p&gt;
 
-&lt;h3&gt;Information, Once Collected, Will Be Misused&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Information,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
+&lt;h3 class="subheader"&gt;Information,</em></ins></span> Once Collected, 
Will Be Misused&lt;/h3&gt;
+
+<span class="inserted"><ins><em>&lt;div  class="columns"&gt;</em></ins></span>
 &lt;p&gt;When people recognize that the level of general surveillance is too
 high, the first response is to propose limits on access to the
 accumulated data.  That sounds nice, but it won't fix the problem, not
@@ -153,8 +178,12 @@
 journalism and democracy safe, we must limit the accumulation of data
 that is easily accessible to the state.&lt;/p&gt;
 
-&lt;h3&gt;Robust Protection for Privacy Must Be Technical&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Robust</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Robust</em></ins></span> Protection for Privacy 
Must Be Technical&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to &lt;a
 href="https://en.necessaryandproportionate.org/text"&gt;prevent the
@@ -183,8 +212,12 @@
 collect data starting at that date.  As for suspending or momentarily
 ignoring this law, the idea would hardly make sense.&lt;/p&gt;
 
-&lt;h3&gt;First, Don't Be Foolish&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;First,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;First,</em></ins></span> Don't Be 
Foolish&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;To have privacy, you must not throw it away: the first one who has
 to protect your privacy is you.  Avoid identifying yourself to web
 sites, contact them with Tor, and use browsers that block the schemes
@@ -226,8 +259,12 @@
 make all these systems stop surveilling people other than legitimate
 suspects.&lt;/p&gt;
 
-&lt;h3&gt;We Must Design Every System for Privacy&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;We</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
+&lt;h3 class="subheader"&gt;We</em></ins></span> Must Design Every System for 
Privacy&lt;/h3&gt;
+
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;If we don't want a total surveillance society, we must consider
 surveillance a kind of social pollution, and limit the surveillance
 impact of each new digital system just as we limit the environmental
@@ -246,8 +283,12 @@
 
 &lt;p&gt;We need to design such privacy into all our digital systems.&lt;/p&gt;
 
-&lt;h3&gt;Remedy for Collecting Data: Leaving It Dispersed&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Remedy</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Remedy</em></ins></span> for Collecting Data: 
Leaving It Dispersed&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;One way to make monitoring safe for privacy is
 to &lt;a name="dispersal"&gt;keep the data dispersed and inconvenient to
 access&lt;/a&gt;.  Old-fashioned security cameras were no threat to 
privacy(&lt;a href="#privatespace"&gt;*&lt;/a&gt;).
@@ -281,9 +322,11 @@
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
-&lt;h3 id="digitalcash"&gt;Remedy for Internet Commerce Surveillance&lt;/h3&gt;
+&lt;h3 <span 
class="removed"><del><strong>id="digitalcash"&gt;Remedy</strong></del></span> 
<span class="inserted"><ins><em>id="digitalcash" 
class="subheader"&gt;Remedy</em></ins></span> for Internet Commerce 
Surveillance&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;Most data collection comes from people's own digital activities.
 Usually the data is collected first by companies.  But when it comes
 to the threat to privacy and democracy, it makes no difference whether
@@ -340,8 +383,12 @@
 this danger: a security hole in the site can't hurt you if the site
 knows nothing about you.&lt;/p&gt;
 
-&lt;h3&gt;Remedy for Travel Surveillance&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Remedy</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Remedy</em></ins></span> for Travel 
Surveillance&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
 recognize all license plates, and
@@ -397,8 +444,12 @@
 borrowed can inform headquarters; in that case, it could send the
 borrower's identity immediately.&lt;/p&gt;
 
-&lt;h3&gt;Remedy for Communications Dossiers&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Remedy</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
+&lt;h3 class="subheader"&gt;Remedy</em></ins></span> for Communications 
Dossiers&lt;/h3&gt;
+
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
@@ -437,8 +488,12 @@
 that I received mail from some user of your email service, but it
 would be hard to determine that you had sent mail to me.&lt;/p&gt;
 
-&lt;h3&gt;But Some Surveillance Is Necessary&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;But</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;But</em></ins></span> Some Surveillance Is 
Necessary&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;For the state to find criminals, it needs to be able to investigate
 specific crimes, or specific suspected planned crimes, under a court
 order.  With the Internet, the power to tap phone conversations would
@@ -473,8 +528,11 @@
 &lt;p&gt;However, journalism must be protected from surveillance even when
 it is carried out as part of a business.&lt;/p&gt;
 
-&lt;hr /&gt;
+<span class="removed"><del><strong>&lt;hr /&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="reduced-width"&gt;</em></ins></span>
 &lt;p&gt;Digital technology has brought about a tremendous increase in the
 level of surveillance of our movements, actions, and communications.
 It is far more than we experienced in the 1990s, and &lt;a
@@ -494,6 +552,8 @@
 a grave surveillance deficit, and ought to be surveilled more than the
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;/div&gt;</em></ins></span>
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
@@ -552,7 +612,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/10/22 18:29:16 $
+$Date: 2016/11/06 21:28:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/surveillance-vs-democracy.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.nl.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/surveillance-vs-democracy.nl.po  22 Oct 2016 18:29:16 -0000      1.15
+++ po/surveillance-vs-democracy.nl.po  6 Nov 2016 21:28:16 -0000       1.16
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-09-29 15:25+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch\n"
@@ -40,11 +40,11 @@
 "oktober 2013."
 
 # type: Content of: <body><div><div><div><ul><li>
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
 msgid "<a href=\"/graphics/dog.html\">"
 msgstr "<a href=\"/graphics/dog.html\">"
 
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
 msgid ""
 "Cartoon of a dog, wondering at the three ads that popped up on his computer "
 "screen..."
@@ -53,15 +53,15 @@
 "die op zijn computerscherm opdoemen..."
 
 # type: Content of: <div><div><p>
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
 msgid "</a>"
 msgstr "</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "&ldquo;Hoe weten ze dat ik een hond ben?&rdquo;"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Thanks to Edward Snowden's disclosures, we know that the current level of "
 "general surveillance in society is incompatible with human rights.  The "
@@ -83,7 +83,7 @@
 "functioneren van onze democratie, waarbij klokkenluiders (zoals Snowden) "
 "worden aangepakt."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Faced with government secrecy, we the people depend on whistleblowers to <a "
 "href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";>tell us what "
@@ -100,7 +100,7 @@
 "moeten we de mate van toezicht terugbrengen naar een punt waarop "
 "klokkenluiders erop kunnen vertrouwen dat zij veilig zijn."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 # | Using free/libre software, <a
 # | href=\"/philosophy/free-software-even-more-important.html\">as I've
 # | advocated for 30 years</a>, is the first step in taking control of our
@@ -154,7 +154,7 @@
 "opinion/2013/10/149481/\">dat beschermt onze privacy niet als we ons op het "
 "internet begeven</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
@@ -172,11 +172,11 @@
 "genoeg reden is om de klokkenluider te identificeren, zal dat hem niet "
 "genoeg beschermen. We moeten verder gaan."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "The Upper Limit on Surveillance in a Democracy"
 msgstr "De bovengrens van controle in een democratie"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
 "of effective control over our government and institutions.  That's why "
@@ -188,7 +188,7 @@
 "waarom toezicht waarbij de staat uit kan vinden wie met een journalist heeft "
 "gepraat, te veel toezicht is&mdash;meer dan een democratie kan verdragen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 # | An unnamed U.S. government official ominously told journalists in 2011
 # | that the <a
 # | 
href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\";>U.S.
@@ -245,7 +245,7 @@
 "marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
 "verizon-2013-06-07\">ook andere bedrijven</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
@@ -264,11 +264,11 @@
 "overheidstoezicht te veel is, is het punt waarop de overheid er achter kan "
 "komen wie met een bekende journalist of dissident heeft gesproken."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Information, Once Collected, Will Be Misused"
 msgstr "Eenmaal verzamelde informatie, zal worden misbruikt"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
@@ -291,7 +291,7 @@
 "spionage&rdquo;, zal het vinden van de &ldquo;spion&rdquo; een excuus vormen "
 "om toegang te krijgen tot het verzamelde materiaal."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 # | In addition, the state's surveillance staff will misuse the data for
 # | personal reasons.  Some NSA agents <a
 # | 
href=\"http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\";>used
@@ -353,7 +353,7 @@
 "theyarewatching.org/issues/risks-increase-once-data-shared\">nieuwe digitale "
 "systemen</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -371,7 +371,7 @@
 "always-be-used-against-the-citizens/\">Europa</a> en in <a href=\"https://en.";
 "wikipedia.org/wiki/Japanese_American_internment\">de VS </a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Personal data collected by the state is also likely to be obtained by "
 "outside crackers that break the security of the servers, even by <a href="
@@ -385,7 +385,7 @@
 "articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first."
 "shtml\">krakers die voor vijandelijke landen werken</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
 "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
@@ -396,7 +396,7 @@
 "government-is-blamed-for-wiretapping-scandal.html\">de democratie "
 "rechtstreeks uit te hollen</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Total surveillance accessible to the state enables the state to launch a "
 "massive fishing expedition against any person.  To make journalism and "
@@ -408,11 +408,11 @@
 "stellen, moeten we de verzameling van gegevens, die gemakkelijk voor de "
 "overheid toegankelijk is, beperken."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Robust Protection for Privacy Must Be Technical"
 msgstr "Goede privacy-bescherming moet technisch zijn"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The Electronic Frontier Foundation and other organizations propose a set of "
 "legal principles designed to <a href=\"https://en.necessaryandproportionate.";
@@ -429,7 +429,7 @@
 "democratische vrijheden te beschermen&mdash;als deze compleet worden "
 "aangenomen en zonder enige uitzondering altijd worden doorgevoerd."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -440,7 +440,7 @@
 "Amendement-wet), opgeschort, of <a href=\"http://www.nytimes.com/2009/04/16/";
 "us/16nsa.html\">genegeerd</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Meanwhile, demagogues will cite the usual excuses as grounds for total "
 "surveillance; any terrorist attack, even one that kills just a handful of "
@@ -450,7 +450,7 @@
 "voor totaal toezicht; elke terroristenaanval, zelfs eentje waarbij slechts "
 "een handvol mensen omkomt, kan hiervoor worden aangegrepen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If limits on access to the data are set aside, it will be as if they had "
 "never existed: years worth of dossiers would suddenly become available for "
@@ -474,11 +474,11 @@
 "negeren van de wet op toegang tot gegevens zou in zo'n situatie nauwelijks "
 "zin hebben."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "First, Don't Be Foolish"
 msgstr "Wees om te beginnen geen dwaas"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "To have privacy, you must not throw it away: the first one who has to "
 "protect your privacy is you.  Avoid identifying yourself to web sites, "
@@ -492,7 +492,7 @@
 "dat websites hun bezoekers niet kunnen volgen. Gebruik de GNU Privacy Guard "
 "om de inhoud van je e-mail te versleutelen. Betaal contant voor dingen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Keep your own data; don't store your data in a company's &ldquo;"
 "convenient&rdquo; server.  It's safe, however, to entrust a data backup to a "
@@ -507,7 +507,7 @@
 "versleutelt, inclusief de bestandsnamen, met vrije software op je eigen "
 "computer voordat je het archief daar neerzet. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy's sake, you must avoid nonfree software since, as a consequence "
 "of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -525,7 +525,7 @@
 "jouw computeractiviteiten: het vereist dat je al jouw gegevens aan de server "
 "overhandigt."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -548,7 +548,7 @@
 "geven, zelfs als je jouw naam toch gaat geven, omdat het druk zet op anderen "
 "om hun privacy in te leveren."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Self-protection is essential, but even the most rigorous self-protection is "
 "insufficient to protect your privacy on or from systems that don't belong to "
@@ -567,11 +567,11 @@
 "systemen stoppen met het volgen van personen die niet verdacht worden van "
 "misdrijven."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "We Must Design Every System for Privacy"
 msgstr "We moeten elk systeem ontwerpen met het oog op privacy"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we don't want a total surveillance society, we must consider surveillance "
 "a kind of social pollution, and limit the surveillance impact of each new "
@@ -583,7 +583,7 @@
 "toezichtmogelijkheden van elk nieuw digitaal systeem beperken, net zoals we "
 "de invloed van constructiebouw op het milieu  beperken."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For example: &ldquo;smart&rdquo; meters for electricity are touted for "
 "sending the power company moment-by-moment data about each customer's "
@@ -607,15 +607,15 @@
 "over elke gewenste tijdsperiode, met de het gemiddelde gebruik voor die "
 "periode. Hetzelfde voordeel, zonder surveillance!"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid "We need to design such privacy into all our digital systems."
 msgstr "We moeten zulke privacy in al onze digitale systemen inbouwen."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Collecting Data: Leaving It Dispersed"
 msgstr "Oplossing voor het verzamelen van gegevens: verspreid het"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
 "the data dispersed and inconvenient to access</a>.  Old-fashioned security "
@@ -636,7 +636,7 @@
 "misdrijf had gemeld. Het zou niet mogelijk zijn om alle videobanden elke dag "
 "fysiek te verzamelen en te bekijken of te kopi&euml;ren. "
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Nowadays, security cameras have become surveillance cameras: they are "
 "connected to the Internet so recordings can be collected in a data center "
@@ -652,7 +652,7 @@
 "leiden waarop verdachte journalisten altijd op straat kunnen worden gevolgd, "
 "waarbij bekeken kan worden met wie ze praten."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet-connected cameras often have lousy digital security themselves, "
 "which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-";
@@ -675,7 +675,7 @@
 "te publiceren, maar de systematische verzameling van zulke gegevens op het "
 "internet moet worden beperkt."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
 "points at the inside of a store, or at the street.  Any camera pointed at "
@@ -687,11 +687,11 @@
 "straat. Een camera die door iemand anders op iemands priv&eacute;terrein is "
 "gericht schendt de privacy, maar dat is een andere kwestie."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Internet Commerce Surveillance"
 msgstr "Oplossing voor internettoezicht door bedrijven"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Most data collection comes from people's own digital activities.  Usually "
 "the data is collected first by companies.  But when it comes to the threat "
@@ -706,7 +706,7 @@
 "gegevens die bedrijven verzamelen zijn sowieso al systematisch beschikbaar "
 "voor de overheid."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -736,7 +736,7 @@
 "misbruiken veel van deze bedrijven de gegevens zelf of overhandigen het aan "
 "gegevenshandelaren."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The goal of making journalism and democracy safe therefore requires that we "
 "reduce the data collected about people by any organization, not just by the "
@@ -753,7 +753,7 @@
 "transacties, mag het niet zijn toegestaan om deze langer te behouden dan een "
 "korte tijd, niet langer dan nodig om de aankoop te verwerken."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One of the motives for the current level of surveillance of the Internet is "
 "that sites are financed through advertising based on tracking users' "
@@ -772,7 +772,7 @@
 "allemaal mee bekend dat het hebben van een &ldquo;privacy-beleid&rdquo; een "
 "excuus is om privacy te schenden en niet iets om je aan te houden."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 # | We could correct both problems by adopting a system of anonymous
 # | payments&mdash;anonymous for the payer, that is.  (We don't want to help
 # | the payee dodge taxes.)  <a
@@ -817,7 +817,7 @@
 "ontwikkeld in de jaren '80</a>; we hoeven alleen geschikte afspraken te "
 "maken en een overheid die dit niet belemmert."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A further threat from sites' collection of personal data is that security "
 "breakers might get in, take it, and misuse it.  This includes customers' "
@@ -831,11 +831,11 @@
 "in een website kan jou geen schade toebrengen als de website niets over jou "
 "weet."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Travel Surveillance"
 msgstr "Oplossing voor toezicht in het verkeer en vervoer"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We must convert digital toll collection to anonymous payment (using digital "
 "cash, for instance).  License-plate recognition systems recognize all "
@@ -859,7 +859,7 @@
 "de gegevens zou moeten worden beperkt tot het zoeken naar gezochte kentekens "
 "die door een rechter op die lijst zijn geplaatst."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a href="
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
@@ -870,7 +870,7 @@
 "and-liberty-racial-justice/victory-federal-court-recognizes\">straft zonder "
 "rechtszaak</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It is acceptable to have a list of people whose person and luggage will be "
 "searched with extra care, and anonymous passengers on domestic flights could "
@@ -886,7 +886,7 @@
 "als zij dit land niet mogen binnenreizen. Dit zou genoeg moeten zijn voor "
 "alle legitieme doelen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Many mass transit systems use some kind of smart cards or RFIDs for "
 "payment.  These systems accumulate personal data: if you once make the "
@@ -902,7 +902,7 @@
 "Verder slaan ze alle reizen op die elke kaart maakt. Tezamen is dit massale "
 "surveillance. Deze gegevensverzameling moet worden ingeperkt."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Navigation services do surveillance: the user's computer tells the map "
 "service the user's location and where the user wants to go; then the server "
@@ -926,7 +926,7 @@
 "zonder dat iemand ooit wordt verteld waar de gebruiker is of waar hij heen "
 "wil gaan."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Systems for borrowing bicycles, etc., can be designed so that the borrower's "
 "identity is known only inside the station where the item was borrowed.  "
@@ -957,11 +957,11 @@
 "kwam het hoofdkantoor informeren; in een dergelijk geval kan het de "
 "identiteit van de huurder onmiddellijk versturen."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Communications Dossiers"
 msgstr "Oplossing voor communicatiedossiers"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
@@ -988,7 +988,7 @@
 "your-location\">NSA locatiegegevens van mobiele telefoons massaal verzamelt</"
 "a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unmonitored communication is impossible where systems create such dossiers.  "
 "So it should be illegal to create or keep them.  ISPs and phone companies "
@@ -1001,7 +1001,7 @@
 "deze informatie niet lang te bewaren, met uitzondering van een uitspraak van "
 "een rechter om een bepaalde partij te surveilleren."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
@@ -1024,7 +1024,7 @@
 "het geen gegevens verkrijgen van de telefoongesprekken van iedereen van voor "
 "die tijd."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy about who you exchange email with, a simple partial solution is "
 "for you and others to use email services in a country that would never "
@@ -1047,11 +1047,11 @@
 "ontvangen van een gebruiker van jouw e-maildienst, maar het zou moeilijk "
 "zijn om vast te stellen dat jij een e-mail naar mij hebt gestuurd."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "But Some Surveillance Is Necessary"
 msgstr "Een beetje toezicht is wel nodig"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For the state to find criminals, it needs to be able to investigate specific "
 "crimes, or specific suspected planned crimes, under a court order.  With the "
@@ -1072,7 +1072,7 @@
 "ontwerpen dat er geen massale dossiers worden opgebouwd v&oacute;&oacute;r "
 "het ontstaan ervan."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1097,7 +1097,7 @@
 "police-edition\">hun gebruik van dwang met 60% was verminderd</a>.  De ACLU "
 "is hier voorstander van."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1119,7 +1119,7 @@
 "gevaar van deze activiteiten (zoals de olieramp van BP, de kernramp van "
 "Fukushima, en de financi&euml;le crisis van 2008) is groter dan terrorisme."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, journalism must be protected from surveillance even when it is "
 "carried out as part of a business."
@@ -1127,7 +1127,7 @@
 "Journalistiek moet echter beschermd worden tegen elke overheidstoezicht, "
 "zelfs als het bedrijfsmatig wordt bedreven."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Digital technology has brought about a tremendous increase in the level of "
 "surveillance of our movements, actions, and communications.  It is far more "
@@ -1143,7 +1143,7 @@
 "ondervonden</a> in de jaren 80. Voorgestelde wettelijke limieten op het "
 "gebruik van verzamelde gegevens door de overheid zullen dat niet veranderen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Companies are designing even more intrusive surveillance.  Some project that "
 "pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1159,7 +1159,7 @@
 "effecten zijn niet aantoonbaar, maar de bedreiging voor de democratie is "
 "geen speculatie. Het bestaat en is vandaag de dag al zichtbaar."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unless we believe that our free countries previously suffered from a grave "
 "surveillance deficit, and ought to be surveilled more than the Soviet Union "

Index: po/surveillance-vs-democracy.pot
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.pot,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/surveillance-vs-democracy.pot    22 Oct 2016 18:29:16 -0000      1.31
+++ po/surveillance-vs-democracy.pot    6 Nov 2016 21:28:16 -0000       1.32
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -34,25 +34,25 @@
 msgid "A version of this article was first published in Wired in October 2013."
 msgstr ""
 
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
 msgid "<a href=\"/graphics/dog.html\">"
 msgstr ""
 
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
 msgid ""
 "Cartoon of a dog, wondering at the three ads that popped up on his computer "
 "screen..."
 msgstr ""
 
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
 msgid "</a>"
 msgstr ""
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Thanks to Edward Snowden's disclosures, we know that the current level of "
 "general surveillance in society is incompatible with human rights.  The "
@@ -65,7 +65,7 @@
 "likely to be caught."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Faced with government secrecy, we the people depend on whistleblowers to <a "
 "href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";>tell us what "
@@ -75,7 +75,7 @@
 "whistleblowers know they are safe."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Using free/libre software, <a "
 "href=\"/philosophy/free-software-even-more-important.html\">as I've "
@@ -91,7 +91,7 @@
 "privacy once we set foot on the Internet</a>."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a "
 
"href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\";>Bipartisan
 "
@@ -102,11 +102,11 @@
 "identify him or her.  We need to go further."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "The Upper Limit on Surveillance in a Democracy"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
 "of effective control over our government and institutions.  That's why "
@@ -114,7 +114,7 @@
 "reporter is too much surveillance&mdash;too much for democracy to endure."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
 "the <a "
@@ -131,7 +131,7 @@
 "other companies too</a>."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
@@ -143,11 +143,11 @@
 "journalist or a known dissident."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Information, Once Collected, Will Be Misused"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
@@ -161,7 +161,7 @@
 "excuse to access the accumulated material."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
 "personal reasons.  Some NSA agents <a "
@@ -179,7 +179,7 @@
 "digital systems</a>."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -191,7 +191,7 @@
 "</a>."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Personal data collected by the state is also likely to be obtained by "
 "outside crackers that break the security of the servers, even by <a "
@@ -199,14 +199,14 @@
 "working for hostile states</a>."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Governments can easily use massive surveillance capability to <a "
 
"href=\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\";>subvert
 "
 "democracy directly</a>."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Total surveillance accessible to the state enables the state to launch a "
 "massive fishing expedition against any person.  To make journalism and "
@@ -214,11 +214,11 @@
 "accessible to the state."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Robust Protection for Privacy Must Be Technical"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The Electronic Frontier Foundation and other organizations propose a set of "
 "legal principles designed to <a "
@@ -229,21 +229,21 @@
 "enforced without exception forever."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
 "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Meanwhile, demagogues will cite the usual excuses as grounds for total "
 "surveillance; any terrorist attack, even one that kills just a handful of "
 "people, can be hyped to provide an opportunity."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If limits on access to the data are set aside, it will be as if they had "
 "never existed: years worth of dossiers would suddenly become available for "
@@ -256,11 +256,11 @@
 "make sense."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "First, Don't Be Foolish"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "To have privacy, you must not throw it away: the first one who has to "
 "protect your privacy is you.  Avoid identifying yourself to web sites, "
@@ -269,7 +269,7 @@
 "email.  Pay for things with cash."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Keep your own data; don't store your data in a company's "
 "&ldquo;convenient&rdquo; server.  It's safe, however, to entrust a data "
@@ -278,7 +278,7 @@
 "software on your own computer before uploading it."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy's sake, you must avoid nonfree software since, as a consequence "
 "of giving others control of your computing, it is <a "
@@ -289,7 +289,7 @@
 "it requires you to hand over all the pertinent data to the server."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Protect your friends' and acquaintances' privacy, too.  <a "
 
"href=\"http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\";>Don't
 "
@@ -302,7 +302,7 @@
 "to surrender their privacy."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Self-protection is essential, but even the most rigorous self-protection is "
 "insufficient to protect your privacy on or from systems that don't belong to "
@@ -313,11 +313,11 @@
 "than legitimate suspects."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "We Must Design Every System for Privacy"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we don't want a total surveillance society, we must consider surveillance "
 "a kind of social pollution, and limit the surveillance impact of each new "
@@ -325,7 +325,7 @@
 "construction."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For example: &ldquo;smart&rdquo; meters for electricity are touted for "
 "sending the power company moment-by-moment data about each customer's "
@@ -339,15 +339,15 @@
 "surveillance!"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid "We need to design such privacy into all our digital systems."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Collecting Data: Leaving It Dispersed"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
 "the data dispersed and inconvenient to access</a>.  Old-fashioned security "
@@ -359,7 +359,7 @@
 "every day and watch them or copy them."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Nowadays, security cameras have become surveillance cameras: they are "
 "connected to the Internet so recordings can be collected in a data center "
@@ -369,7 +369,7 @@
 "with."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet-connected cameras often have lousy digital security themselves, "
 "which means <a "
@@ -382,7 +382,7 @@
 "accumulation of such data on the Internet must be limited."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
 "points at the inside of a store, or at the street.  Any camera pointed at "
@@ -390,11 +390,11 @@
 "another issue."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Internet Commerce Surveillance"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Most data collection comes from people's own digital activities.  Usually "
 "the data is collected first by companies.  But when it comes to the threat "
@@ -403,7 +403,7 @@
 "that the companies collect is systematically available to the state."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The NSA, through PRISM, has <a "
 "href=\"https://www.commondreams.org/headline/2013/08/23-2\";>gotten into the "
@@ -420,7 +420,7 @@
 "directly or provide it to data brokers."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The goal of making journalism and democracy safe therefore requires that we "
 "reduce the data collected about people by any organization, not just by the "
@@ -430,7 +430,7 @@
 "inherently necessary for their dealings with us."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One of the motives for the current level of surveillance of the Internet is "
 "that sites are financed through advertising based on tracking users' "
@@ -442,7 +442,7 @@
 "commitments to uphold it."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
@@ -456,7 +456,7 @@
 "suitable business arrangements, and for the state not to obstruct them."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A further threat from sites' collection of personal data is that security "
 "breakers might get in, take it, and misuse it.  This includes customers' "
@@ -465,11 +465,11 @@
 "you."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Travel Surveillance"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We must convert digital toll collection to anonymous payment (using digital "
 "cash, for instance).  License-plate recognition systems recognize all "
@@ -483,14 +483,14 @@
 "court-ordered license-numbers."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a "
 
"href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes\";>punishment
 "
 "without trial</a>."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It is acceptable to have a list of people whose person and luggage will be "
 "searched with extra care, and anonymous passengers on domestic flights could "
@@ -500,7 +500,7 @@
 "purposes."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Many mass transit systems use some kind of smart cards or RFIDs for "
 "payment.  These systems accumulate personal data: if you once make the "
@@ -510,7 +510,7 @@
 "collection must be reduced."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Navigation services do surveillance: the user's computer tells the map "
 "service the user's location and where the user wants to go; then the server "
@@ -523,7 +523,7 @@
 "telling anyone where the user is or wants to go."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Systems for borrowing bicycles, etc., can be designed so that the borrower's "
 "identity is known only inside the station where the item was borrowed.  "
@@ -540,11 +540,11 @@
 "immediately."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Communications Dossiers"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
@@ -558,7 +558,7 @@
 "collects cell phone location data</a> in bulk."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unmonitored communication is impossible where systems create such dossiers.  "
 "So it should be illegal to create or keep them.  ISPs and phone companies "
@@ -566,7 +566,7 @@
 "of a court order to surveil a certain party."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
@@ -580,7 +580,7 @@
 "prior to that time."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy about who you exchange email with, a simple partial solution is "
 "for you and others to use email services in a country that would never "
@@ -593,11 +593,11 @@
 "service, but it would be hard to determine that you had sent mail to me."
 msgstr ""
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "But Some Surveillance Is Necessary"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For the state to find criminals, it needs to be able to investigate specific "
 "crimes, or specific suspected planned crimes, under a court order.  With the "
@@ -608,7 +608,7 @@
 "prevent digital systems from accumulating massive dossiers before the fact."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -621,7 +621,7 @@
 "use of force fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a "
 
"href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations
 "
@@ -634,13 +634,13 @@
 "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, journalism must be protected from surveillance even when it is "
 "carried out as part of a business."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Digital technology has brought about a tremendous increase in the level of "
 "surveillance of our movements, actions, and communications.  It is far more "
@@ -651,7 +651,7 @@
 "that."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Companies are designing even more intrusive surveillance.  Some project that "
 "pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -661,7 +661,7 @@
 "democracy is not speculation.  It exists and is visible today."
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unless we believe that our free countries previously suffered from a grave "
 "surveillance deficit, and ought to be surveilled more than the Soviet Union "

Index: po/surveillance-vs-democracy.pt-br.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.pt-br.po,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/surveillance-vs-democracy.pt-br.po       22 Oct 2016 18:29:16 -0000      
1.8
+++ po/surveillance-vs-democracy.pt-br.po       6 Nov 2016 21:28:16 -0000       
1.9
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-09-20 07:35-0300\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -40,11 +40,11 @@
 "Uma versão deste artigo foi publicada primeiramente na Wired em Outubro de "
 "2013."
 
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
 msgid "<a href=\"/graphics/dog.html\">"
 msgstr "<a href=\"/graphics/dog.html\">"
 
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
 msgid ""
 "Cartoon of a dog, wondering at the three ads that popped up on his computer "
 "screen..."
@@ -53,15 +53,15 @@
 "em sua tela..."
 
 # type: Content of: <div><p>
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
 msgid "</a>"
 msgstr "</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "“Como eles descobriram que eu sou um cachorro?”"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Thanks to Edward Snowden's disclosures, we know that the current level of "
 "general surveillance in society is incompatible with human rights.  The "
@@ -83,7 +83,7 @@
 "democracia, na medida em que os denunciantes (como Snowden) são suscetíveis 
"
 "de ser aprisionados."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Faced with government secrecy, we the people depend on whistleblowers to <a "
 "href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";>tell us what "
@@ -99,7 +99,7 @@
 "muitos. Para recuperar nosso controle democrático sobre o estado, devemos "
 "reduzir a vigilância ao ponto que denunciantes saibam que estarão seguros."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
@@ -140,7 +140,7 @@
 "opinion/2013/10/149481/\">não protege nossa privacidade quando utilizamos a "
 "Internet</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
@@ -157,11 +157,11 @@
 "não será suficiente para proteger denunciantes, se “pegar os 
denunciantes” é "
 "motivo suficiente para identificá-lo ou identificá-la. Necessitamos ir 
além."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "The Upper Limit on Surveillance in a Democracy"
 msgstr "O Limite Máximo de Vigilância em uma Democracia"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
 "of effective control over our government and institutions.  That's why "
@@ -174,7 +174,7 @@
 "um jornalista é vigilância demais, uma vigilância que a democracia não 
pode "
 "tolerar."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "An unnamed U.S. government official ominously told journalists in 2011 "
@@ -218,7 +218,7 @@
 "nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">de outras "
 "empresas operadoras de comunicação também</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
@@ -237,11 +237,11 @@
 "excessiva é atingido quando o Estado pode identificar quem se comunicou com "
 "um jornalista ou com um dissidente conhecido."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Information, Once Collected, Will Be Misused"
 msgstr "A Informação, Uma Vez Coletada, Será Utilizada de Modo Abusivo"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
@@ -264,7 +264,7 @@
 "acesso, então uma vez que os denunciantes foram acusados de 
“espionagem”, "
 "localizar o “espião” será uma desculpa para acessar o material 
acumulado."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "In addition, the state's surveillance staff will misuse the data for "
@@ -310,7 +310,7 @@
 "theyarewatching.org/issues/risks-increase-once-data-shared\">novos sistemas "
 "digitais</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -328,7 +328,7 @@
 "citizens/\">Europa</a> e <a href=\"https://en.wikipedia.org/wiki/";
 "Japanese_American_internment\">os EUA</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Personal data collected by the state is also likely to be obtained by "
 "outside crackers that break the security of the servers, even by <a href="
@@ -342,7 +342,7 @@
 "revealed-even-worse-than-first.shtml\">crackers trabalhando para Estados "
 "hostis</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
 "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
@@ -353,7 +353,7 @@
 "is-blamed-for-wiretapping-scandal.html\">subverter diretamente a democracia</"
 "a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Total surveillance accessible to the state enables the state to launch a "
 "massive fishing expedition against any person.  To make journalism and "
@@ -365,11 +365,11 @@
 "jornalismo e a democracia seguros, necessitamos limitar a acumulação de "
 "dados que está facilmente acessível ao Estado."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Robust Protection for Privacy Must Be Technical"
 msgstr "Proteção Robusta para a Privacidade Deve Ser Técnica"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The Electronic Frontier Foundation and other organizations propose a set of "
 "legal principles designed to <a href=\"https://en.necessaryandproportionate.";
@@ -386,7 +386,7 @@
 "proteção das liberdades democráticas — se adotados completamente e "
 "reforçados sem exceção para sempre."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -397,7 +397,7 @@
 "suspensas ou <a href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html";
 "\">ignoradas</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Meanwhile, demagogues will cite the usual excuses as grounds for total "
 "surveillance; any terrorist attack, even one that kills just a handful of "
@@ -408,7 +408,7 @@
 "apenas alguma pequena porção de pessoas, pode ser extravasada para fornecer 
"
 "uma oportunidade."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If limits on access to the data are set aside, it will be as if they had "
 "never existed: years worth of dossiers would suddenly become available for "
@@ -430,11 +430,11 @@
 "data. Quanto a suspender ou momentaneamente ignorar essa lei, a ideia "
 "dificilmente faria sentido."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "First, Don't Be Foolish"
 msgstr "Primeiramente, Não Seja Tolo"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "To have privacy, you must not throw it away: the first one who has to "
 "protect your privacy is you.  Avoid identifying yourself to web sites, "
@@ -448,7 +448,7 @@
 "rastrear visitantes. Use o GNU Privacy Guard (GPG) para criptografar os "
 "conteúdos de seu e-mail. Pague por coisas com dinheiro."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Keep your own data; don't store your data in a company's &ldquo;"
 "convenient&rdquo; server.  It's safe, however, to entrust a data backup to a "
@@ -462,7 +462,7 @@
 "criptografe todo o pacote, incluindo os nomes dos arquivos, com software "
 "libre em seu próprio computadores antes de enviá-lo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy's sake, you must avoid nonfree software since, as a consequence "
 "of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -479,7 +479,7 @@
 "outros o controle de seu computador, isso requer que você entregue todos os "
 "dados pertinentes do servidor."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -501,7 +501,7 @@
 "usuários forneça seus nomes reais, mesmo se você vai informar o seu, já 
que "
 "eles pressionam outras pessoas a abrir mão de sua privacidade."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Self-protection is essential, but even the most rigorous self-protection is "
 "insufficient to protect your privacy on or from systems that don't belong to "
@@ -519,11 +519,11 @@
 "todos eles. Claramente, a melhor solução é fazer com que todos esses "
 "sistemas parem de vigiar pessoas além dos legitimamente suspeitos."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "We Must Design Every System for Privacy"
 msgstr "Nós Devemos Projetar Todo Sistema para Privacidade"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we don't want a total surveillance society, we must consider surveillance "
 "a kind of social pollution, and limit the surveillance impact of each new "
@@ -535,7 +535,7 @@
 "vigilância de cada novo sistema digital da mesma forma que nós limitamos o "
 "impacto ambiental de uma construção física."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For example: &ldquo;smart&rdquo; meters for electricity are touted for "
 "sending the power company moment-by-moment data about each customer's "
@@ -559,16 +559,16 @@
 "qualquer período desejado de tempo, com o padrão de uso médio para aquele "
 "período. O mesmo benefício, com nenhuma vigilância!"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid "We need to design such privacy into all our digital systems."
 msgstr ""
 "Nós precisamos projetar tal privacidade em todos os nossos sistemas 
digitais."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Collecting Data: Leaving It Dispersed"
 msgstr "Remédio para Coleta de Dados: Deixá-los Dispersos"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
 "the data dispersed and inconvenient to access</a>.  Old-fashioned security "
@@ -588,7 +588,7 @@
 "locais onde alguém relatou um crime. Não seria realizável coletar "
 "fisicamente milhões de fitas todo o dia e assisti-las ou copiá-las."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Nowadays, security cameras have become surveillance cameras: they are "
 "connected to the Internet so recordings can be collected in a data center "
@@ -604,7 +604,7 @@
 "que jornalistas suspeitos podem ser rastreados na rua todo o tempo para ver "
 "com quem eles conversam."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet-connected cameras often have lousy digital security themselves, "
 "which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-";
@@ -627,7 +627,7 @@
 "vídeo ocasionalmente, mas a acumulação sistemática de tais dados na 
Internet "
 "deve ser limitada."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
 "points at the inside of a store, or at the street.  Any camera pointed at "
@@ -639,11 +639,11 @@
 "aponte para o espaço privado de alguém por outra pessoa está violando a "
 "privacidade do primeiro, mas isto é uma outra questão."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Internet Commerce Surveillance"
 msgstr "Remédio para a Vigilância Comercial da Internet"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Most data collection comes from people's own digital activities.  Usually "
 "the data is collected first by companies.  But when it comes to the threat "
@@ -658,7 +658,7 @@
 "os dados que as empresas coletam está sistematicamente disponível para o "
 "Estado."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -690,7 +690,7 @@
 "ou os fornecem para <i>data brokers“</i><sup><a 
href=\"#TransNote3\">3</a></"
 "sup>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The goal of making journalism and democracy safe therefore requires that we "
 "reduce the data collected about people by any organization, not just by the "
@@ -707,7 +707,7 @@
 "mantê-los mais do que um curto período de tempo além do que é "
 "intrinsecamente necessário para suas negociações conosco."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One of the motives for the current level of surveillance of the Internet is "
 "that sites are financed through advertising based on tracking users' "
@@ -725,7 +725,7 @@
 "todos nós estamos sabendo que ”políticas de privacidade“ são mais 
desculpas "
 "para violação de privacidade do que compromisso de cumprimento."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "We could correct both problems by adopting a system of anonymous "
@@ -758,7 +758,7 @@
 "\">dinheiro digital foi primeiramente nos anos 80s</a>; nós só precisamos 
de "
 "organizar um negócio adequado, e que o Estado não o obstrua."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A further threat from sites' collection of personal data is that security "
 "breakers might get in, take it, and misuse it.  This includes customers' "
@@ -771,11 +771,11 @@
 "sistema de pagamento anônimo exigiriam o fim desse perigo: um buraco de "
 "segurança em um site não pode machucar se o site sabe nada sobre você."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Travel Surveillance"
 msgstr "Remédio para Vigilância em Viagens"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We must convert digital toll collection to anonymous payment (using digital "
 "cash, for instance).  License-plate recognition systems recognize all "
@@ -798,7 +798,7 @@
 "dados todos disponíveis na Internet; acesso aos dados deveria ser limitado a 
"
 "pesquisar por uma lista de números de placas sob ordem judicial."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a href="
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
@@ -808,7 +808,7 @@
 "<a href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-";
 "racial-justice/victory-federal-court-recognizes\">punição sem 
julgamento</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It is acceptable to have a list of people whose person and luggage will be "
 "searched with extra care, and anonymous passengers on domestic flights could "
@@ -824,7 +824,7 @@
 "voos desde o embarque até o país. Isso seria suficiente para todos "
 "propósitos legítimos."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Many mass transit systems use some kind of smart cards or RFIDs for "
 "payment.  These systems accumulate personal data: if you once make the "
@@ -841,7 +841,7 @@
 "Juntando tudo, eles acumulam muito para a vigilância massiva. A coleta "
 "desses dados deve ser reduzida."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Navigation services do surveillance: the user's computer tells the map "
 "service the user's location and where the user wants to go; then the server "
@@ -864,7 +864,7 @@
 "anteriormente), computar a rota, e exibi-la, sem repassar a ninguém onde o "
 "usuários está e aonde deseja ir."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Systems for borrowing bicycles, etc., can be designed so that the borrower's "
 "identity is known only inside the station where the item was borrowed.  "
@@ -894,11 +894,11 @@
 "central; neste caso, ela poderia enviar a identidade do locatário "
 "imediatamente."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Communications Dossiers"
 msgstr "Remédio para Dossiês de Comunicação"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
@@ -925,7 +925,7 @@
 "sounds-nsa-tracking-your-location\">NSA coleta dados da localização de "
 "telefone celular</a> em massa."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unmonitored communication is impossible where systems create such dossiers.  "
 "So it should be illegal to create or keep them.  ISPs and phone companies "
@@ -937,7 +937,7 @@
 "telefonia devem não ser permitidas de manter essa informação por muito "
 "tempo, na ausência de uma ordem judicial para vigiar uma determinada pessoa."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
@@ -961,7 +961,7 @@
 "dados de todo mundo sobre as chamadas telefônicas feitas anteriormente a "
 "este período."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy about who you exchange email with, a simple partial solution is "
 "for you and others to use email services in a country that would never "
@@ -983,11 +983,11 @@
 "mail de alguns de meus usuários de seu serviço de e-mail, mas que seria "
 "difícil determinar que você enviou um e-mail para mim."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "But Some Surveillance Is Necessary"
 msgstr "Mas Alguma Vigilância É Necessária"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For the state to find criminals, it needs to be able to investigate specific "
 "crimes, or specific suspected planned crimes, under a court order.  With the "
@@ -1006,7 +1006,7 @@
 "denunciantes após o fato, se (como eu recomendo) nós proibirmos que os "
 "sistemas digitais acumulem dossiês massivos antes do fato."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1032,7 +1032,7 @@
 "police-edition\">eles seu uso de força caiu em 60%</a>;. A ACLU concorda com 
"
 "isto."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1054,7 +1054,7 @@
 "vazamento de óleo da petroleira BP, colapsos de Fukushima e as crises "
 "fiscais em 2008) superam o terrorismo."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, journalism must be protected from surveillance even when it is "
 "carried out as part of a business."
@@ -1062,7 +1062,7 @@
 "Porém, jornalismo deve ser protegido da vigilância mesmo quando esta é 
parte "
 "de um negócio."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Digital technology has brought about a tremendous increase in the level of "
 "surveillance of our movements, actions, and communications.  It is far more "
@@ -1078,7 +1078,7 @@
 "Cortina de Ferro experimentaram</a> nos anos 80s, e os limites legais "
 "propostos para o uso do Estado dos dados acumulados em nada alterariam."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Companies are designing even more intrusive surveillance.  Some project that "
 "pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1094,7 +1094,7 @@
 "pessoas pensam</a>. Tais possibilidades são imponderáveis; mas a ameaça à 
"
 "democracia não é especulação. Ela existe e está visível hoje."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unless we believe that our free countries previously suffered from a grave "
 "surveillance deficit, and ought to be surveilled more than the Soviet Union "

Index: po/surveillance-vs-democracy.ru-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ru-en.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- po/surveillance-vs-democracy.ru-en.html     23 Oct 2016 10:58:35 -0000      
1.21
+++ po/surveillance-vs-democracy.ru-en.html     6 Nov 2016 21:28:16 -0000       
1.22
@@ -2,19 +2,31 @@
 <!-- Parent-Version: 1.77 -->
 <title>How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+--></style>
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
 
-<p>by <a href="http://www.stallman.org/";>Richard Stallman</a></p>
+<p class="byline center">by <a href="http://www.stallman.org/";>Richard 
Stallman</a></p>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
-<blockquote><p>A version of this article was first published in Wired
+<blockquote class="center"><p>A version of this article was first published in 
Wired
 in October 2013.</p></blockquote>
 
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /></a>
 <p>&ldquo;How did they find out I'm a dog?&rdquo;</p>
@@ -30,7 +42,8 @@
 is not exceeded?  It is the level beyond which surveillance starts to
 interfere with the functioning of democracy, in that whistleblowers
 (such as Snowden) are likely to be caught.</p>
-
+</div>
+<div class="columns" style="clear:both">
 <p>Faced with government secrecy, we the people depend on
 whistleblowers
 to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";>tell
@@ -60,9 +73,11 @@
 suffice to protect whistleblowers if &ldquo;catching the
 whistleblower&rdquo; is grounds for access sufficient to identify him
 or her.  We need to go further.</p>
+</div>
 
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a 
Democracy</h3>
 
+<div class="columns">
 <p>If whistleblowers don't dare reveal crimes and lies, we lose the
 last shred of effective control over our government and institutions.
 That's why surveillance that enables the state to find out who has
@@ -91,9 +106,11 @@
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.</p>
+</div>
 
-<h3>Information, Once Collected, Will Be Misused</h3>
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
 
+<div  class="columns">
 <p>When people recognize that the level of general surveillance is too
 high, the first response is to propose limits on access to the
 accumulated data.  That sounds nice, but it won't fix the problem, not
@@ -140,9 +157,11 @@
 launch a massive fishing expedition against any person.  To make
 journalism and democracy safe, we must limit the accumulation of data
 that is easily accessible to the state.</p>
+</div>
 
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
 
+<div class="columns">
 <p>The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to <a
 href="https://en.necessaryandproportionate.org/text";>prevent the
@@ -170,9 +189,11 @@
 regime would have to implement surveillance afresh, and it would only
 collect data starting at that date.  As for suspending or momentarily
 ignoring this law, the idea would hardly make sense.</p>
+</div>
 
-<h3>First, Don't Be Foolish</h3>
+<h3 class="subheader">First, Don't Be Foolish</h3>
 
+<div class="columns">
 <p>To have privacy, you must not throw it away: the first one who has
 to protect your privacy is you.  Avoid identifying yourself to web
 sites, contact them with Tor, and use browsers that block the schemes
@@ -213,9 +234,11 @@
 movements, but not all of them.  Clearly, the better solution is to
 make all these systems stop surveilling people other than legitimate
 suspects.</p>
+</div>
 
-<h3>We Must Design Every System for Privacy</h3>
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
 
+<div class="columns">
 <p>If we don't want a total surveillance society, we must consider
 surveillance a kind of social pollution, and limit the surveillance
 impact of each new digital system just as we limit the environmental
@@ -233,9 +256,11 @@
 period.  The same benefit, with no surveillance!</p>
 
 <p>We need to design such privacy into all our digital systems.</p>
+</div>
 
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
 
+<div class="columns">
 <p>One way to make monitoring safe for privacy is
 to <a name="dispersal">keep the data dispersed and inconvenient to
 access</a>.  Old-fashioned security cameras were no threat to privacy(<a 
href="#privatespace">*</a>).
@@ -267,9 +292,11 @@
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.</p>
+</div>
 
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce 
Surveillance</h3>
 
+<div class="columns">
 <p>Most data collection comes from people's own digital activities.
 Usually the data is collected first by companies.  But when it comes
 to the threat to privacy and democracy, it makes no difference whether
@@ -325,9 +352,11 @@
 customers' credit card details.  An anonymous payment system would end
 this danger: a security hole in the site can't hurt you if the site
 knows nothing about you.</p>
+</div>
 
-<h3>Remedy for Travel Surveillance</h3>
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
 
+<div class="columns">
 <p>We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
 recognize all license plates, and
@@ -382,9 +411,11 @@
 remains &ldquo;out&rdquo; for too long, the station where it was
 borrowed can inform headquarters; in that case, it could send the
 borrower's identity immediately.</p>
+</div>
 
-<h3>Remedy for Communications Dossiers</h3>
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
 
+<div class="columns">
 <p>Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
@@ -422,9 +453,11 @@
 some user of my email service, and my email service would know only
 that I received mail from some user of your email service, but it
 would be hard to determine that you had sent mail to me.</p>
+</div>
 
-<h3>But Some Surveillance Is Necessary</h3>
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
 
+<div class="columns">
 <p>For the state to find criminals, it needs to be able to investigate
 specific crimes, or specific suspected planned crimes, under a court
 order.  With the Internet, the power to tap phone conversations would
@@ -458,9 +491,10 @@
 
 <p>However, journalism must be protected from surveillance even when
 it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
 
-<hr />
-
+<div class="reduced-width">
 <p>Digital technology has brought about a tremendous increase in the
 level of surveillance of our movements, actions, and communications.
 It is far more than we experienced in the 1990s, and <a
@@ -480,6 +514,8 @@
 a grave surveillance deficit, and ought to be surveilled more than the
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -538,7 +574,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/10/23 10:58:35 $
+$Date: 2016/11/06 21:28:16 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/surveillance-vs-democracy.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ru.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- po/surveillance-vs-democracy.ru.po  23 Oct 2016 10:58:35 -0000      1.59
+++ po/surveillance-vs-democracy.ru.po  6 Nov 2016 21:28:16 -0000       1.60
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-10-23 09:27+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -39,11 +39,11 @@
 "Первая версия этой статьи была 
опубликована в октябре 2013&nbsp;года в "
 "&ldquo;Уайеред&rdquo;."
 
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
 msgid "<a href=\"/graphics/dog.html\">"
 msgstr "<a href=\"/graphics/dog.html\">"
 
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
 msgid ""
 "Cartoon of a dog, wondering at the three ads that popped up on his computer "
 "screen..."
@@ -51,15 +51,15 @@
 "Карикатура: собака с удивлением смотрит 
на рекламу, выскочившую на экране ее "
 "компьютера"
 
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
 msgid "</a>"
 msgstr "</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "&ldquo;Как они узнали, что я&nbsp;&mdash; 
собака?&rdquo;"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Thanks to Edward Snowden's disclosures, we know that the current level of "
 "general surveillance in society is incompatible with human rights.  The "
@@ -81,7 +81,7 @@
 "слежка начинает вмешиваться в 
функционирование демократии, когда "
 "осведомителей (таких как Сноуден), как 
правило, отлавливают."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Faced with government secrecy, we the people depend on whistleblowers to <a "
 "href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";>tell us what "
@@ -98,7 +98,7 @@
 "государством, мы должны сократить слежку 
до величины, при которой "
 "осведомители будут знать, что они в 
безопасности."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -127,7 +127,7 @@
 "wired.com/opinion/2013/10/149481/\"> это не защитит нашу 
частную жизнь, "
 "когда мы выходим в Интернет</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
@@ -145,11 +145,11 @@
 "поимка осведомителя&rdquo; становится 
основанием для доступа к данным, "
 "позволяющим идентифицировать его. Нам 
нужно идти дальше."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "The Upper Limit on Surveillance in a Democracy"
 msgstr "Верхний предел слежки при демократии"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
 "of effective control over our government and institutions.  That's why "
@@ -162,7 +162,7 @@
 "государству узнавать, кто говорил с 
журналистом, слишком велика&nbsp;&mdash; "
 "слишком велика, чтобы демократия могла ее 
выдержать."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
 "the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
@@ -191,7 +191,7 @@
 "marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
 "verizon-2013-06-07\"> а также от других компаний</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
@@ -210,11 +210,11 @@
 "становится слишком велика&nbsp;&mdash; это 
точка, в которой государство "
 "может узнать, кто говорил с известным 
журналистом или известным диссидентом."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Information, Once Collected, Will Be Misused"
 msgstr "Однажды собранными сведениями будут 
злоупотреблять"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
@@ -238,7 +238,7 @@
 "обвинят в &ldquo;шпионаже&rdquo;, поиск 
&ldquo;шпиона&rdquo; станет поводом "
 "для доступа к накопленному материалу."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
 "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
@@ -270,7 +270,7 @@
 "risks-increase-once-data-shared\">ширится с появлением 
новых цифровых "
 "систем</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -287,7 +287,7 @@
 "will-always-be-used-against-the-citizens/\">примеры из 
Европы</a> и <a href="
 "\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>США</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Personal data collected by the state is also likely to be obtained by "
 "outside crackers that break the security of the servers, even by <a href="
@@ -301,7 +301,7 @@
 "revealed-even-worse-than-first.shtml\">взломщиков, 
работающих на враждебные "
 "государства</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
 "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
@@ -312,7 +312,7 @@
 "government-is-blamed-for-wiretapping-scandal.html\">напрямую 
подчинить себе "
 "демократию</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Total surveillance accessible to the state enables the state to launch a "
 "massive fishing expedition against any person.  To make journalism and "
@@ -324,11 +324,11 @@
 "журналистику и демократию, мы должны 
ограничить сбор данных, которые будут "
 "легко доступны государству."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Robust Protection for Privacy Must Be Technical"
 msgstr "Стойкая защита личной жизни должна 
быть технической"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The Electronic Frontier Foundation and other organizations propose a set of "
 "legal principles designed to <a href=\"https://en.necessaryandproportionate.";
@@ -345,7 +345,7 @@
 "свобод&nbsp;&mdash; если их примут в полном 
объеме и будут соблюдать всегда "
 "и без исключений."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -356,7 +356,7 @@
 "может быть приостановлено, наконец их 
могут <a href=\"http://www.nytimes.";
 "com/2009/04/16/us/16nsa.html\"> игнорировать</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Meanwhile, demagogues will cite the usual excuses as grounds for total "
 "surveillance; any terrorist attack, even one that kills just a handful of "
@@ -366,7 +366,7 @@
 "оснований для тотальной слежки; любой 
террористический акт, даже если в нем "
 "погибнет всего несколько человек, может 
использоваться ими как повод."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If limits on access to the data are set aside, it will be as if they had "
 "never existed: years worth of dossiers would suddenly become available for "
@@ -388,11 +388,11 @@
 "момента. Что касается приостановки 
действия или игнорирования этого закона, "
 "то эта идея едва ли имеет смысл."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "First, Don't Be Foolish"
 msgstr "Во-первых, не быть дураками"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "To have privacy, you must not throw it away: the first one who has to "
 "protect your privacy is you.  Avoid identifying yourself to web sites, "
@@ -407,7 +407,7 @@
 "отслеживания посетителей. Применяйте GNU 
Privacy Guard для шифрования "
 "содержимого своей электронной почты. 
Оплачивайте покупки наличными."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Keep your own data; don't store your data in a company's &ldquo;"
 "convenient&rdquo; server.  It's safe, however, to entrust a data backup to a "
@@ -421,7 +421,7 @@
 "весь этот архив, в том числе имена файлов, 
на своем компьютере с помощью "
 "свободных программ перед тем, как 
отправлять их на сервер."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy's sake, you must avoid nonfree software since, as a consequence "
 "of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -438,7 +438,7 @@
 "вычислениями, это требует от вас 
предоставления всех обрабатываемых данных 
"
 "на сервер."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -461,7 +461,7 @@
 "свои настоящие имена, даже если вы 
собираетесь назвать свои, поскольку это "
 "поощряет других людей отказаться от своей 
конфиденциальности."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Self-protection is essential, but even the most rigorous self-protection is "
 "insufficient to protect your privacy on or from systems that don't belong to "
@@ -479,11 +479,11 @@
 "но не все их. Ясно, что лучше было бы 
заставить все эти системы прекратить "
 "слежку за людьми, за исключением законно 
подозреваемых."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "We Must Design Every System for Privacy"
 msgstr "Каждую систему нужно проектировать с 
учетом конфиденциальности"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we don't want a total surveillance society, we must consider surveillance "
 "a kind of social pollution, and limit the surveillance impact of each new "
@@ -495,7 +495,7 @@
 "каждой новой цифровой системы точно так 
же, как мы ограничиваем воздействие "
 "физических сооружений на окружающую 
среду."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For example: &ldquo;smart&rdquo; meters for electricity are touted for "
 "sending the power company moment-by-moment data about each customer's "
@@ -519,16 +519,16 @@
 "за нужный период со средним графиком расх
ода за этот период. То же самое, "
 "только без слежки!"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid "We need to design such privacy into all our digital systems."
 msgstr ""
 "Нам надо встраивать такую 
конфиденциальность во все наши цифровые 
системы."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Collecting Data: Leaving It Dispersed"
 msgstr "Мера против сбора данных: оставлять их 
рассредоточенными"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
 "the data dispersed and inconvenient to access</a>.  Old-fashioned security "
@@ -548,7 +548,7 @@
 "местах, где кто-то сообщал о преступлении. 
Было физически невозможно "
 "собирать каждый день миллионы лент, а 
затем просматривать или копировать их."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Nowadays, security cameras have become surveillance cameras: they are "
 "connected to the Internet so recordings can be collected in a data center "
@@ -564,7 +564,7 @@
 "подозреваемых журналистов смогут 
постоянно отслеживать на улице, чтобы "
 "увидеть, с кем они общаются."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet-connected cameras often have lousy digital security themselves, "
 "which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-";
@@ -587,7 +587,7 @@
 "публиковать иногда фото- и видеозаписи, но 
систематическое накопление таких "
 "данных в Интернете должно ограничиваться."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
 "points at the inside of a store, or at the street.  Any camera pointed at "
@@ -599,11 +599,11 @@
 "направленная в чье-то личное пространство 
кем-то другим, вторгается в личную "
 "жизнь, но это другой вопрос."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Internet Commerce Surveillance"
 msgstr "Меры против коммерческой слежки в 
Интернете"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Most data collection comes from people's own digital activities.  Usually "
 "the data is collected first by companies.  But when it comes to the threat "
@@ -618,7 +618,7 @@
 "потому что данные, которые собирают 
компании, систематически доступны "
 "государству."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -648,7 +648,7 @@
 "который они же и наносят, собирая эти 
данные. Кроме того, многие из этих "
 "компаний напрямую злоупотребляют 
данными, продавая их на бирже данных."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The goal of making journalism and democracy safe therefore requires that we "
 "reduce the data collected about people by any organization, not just by the "
@@ -665,7 +665,7 @@
 "дольше, чем короткое время сверх того, что 
принципиально необходимо в их "
 "работе с нами."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One of the motives for the current level of surveillance of the Internet is "
 "that sites are financed through advertising based on tracking users' "
@@ -685,7 +685,7 @@
 "конфиденциальности&rdquo; представляют 
собой скорее оправдания для нарушения "
 "конфиденциальности, чем намерения 
соблюдать ее."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
@@ -709,7 +709,7 @@
 "предприятий, которые занимались бы этим, и 
государства, которое не "
 "препятствовало бы этому."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A further threat from sites' collection of personal data is that security "
 "breakers might get in, take it, and misuse it.  This includes customers' "
@@ -722,11 +722,11 @@
 "покончила бы с этой угрозой: брешь в 
защите сайта не может повредить вам, "
 "когда сайт ничего о вас не знает."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Travel Surveillance"
 msgstr "Меры против слежки за передвижениями"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We must convert digital toll collection to anonymous payment (using digital "
 "cash, for instance).  License-plate recognition systems recognize all "
@@ -749,7 +749,7 @@
 "Интернету; доступ к данным должен быть 
ограничен списком номеров автомобилей "
 "в розыске."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a href="
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
@@ -759,7 +759,7 @@
 "href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-";
 "racial-justice/victory-federal-court-recognizes\"> наказание без 
суда</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It is acceptable to have a list of people whose person and luggage will be "
 "searched with extra care, and anonymous passengers on domestic flights could "
@@ -774,7 +774,7 @@
 "вообще не разрешен въезд в страну, посадку 
на рейсы с посадками в этой "
 "стране. Этого должно быть достаточно для 
всех законных целей."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Many mass transit systems use some kind of smart cards or RFIDs for "
 "payment.  These systems accumulate personal data: if you once make the "
@@ -790,7 +790,7 @@
 "связанные с каждой картой. Все это вместе 
составляет систему массовой "
 "слежки. Сбор этих данных нужно сократить."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Navigation services do surveillance: the user's computer tells the map "
 "service the user's location and where the user wants to go; then the server "
@@ -813,7 +813,7 @@
 "(если они еще не получены), прокладывать 
маршрут и отображать его, не "
 "передавая никуда местоположения 
пользователя и пункт назначения."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Systems for borrowing bicycles, etc., can be designed so that the borrower's "
 "identity is known only inside the station where the item was borrowed.  "
@@ -843,11 +843,11 @@
 "взяли, может проинформировать центр; в 
этом случае она могла бы немедленно "
 "сообщить о личности того, кто взял эту 
единицу."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Communications Dossiers"
 msgstr "Меры против коммуникационных досье"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
@@ -875,7 +875,7 @@
 "безопасности собирает данные о 
местоположении сотовых телефонов</a> в "
 "массовых количествах."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unmonitored communication is impossible where systems create such dossiers.  "
 "So it should be illegal to create or keep them.  ISPs and phone companies "
@@ -888,7 +888,7 @@
 "долго, если только наблюдение за 
определенным лицом не установлено в "
 "судебном порядке."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
@@ -911,7 +911,7 @@
 "рода слежку, оно не получило бы данные о 
телефонных переговорах каждого, "
 "проведенных до этого времени."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy about who you exchange email with, a simple partial solution is "
 "for you and others to use email services in a country that would never "
@@ -933,11 +933,11 @@
 "какому-то пользователю моей службы 
электронной почты, но было бы трудно "
 "определить, что вы послали сообщение мне."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "But Some Surveillance Is Necessary"
 msgstr "Но иногда слежка необходима"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For the state to find criminals, it needs to be able to investigate specific "
 "crimes, or specific suspected planned crimes, under a court order.  With the "
@@ -956,7 +956,7 @@
 "(как я рекомендовал) мы предотвратим 
предварительное массовое накопление "
 "досье цифровыми системами."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -982,7 +982,7 @@
 "police-edition\"> применение силы полицейскими 
сократилось на 60%</a>. ACLU "
 "поддерживает это."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1006,7 +1006,7 @@
 "нефти BP, аварию на АЭС в Фукусиме и 
финансовый кризис 2008&nbsp;года) "
 "угроза терроризма исчезающе мала."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, journalism must be protected from surveillance even when it is "
 "carried out as part of a business."
@@ -1014,7 +1014,7 @@
 "Однако журналистику нужно защищать от 
наблюдения, даже если она ведется в "
 "ходе предпринимательской деятельности."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Digital technology has brought about a tremendous increase in the level of "
 "surveillance of our movements, actions, and communications.  It is far more "
@@ -1032,7 +1032,7 @@
 "ограничения на применение государством 
накопленных данных этого не изменили "
 "бы."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Companies are designing even more intrusive surveillance.  Some project that "
 "pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1048,7 +1048,7 @@
 "людей</a>. Такие возможности трудно 
взвесить; но угроза демократии&nbsp;"
 "&mdash; не вымысел. Сегодня она существует и 
вполне ощутима."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unless we believe that our free countries previously suffered from a grave "
 "surveillance deficit, and ought to be surveilled more than the Soviet Union "

Index: po/surveillance-vs-democracy.sq-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.sq-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/surveillance-vs-democracy.sq-en.html     1 Nov 2016 17:27:59 -0000       
1.15
+++ po/surveillance-vs-democracy.sq-en.html     6 Nov 2016 21:28:16 -0000       
1.16
@@ -2,19 +2,31 @@
 <!-- Parent-Version: 1.77 -->
 <title>How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+--></style>
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
 
-<p>by <a href="http://www.stallman.org/";>Richard Stallman</a></p>
+<p class="byline center">by <a href="http://www.stallman.org/";>Richard 
Stallman</a></p>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
-<blockquote><p>A version of this article was first published in Wired
+<blockquote class="center"><p>A version of this article was first published in 
Wired
 in October 2013.</p></blockquote>
 
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /></a>
 <p>&ldquo;How did they find out I'm a dog?&rdquo;</p>
@@ -30,7 +42,8 @@
 is not exceeded?  It is the level beyond which surveillance starts to
 interfere with the functioning of democracy, in that whistleblowers
 (such as Snowden) are likely to be caught.</p>
-
+</div>
+<div class="columns" style="clear:both">
 <p>Faced with government secrecy, we the people depend on
 whistleblowers
 to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";>tell
@@ -60,9 +73,11 @@
 suffice to protect whistleblowers if &ldquo;catching the
 whistleblower&rdquo; is grounds for access sufficient to identify him
 or her.  We need to go further.</p>
+</div>
 
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a 
Democracy</h3>
 
+<div class="columns">
 <p>If whistleblowers don't dare reveal crimes and lies, we lose the
 last shred of effective control over our government and institutions.
 That's why surveillance that enables the state to find out who has
@@ -91,9 +106,11 @@
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.</p>
+</div>
 
-<h3>Information, Once Collected, Will Be Misused</h3>
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
 
+<div  class="columns">
 <p>When people recognize that the level of general surveillance is too
 high, the first response is to propose limits on access to the
 accumulated data.  That sounds nice, but it won't fix the problem, not
@@ -140,9 +157,11 @@
 launch a massive fishing expedition against any person.  To make
 journalism and democracy safe, we must limit the accumulation of data
 that is easily accessible to the state.</p>
+</div>
 
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
 
+<div class="columns">
 <p>The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to <a
 href="https://en.necessaryandproportionate.org/text";>prevent the
@@ -170,9 +189,11 @@
 regime would have to implement surveillance afresh, and it would only
 collect data starting at that date.  As for suspending or momentarily
 ignoring this law, the idea would hardly make sense.</p>
+</div>
 
-<h3>First, Don't Be Foolish</h3>
+<h3 class="subheader">First, Don't Be Foolish</h3>
 
+<div class="columns">
 <p>To have privacy, you must not throw it away: the first one who has
 to protect your privacy is you.  Avoid identifying yourself to web
 sites, contact them with Tor, and use browsers that block the schemes
@@ -213,9 +234,11 @@
 movements, but not all of them.  Clearly, the better solution is to
 make all these systems stop surveilling people other than legitimate
 suspects.</p>
+</div>
 
-<h3>We Must Design Every System for Privacy</h3>
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
 
+<div class="columns">
 <p>If we don't want a total surveillance society, we must consider
 surveillance a kind of social pollution, and limit the surveillance
 impact of each new digital system just as we limit the environmental
@@ -233,9 +256,11 @@
 period.  The same benefit, with no surveillance!</p>
 
 <p>We need to design such privacy into all our digital systems.</p>
+</div>
 
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
 
+<div class="columns">
 <p>One way to make monitoring safe for privacy is
 to <a name="dispersal">keep the data dispersed and inconvenient to
 access</a>.  Old-fashioned security cameras were no threat to privacy(<a 
href="#privatespace">*</a>).
@@ -267,9 +292,11 @@
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.</p>
+</div>
 
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce 
Surveillance</h3>
 
+<div class="columns">
 <p>Most data collection comes from people's own digital activities.
 Usually the data is collected first by companies.  But when it comes
 to the threat to privacy and democracy, it makes no difference whether
@@ -325,9 +352,11 @@
 customers' credit card details.  An anonymous payment system would end
 this danger: a security hole in the site can't hurt you if the site
 knows nothing about you.</p>
+</div>
 
-<h3>Remedy for Travel Surveillance</h3>
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
 
+<div class="columns">
 <p>We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
 recognize all license plates, and
@@ -382,9 +411,11 @@
 remains &ldquo;out&rdquo; for too long, the station where it was
 borrowed can inform headquarters; in that case, it could send the
 borrower's identity immediately.</p>
+</div>
 
-<h3>Remedy for Communications Dossiers</h3>
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
 
+<div class="columns">
 <p>Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
@@ -422,9 +453,11 @@
 some user of my email service, and my email service would know only
 that I received mail from some user of your email service, but it
 would be hard to determine that you had sent mail to me.</p>
+</div>
 
-<h3>But Some Surveillance Is Necessary</h3>
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
 
+<div class="columns">
 <p>For the state to find criminals, it needs to be able to investigate
 specific crimes, or specific suspected planned crimes, under a court
 order.  With the Internet, the power to tap phone conversations would
@@ -458,9 +491,10 @@
 
 <p>However, journalism must be protected from surveillance even when
 it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
 
-<hr />
-
+<div class="reduced-width">
 <p>Digital technology has brought about a tremendous increase in the
 level of surveillance of our movements, actions, and communications.
 It is far more than we experienced in the 1990s, and <a
@@ -480,6 +514,8 @@
 a grave surveillance deficit, and ought to be surveilled more than the
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -538,7 +574,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/11/01 17:27:59 $
+$Date: 2016/11/06 21:28:16 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/surveillance-vs-democracy.sq.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.sq.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- po/surveillance-vs-democracy.sq.po  1 Nov 2016 17:27:59 -0000       1.57
+++ po/surveillance-vs-democracy.sq.po  6 Nov 2016 21:28:16 -0000       1.58
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Besnik Bleta <address@hidden>\n"
 "Language-Team: \n"
@@ -36,11 +36,11 @@
 msgid "A version of this article was first published in Wired in October 2013."
 msgstr "Një version i këtij artikulli u botua së pari në Wired, në Tetor 
2013."
 
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
 msgid "<a href=\"/graphics/dog.html\">"
 msgstr "<a href=\"/graphics/dog.html\">"
 
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
 msgid ""
 "Cartoon of a dog, wondering at the three ads that popped up on his computer "
 "screen..."
@@ -48,15 +48,15 @@
 "Karikaturë e një qeni që hap sytë i çuditur para tre reklamave që u 
shfaqën "
 "në ekranin e tij të kompjuterit..."
 
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
 msgid "</a>"
 msgstr "</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr "&ldquo;Nga e morën vesh që jam qen?&rdquo;"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Thanks to Edward Snowden's disclosures, we know that the current level of "
 "general surveillance in society is incompatible with human rights.  The "
@@ -78,7 +78,7 @@
 "mbikëqyrja fillon e plekset me funksionimin e demokracisë, pra kur "
 "nxjerrësit e sekreteve (të tillë si Snowden-i) ka shumë gjasa të 
zbulohen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Faced with government secrecy, we the people depend on whistleblowers to <a "
 "href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";>tell us what "
@@ -95,7 +95,7 @@
 "zvogëlojmë mbikëqyrjen deri në një pikë, sa nxjerrësit e sekreteve ta 
dinë "
 "se nuk rrezikohen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated for 30 years</a>, is the first step in "
@@ -123,7 +123,7 @@
 "tanë, por <a href=\"http://www.wired.com/opinion/2013/10/149481/\";>kaq nuk "
 "na e mbron privatësinë, pasi fusim këmbët në Internet</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
@@ -142,11 +142,11 @@
 "patur akses të mjaftueshëm për identifikimin e tyre.  Na duhet të 
shkojmë më "
 "tej."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "The Upper Limit on Surveillance in a Democracy"
 msgstr "Kufiri i Sipërm i Mbikëqyrjes në një Demokraci"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
 "of effective control over our government and institutions.  That's why "
@@ -159,7 +159,7 @@
 "mundur shtetit të gjejë se kush ka folur me një reporter është teprim "
 "mbikëqyrjeje&mdash;shumë, për ta përballuar demokracia."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
 "the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
@@ -188,7 +188,7 @@
 "a> dhe <a href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-";
 "networks-beyond-verizon-2013-06-07\">nga kompani të tjera po ashtu</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
@@ -207,11 +207,11 @@
 "të gjejë se kush ka folur me një gazetar të njohur ose me një disident 
të "
 "njohur."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Information, Once Collected, Will Be Misused"
 msgstr "Informacioni, Pasi Mblidhet, Do Të Keqpërdoret"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
@@ -234,7 +234,7 @@
 "akuzohet për &ldquo;spiunazh,&rdquo; gjetja e &ldquo;spiunit&rdquo; do të "
 "shërbejë si justifikim për hyrje në materialin e grumbulluar."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
 "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
@@ -266,7 +266,7 @@
 "theyarewatching.org/issues/risks-increase-once-data-shared\">sistemet e reja "
 "dixhitale</a>, kjo praktikë është zgjeruar."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -284,7 +284,7 @@
 "citizens/\">Europës</a> dhe <a href=\"https://en.wikipedia.org/wiki/";
 "Japanese_American_internment\">ShBA-ve </a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Personal data collected by the state is also likely to be obtained by "
 "outside crackers that break the security of the servers, even by <a href="
@@ -298,7 +298,7 @@
 "hack-revealed-even-worse-than-first.shtml\">sulmues që punojnë për llogari 
"
 "shtetesh armiqësore</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
 "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
@@ -309,7 +309,7 @@
 "is-blamed-for-wiretapping-scandal.html\">përmbysje të drejtpërdrejtë të "
 "demokracisë</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Total surveillance accessible to the state enables the state to launch a "
 "massive fishing expedition against any person.  To make journalism and "
@@ -321,11 +321,11 @@
 "demokracia të jenë të parrezikuara, na duhet të kufizojmë grumbullimin e 
të "
 "dhënave në të cilat shteti futet lehtësisht."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Robust Protection for Privacy Must Be Technical"
 msgstr "Mbrojtja e Fuqishme Për Privatësinë Duhet Të Jetë Teknike"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The Electronic Frontier Foundation and other organizations propose a set of "
 "legal principles designed to <a href=\"https://en.necessaryandproportionate.";
@@ -342,7 +342,7 @@
 "duhur për mbrojtjen e lirive demokratike&mdash;nëse adoptohen tërësisht 
dhe "
 "zbatohen përgjithmonë pa përjashtime."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -353,7 +353,7 @@
 "Amendments Act), pezullohen, ose <a href=\"http://www.nytimes.com/2009/04/16/";
 "us/16nsa.html\">shpërfillen</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Meanwhile, demagogues will cite the usual excuses as grounds for total "
 "surveillance; any terrorist attack, even one that kills just a handful of "
@@ -364,7 +364,7 @@
 "të cilit vriten vetëm një dorë personash, mund të fryhet për t’u 
dhënë atyre "
 "një mundësi më tepër."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If limits on access to the data are set aside, it will be as if they had "
 "never existed: years worth of dossiers would suddenly become available for "
@@ -387,11 +387,11 @@
 "Sa për pezullimin ose shpërfilljen përkohësisht të këtij ligji, ideja 
zor se "
 "do të kish kuptim."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "First, Don't Be Foolish"
 msgstr "Së Pari, Mos u Bëni të Marrë"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "To have privacy, you must not throw it away: the first one who has to "
 "protect your privacy is you.  Avoid identifying yourself to web sites, "
@@ -405,7 +405,7 @@
 "ata përdorin për të gjurmuar vizitorët.  Përdorni GNU Privacy Guard-in 
për "
 "të fshehtëzuar lëndën e email-it tuaj.  Blerjet paguajini me para në 
dorë."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Keep your own data; don't store your data in a company's &ldquo;"
 "convenient&rdquo; server.  It's safe, however, to entrust a data backup to a "
@@ -419,7 +419,7 @@
 "me kusht që të dhënat t’i keni fshehtëzuar, përfshi këtu emra 
kartelash, me "
 "software të lirë, në kompjuterin tuaj, përpara se t’i ngarkoni."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy's sake, you must avoid nonfree software since, as a consequence "
 "of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -436,7 +436,7 @@
 "që këto u japin të tjerëve mbi punimin tuaj në kompjuter, ju kërkojnë "
 "detyrimisht t’i dorëzoni në shërbyes krejt të dhënat përkatëse."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -460,7 +460,7 @@
 "ato ushtrojnë trysni mbi persona të tjerë që këta të heqin dorë nga "
 "privatësia."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Self-protection is essential, but even the most rigorous self-protection is "
 "insufficient to protect your privacy on or from systems that don't belong to "
@@ -479,11 +479,11 @@
 "të reshtin mbikëqyrjen e njerëzve për krejt rastet e tjera, hiq ato për "
 "dyshime të përligjura."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "We Must Design Every System for Privacy"
 msgstr "Çdo Sistem Duhet Ta Hartojmë Me Privatësinë Në Mendje"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we don't want a total surveillance society, we must consider surveillance "
 "a kind of social pollution, and limit the surveillance impact of each new "
@@ -495,7 +495,7 @@
 "mbikëqyrjes prej çdo sistemi të ri dixhital po njësoj siç kufizojmë 
ndikimin "
 "mjedisor të një konstruksioni fizik."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For example: &ldquo;smart&rdquo; meters for electricity are touted for "
 "sending the power company moment-by-moment data about each customer's "
@@ -520,16 +520,16 @@
 "me mesataren e përdorimit për atë periudhë.  I njëjti përfitim, ama pa "
 "mbikëqyrje!"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid "We need to design such privacy into all our digital systems."
 msgstr ""
 "Na duhet të hartojmë të tillë privatësi në krejt sistemet tona 
dixhitale."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Collecting Data: Leaving It Dispersed"
 msgstr "Kurë për Grumbullimin e të Dhënave: Të Lihen të Hapërdara"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
 "the data dispersed and inconvenient to access</a>.  Old-fashioned security "
@@ -551,7 +551,7 @@
 "grumbulloheshin fizikisht miliona shirita regjistrimesh çdo ditë dhe të "
 "shiheshin apo kopjoheshin."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Nowadays, security cameras have become surveillance cameras: they are "
 "connected to the Internet so recordings can be collected in a data center "
@@ -567,7 +567,7 @@
 "sjellin një ditë kur gazetarët e dyshuar të ndiqen rrugës gjithë 
kohën, për "
 "të parë se me kë bisedojnë."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet-connected cameras often have lousy digital security themselves, "
 "which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-";
@@ -590,7 +590,7 @@
 "i lirë të postojë, me raste, foto dhe regjistrime video, por grumbullimi "
 "sistematik në Internet i të dhënave të tilla duhet të kufizohet."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
 "points at the inside of a store, or at the street.  Any camera pointed at "
@@ -602,11 +602,11 @@
 "mbi hapësirën private të dikujt, nga dikush tjetër, cenon privatësinë, 
por "
 "ky është problem tjetër."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Internet Commerce Surveillance"
 msgstr "Kurë për Mbikëqyrje Internet Nga Tregtia"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Most data collection comes from people's own digital activities.  Usually "
 "the data is collected first by companies.  But when it comes to the threat "
@@ -620,7 +620,7 @@
 "së bërë drejtpërdrejt nga shteti apo të deleguar një biznesi, ngaqë 
shteti "
 "mund t’i ketë të dhënat që mbledhin kompanitë."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -650,7 +650,7 @@
 "grumbullimit të këtyre të dhënave.  Veç kësaj, mjaft nga këto kompani, 
i "
 "keqpërdorin vetë të dhënat ose  ua furnizojnë ato tregtarëve të të 
dhënave."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The goal of making journalism and democracy safe therefore requires that we "
 "reduce the data collected about people by any organization, not just by the "
@@ -667,7 +667,7 @@
 "mbajnë ato më gjatë se një interval të shkurtër kohe përtej atij që "
 "nevojitet doemos për çka po kryejnë për ne."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One of the motives for the current level of surveillance of the Internet is "
 "that sites are financed through advertising based on tracking users' "
@@ -687,7 +687,7 @@
 "tepër justifikime për të shkelur privatësinë, se sa angazhime për ta "
 "mbrojtur atë."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
@@ -712,7 +712,7 @@
 "marrëveshje të përshtatshme mes bizneseve, dhe që shteti të mos i 
pengojë "
 "ato."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A further threat from sites' collection of personal data is that security "
 "breakers might get in, take it, and misuse it.  This includes customers' "
@@ -725,11 +725,11 @@
 "sistem pagesash anonime do t’i jepte fund këtij rreziku: një e çarë 
sigurie "
 "te sajti nuk do t’ju bënte dëm, nëse sajti nuk di asnjë gjë rreth 
jush."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Travel Surveillance"
 msgstr "Kurë për Mbikëqyrjen e Udhëtimeve"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We must convert digital toll collection to anonymous payment (using digital "
 "cash, for instance).  License-plate recognition systems recognize all "
@@ -753,7 +753,7 @@
 "në të dhënat do të duhej kufizuar në kërkime për numra sipas një 
liste me "
 "targa që kanë urdhër gjykate."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a href="
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
@@ -763,7 +763,7 @@
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
 "justice/victory-federal-court-recognizes\">ndëshkim pa gjyq</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It is acceptable to have a list of people whose person and luggage will be "
 "searched with extra care, and anonymous passengers on domestic flights could "
@@ -779,7 +779,7 @@
 "nuk u është lejuar të hyjnë fare në vend, të hipin në fluturime drejt 
një "
 "vendi.  Kjo do të duhej të ishte e mjaftë për krejt qëllimet e ligjshme."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Many mass transit systems use some kind of smart cards or RFIDs for "
 "payment.  These systems accumulate personal data: if you once make the "
@@ -795,7 +795,7 @@
 "gjithçka ka të bëjë me udhëtimet përshoqëruar secilës kartë.  Të 
marra "
 "bashkë, bëhen mbikëqyrje masive.  Ky grumbullim të dhënash duhet 
reduktuar."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Navigation services do surveillance: the user's computer tells the map "
 "service the user's location and where the user wants to go; then the server "
@@ -818,7 +818,7 @@
 "rrugën, dhe ta shfaqë, pa i treguar kujt ndonjëherë se ku gjendet apo ku "
 "dëshiron të shkojë përdoruesi."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Systems for borrowing bicycles, etc., can be designed so that the borrower's "
 "identity is known only inside the station where the item was borrowed.  "
@@ -849,11 +849,11 @@
 "për një kohë të gjatë, stacioni nga u mor me qira mund të njoftojë 
qendrën; "
 "në këtë rast, mund ta dërgojë identitetin e qiramarrësit menjëherë."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Communications Dossiers"
 msgstr "Kurë për Dosjet e Komunikimeve"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
@@ -880,7 +880,7 @@
 "sounds-nsa-tracking-your-location\">NSA-ja i grumbullon të dhënat mbi "
 "vendndodhjet e celularëve</a> në stil tregu shumice."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unmonitored communication is impossible where systems create such dossiers.  "
 "So it should be illegal to create or keep them.  ISPs and phone companies "
@@ -893,7 +893,7 @@
 "informacion të tillë për një kohë të gjatë, në mungesë të një 
urdhri gjykate "
 "për të përgjuar një palë të caktuar."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
@@ -915,7 +915,7 @@
 "tepër, nëse qeveria i kthehet këtij lloj mbikëqyrje, nuk do të merrte 
të "
 "dhëna mbi thirrjet telefonike të gjithkujt të bëra përpara asaj kohe."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy about who you exchange email with, a simple partial solution is "
 "for you and others to use email services in a country that would never "
@@ -939,11 +939,11 @@
 "shërbimit tuaj email, por do të ishte e vështirë të përcaktohej se 
email-in "
 "ma keni dërguar mua."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "But Some Surveillance Is Necessary"
 msgstr "Ca Mbikëqyrje Ama Është e Nevojshme"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For the state to find criminals, it needs to be able to investigate specific "
 "crimes, or specific suspected planned crimes, under a court order.  With the "
@@ -962,7 +962,7 @@
 "sekretit pas faktit të kryer, nëse (siç këshilloj) ua pengojmë sistemeve 
"
 "dixhitalë grumbullimin e dosjeve masive përpara faktit të kryer."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -987,7 +987,7 @@
 "ubiquitous-surveillance-police-edition\">përdorimi i forcës prej tyre ra me 
"
 "60%</a>.  ACLU është në favor të kësaj."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1010,7 +1010,7 @@
 "shkrirja e reaktorit në Fukushima, dhe krizën fiskale të 2008-s) e bën 
më të "
 "vogël atë të terrorizmit."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, journalism must be protected from surveillance even when it is "
 "carried out as part of a business."
@@ -1018,7 +1018,7 @@
 "Sido që të jetë, gazetaria duhet të mbrohet nga mbikëqyrja edhe kur 
kryhet "
 "si pjesë e një biznesi."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Digital technology has brought about a tremendous increase in the level of "
 "surveillance of our movements, actions, and communications.  It is far more "
@@ -1035,7 +1035,7 @@
 "’80, dhe kufijtë e propozuar ligjorë mbi përdorimin nga shteti të të 
dhënave "
 "të grumbulluara nuk do ta ndryshonin gjendjen."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Companies are designing even more intrusive surveillance.  Some project that "
 "pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1052,7 +1052,7 @@
 "saktësi; por kërcënimi ndaj demokracisë këtu s’është spekulim.  
Ekziston dhe "
 "është i dukshëm që sot."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unless we believe that our free countries previously suffered from a grave "
 "surveillance deficit, and ought to be surveilled more than the Soviet Union "

Index: po/surveillance-vs-democracy.uk-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/surveillance-vs-democracy.uk-diff.html   24 Oct 2016 08:58:32 -0000      
1.2
+++ po/surveillance-vs-democracy.uk-diff.html   6 Nov 2016 21:28:16 -0000       
1.3
@@ -14,19 +14,35 @@
 &lt;!-- Parent-Version: 1.77 --&gt;
 &lt;title&gt;How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation&lt;/title&gt;
-<span class="inserted"><ins><em>&lt;!-- GNUN: localize URL 
/graphics/dog.small.jpg --&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+--&gt;&lt;/style&gt;
+&lt;!-- GNUN: localize URL /graphics/dog.small.jpg --&gt;</em></ins></span>
 &lt;!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" 
--&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
-&lt;h2&gt;How Much Surveillance Can Democracy Withstand?&lt;/h2&gt;
+<span class="removed"><del><strong>&lt;h2&gt;How</strong></del></span>
+<span class="inserted"><ins><em>&lt;h2 class="center"&gt;How</em></ins></span> 
Much Surveillance Can Democracy Withstand?&lt;/h2&gt;
 
-&lt;p&gt;by &lt;a href="http://www.stallman.org/"&gt;Richard 
Stallman&lt;/a&gt;&lt;/p&gt;
+<span class="removed"><del><strong>&lt;p&gt;by</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p class="byline 
center"&gt;by</em></ins></span> &lt;a 
href="http://www.stallman.org/"&gt;Richard Stallman&lt;/a&gt;&lt;/p&gt;
 
 &lt;!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system --&gt;
-&lt;blockquote&gt;&lt;p&gt;A version of this article was first published in 
Wired
+<span 
class="removed"><del><strong>&lt;blockquote&gt;&lt;p&gt;A</strong></del></span>
+<span class="inserted"><ins><em>&lt;blockquote 
class="center"&gt;&lt;p&gt;A</em></ins></span> version of this article was 
first published in Wired
 in October 2013.&lt;/p&gt;&lt;/blockquote&gt;
 
-<span class="inserted"><ins><em>&lt;div class="pict medium"&gt;
+<span class="inserted"><ins><em>&lt;div class="article"&gt;
+
+&lt;div id="intro"&gt;
+&lt;div class="pict wide"&gt;
 &lt;a href="/graphics/dog.html"&gt;
 &lt;img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /&gt;&lt;/a&gt;
 &lt;p&gt;&ldquo;How did they find out I'm a dog?&rdquo;&lt;/p&gt;
@@ -42,7 +58,8 @@
 is not exceeded?  It is the level beyond which surveillance starts to
 interfere with the functioning of democracy, in that whistleblowers
 (such as Snowden) are likely to be caught.&lt;/p&gt;
-
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="columns" style="clear:both"&gt;</em></ins></span>
 &lt;p&gt;Faced with government secrecy, we the people depend on
 whistleblowers
 to &lt;a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama"&gt;tell
@@ -73,8 +90,12 @@
 whistleblower&rdquo; is grounds for access sufficient to identify him
 or her.  We need to go further.&lt;/p&gt;
 
-&lt;h3&gt;The Upper Limit on Surveillance in a Democracy&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;The</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader" style="clear: both"&gt;The</em></ins></span> Upper 
Limit on Surveillance in a Democracy&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;If whistleblowers don't dare reveal crimes and lies, we lose the
 last shred of effective control over our government and institutions.
 That's why surveillance that enables the state to find out who has
@@ -104,8 +125,12 @@
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.&lt;/p&gt;
 
-&lt;h3&gt;Information, Once Collected, Will Be Misused&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Information,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
+&lt;h3 class="subheader"&gt;Information,</em></ins></span> Once Collected, 
Will Be Misused&lt;/h3&gt;
+
+<span class="inserted"><ins><em>&lt;div  class="columns"&gt;</em></ins></span>
 &lt;p&gt;When people recognize that the level of general surveillance is too
 high, the first response is to propose limits on access to the
 accumulated data.  That sounds nice, but it won't fix the problem, not
@@ -153,8 +178,12 @@
 journalism and democracy safe, we must limit the accumulation of data
 that is easily accessible to the state.&lt;/p&gt;
 
-&lt;h3&gt;Robust Protection for Privacy Must Be Technical&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Robust</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Robust</em></ins></span> Protection for Privacy 
Must Be Technical&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to &lt;a
 href="https://en.necessaryandproportionate.org/text"&gt;prevent the
@@ -183,8 +212,12 @@
 collect data starting at that date.  As for suspending or momentarily
 ignoring this law, the idea would hardly make sense.&lt;/p&gt;
 
-&lt;h3&gt;First, Don't Be Foolish&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;First,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;First,</em></ins></span> Don't Be 
Foolish&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;To have privacy, you must not throw it away: the first one who has
 to protect your privacy is you.  Avoid identifying yourself to web
 sites, contact them with Tor, and use browsers that block the schemes
@@ -226,8 +259,12 @@
 make all these systems stop surveilling people other than legitimate
 suspects.&lt;/p&gt;
 
-&lt;h3&gt;We Must Design Every System for Privacy&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;We</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
+&lt;h3 class="subheader"&gt;We</em></ins></span> Must Design Every System for 
Privacy&lt;/h3&gt;
+
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;If we don't want a total surveillance society, we must consider
 surveillance a kind of social pollution, and limit the surveillance
 impact of each new digital system just as we limit the environmental
@@ -246,8 +283,12 @@
 
 &lt;p&gt;We need to design such privacy into all our digital systems.&lt;/p&gt;
 
-&lt;h3&gt;Remedy for Collecting Data: Leaving It Dispersed&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Remedy</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Remedy</em></ins></span> for Collecting Data: 
Leaving It Dispersed&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;One way to make monitoring safe for privacy is
 to &lt;a name="dispersal"&gt;keep the data dispersed and inconvenient to
 access&lt;/a&gt;.  Old-fashioned security cameras were no threat to 
privacy(&lt;a href="#privatespace"&gt;*&lt;/a&gt;).
@@ -279,9 +320,11 @@
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
-&lt;h3 id="digitalcash"&gt;Remedy for Internet Commerce Surveillance&lt;/h3&gt;
+&lt;h3 <span 
class="removed"><del><strong>id="digitalcash"&gt;Remedy</strong></del></span> 
<span class="inserted"><ins><em>id="digitalcash" 
class="subheader"&gt;Remedy</em></ins></span> for Internet Commerce 
Surveillance&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;Most data collection comes from people's own digital activities.
 Usually the data is collected first by companies.  But when it comes
 to the threat to privacy and democracy, it makes no difference whether
@@ -338,8 +381,12 @@
 this danger: a security hole in the site can't hurt you if the site
 knows nothing about you.&lt;/p&gt;
 
-&lt;h3&gt;Remedy for Travel Surveillance&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Remedy</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Remedy</em></ins></span> for Travel 
Surveillance&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
 recognize all license plates, and
@@ -395,8 +442,12 @@
 borrowed can inform headquarters; in that case, it could send the
 borrower's identity immediately.&lt;/p&gt;
 
-&lt;h3&gt;Remedy for Communications Dossiers&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;Remedy</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
+&lt;h3 class="subheader"&gt;Remedy</em></ins></span> for Communications 
Dossiers&lt;/h3&gt;
+
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
@@ -435,8 +486,12 @@
 that I received mail from some user of your email service, but it
 would be hard to determine that you had sent mail to me.&lt;/p&gt;
 
-&lt;h3&gt;But Some Surveillance Is Necessary&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3&gt;But</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;But</em></ins></span> Some Surveillance Is 
Necessary&lt;/h3&gt;
 
+<span class="inserted"><ins><em>&lt;div class="columns"&gt;</em></ins></span>
 &lt;p&gt;For the state to find criminals, it needs to be able to investigate
 specific crimes, or specific suspected planned crimes, under a court
 order.  With the Internet, the power to tap phone conversations would
@@ -471,8 +526,11 @@
 &lt;p&gt;However, journalism must be protected from surveillance even when
 it is carried out as part of a business.&lt;/p&gt;
 
-&lt;hr /&gt;
+<span class="removed"><del><strong>&lt;hr /&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
+&lt;div class="reduced-width"&gt;</em></ins></span>
 &lt;p&gt;Digital technology has brought about a tremendous increase in the
 level of surveillance of our movements, actions, and communications.
 It is far more than we experienced in the 1990s, and &lt;a
@@ -492,6 +550,8 @@
 a grave surveillance deficit, and ought to be surveilled more than the
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;/div&gt;</em></ins></span>
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
@@ -550,7 +610,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/10/24 08:58:32 $
+$Date: 2016/11/06 21:28:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/surveillance-vs-democracy.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- po/surveillance-vs-democracy.uk.po  22 Oct 2016 18:29:16 -0000      1.46
+++ po/surveillance-vs-democracy.uk.po  6 Nov 2016 21:28:16 -0000       1.47
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2016-10-22 18:25+0000\n"
+"POT-Creation-Date: 2016-11-06 21:25+0000\n"
 "PO-Revision-Date: 2016-07-09 09:20+0200\n"
 "Last-Translator: Andriy Bandura <address@hidden>\n"
 "Language-Team: Ukrainian <>\n"
@@ -42,30 +42,30 @@
 "Wired&rdquo;."
 
 # type: Content of: <body><div><div><div><ul><li>
-#. type: Content of: <div><a>
+#. type: Content of: <div><div><div><a>
 #, fuzzy
 #| msgid "<a href=\"/doc/doc.html\">Documentation</a>"
 msgid "<a href=\"/graphics/dog.html\">"
 msgstr "<a href=\"/doc/doc.html\">Документація</a>"
 
-#. type: Attribute 'alt' of: <div><a><img>
+#. type: Attribute 'alt' of: <div><div><div><a><img>
 msgid ""
 "Cartoon of a dog, wondering at the three ads that popped up on his computer "
 "screen..."
 msgstr ""
 
 # type: Content of: <div><div><div>
-#. type: Content of: <div>
+#. type: Content of: <div><div><div>
 #, fuzzy
 #| msgid "</a>"
 msgid "</a>"
 msgstr "</a>"
 
-#. type: Content of: <div><p>
+#. type: Content of: <div><div><div><p>
 msgid "&ldquo;How did they find out I'm a dog?&rdquo;"
 msgstr ""
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Thanks to Edward Snowden's disclosures, we know that the current level of "
 "general surveillance in society is incompatible with human rights.  The "
@@ -87,7 +87,7 @@
 "функціонування демократії, коли 
інформаторів (таких як Сноуден), як правило, 
"
 "відловлюють."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Faced with government secrecy, we the people depend on whistleblowers to <a "
 "href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\";>tell us what "
@@ -103,7 +103,7 @@
 "демократичний контроль народу над 
державою, ми повинні скоротити стеження до "
 "величини, при якій люди будуть знати, що 
вони в безпеці."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
@@ -144,7 +144,7 @@
 "www.wired.com/opinion/2013/10/149481/\"> це не захистить 
наше приватне "
 "життя, коли ми виходимо в Інтернет</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
@@ -162,11 +162,11 @@
 "піймання інформатора&rdquo; стає підставою 
для доступу до даних, дозволяє "
 "ідентифікувати його. Нам треба йти далі."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "The Upper Limit on Surveillance in a Democracy"
 msgstr "Верхня межа стеження при демократії"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If whistleblowers don't dare reveal crimes and lies, we lose the last shred "
 "of effective control over our government and institutions.  That's why "
@@ -179,7 +179,7 @@
 "з журналістом, занадто велике&nbsp;&mdash; 
занадто велика, аби демократія "
 "могла його витримати."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "An unnamed U.S. government official ominously told journalists in 2011 "
@@ -222,7 +222,7 @@
 "href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-";
 "beyond-verizon-2013-06-07\"> а також від інших 
компаній</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
@@ -241,11 +241,11 @@
 "точка, в якій держава може дізнатися, хто 
говорив з відомим журналістом або "
 "відомим дисидентом."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Information, Once Collected, Will Be Misused"
 msgstr "Одного разу зібраними відомостями 
будуть зловживати"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
@@ -269,7 +269,7 @@
 "шпигунстві&rdquo;, пошук &ldquo;шпигуна&rdquo; 
стане приводом для доступу до "
 "накопиченого матеріалу."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "In addition, the state's surveillance staff will misuse the data for "
@@ -315,7 +315,7 @@
 "org/issues/risks-increase-once-data-shared\">поширюється із 
появою нових "
 "цифрових систем</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -332,7 +332,7 @@
 "be-used-against-the-citizens/\">приклади з Європи</a> і <a 
href=\"https://en.";
 "wikipedia.org/wiki/Japanese_American_internment\">США</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Personal data collected by the state is also likely to be obtained by "
 "outside crackers that break the security of the servers, even by <a href="
@@ -345,7 +345,7 @@
 "techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-"
 "worse-than-first.shtml\">зломлювачів, які працюють на 
ворожі держави</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
 "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
@@ -356,7 +356,7 @@
 "blamed-for-wiretapping-scandal.html\"> безпосередньо 
підпорядкувати собі "
 "демократію</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Total surveillance accessible to the state enables the state to launch a "
 "massive fishing expedition against any person.  To make journalism and "
@@ -368,11 +368,11 @@
 "демократію, ми повинні обмежити збір даних
, які будуть легко доступні "
 "державі."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Robust Protection for Privacy Must Be Technical"
 msgstr "Стійкий захист особистого життя 
повинен бути технічним"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The Electronic Frontier Foundation and other organizations propose a set of "
 "legal principles designed to <a href=\"https://en.necessaryandproportionate.";
@@ -388,7 +388,7 @@
 "принципи будуть адекватні захисту 
демократичних свобод&nbsp;&mdash; якщо їх "
 "приймуть у повному обсязі і будуть 
дотримуватися завжди і без винятків."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -399,7 +399,7 @@
 "припинена, або їх можуть <a 
href=\"http://www.nytimes.com/2009/04/16/";
 "us/16nsa.html\"> ігнорувати</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Meanwhile, demagogues will cite the usual excuses as grounds for total "
 "surveillance; any terrorist attack, even one that kills just a handful of "
@@ -409,7 +409,7 @@
 "тотального стеження; будь-який 
терористичний акт, навіть якщо в ньому 
загине "
 "кілька людей, може використовуватися ними 
як привід."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If limits on access to the data are set aside, it will be as if they had "
 "never existed: years worth of dossiers would suddenly become available for "
@@ -431,11 +431,11 @@
 "моменту. Що стосується призупинення дії 
або ігнорування цього закону, ця "
 "ідея навряд чи має сенс."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "First, Don't Be Foolish"
 msgstr "По-перше, не бути дурнями"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "To have privacy, you must not throw it away: the first one who has to "
 "protect your privacy is you.  Avoid identifying yourself to web sites, "
@@ -450,7 +450,7 @@
 "відстеження відвідувачів. Застосовуйте GNU 
Privacy Guard для шифрування "
 "вмісту своєї електронної пошти. Оплачуйте 
покупки готівкою."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Keep your own data; don't store your data in a company's &ldquo;"
 "convenient&rdquo; server.  It's safe, however, to entrust a data backup to a "
@@ -464,7 +464,7 @@
 "файлів на своєму комп'ютері за допомогою 
вільних програм перед тим, як "
 "відправляти їх на сервер."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy's sake, you must avoid nonfree software since, as a consequence "
 "of giving others control of your computing, it is <a href=\"/philosophy/"
@@ -480,7 +480,7 @@
 "послуг підміни програм</a>, а також 
передачі іншим контролю над вашими "
 "обчисленнями, це вимагає від вас надання 
всіх оброблюваних даних на сервер."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -503,7 +503,7 @@
 "імена, навіть якщо ви збираєтеся назвати 
свої, позаяк це заохочує інших "
 "людей відмовитися від своєї 
конфіденційності."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Self-protection is essential, but even the most rigorous self-protection is "
 "insufficient to protect your privacy on or from systems that don't belong to "
@@ -521,11 +521,11 @@
 "Ясно, що краще було б примусити всі ці 
системи припинити стеження за людьми, "
 "за винятком законно підозрюваних."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "We Must Design Every System for Privacy"
 msgstr "Кожну систему потрібно проектувати з 
урахуванням конфіденційності"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "If we don't want a total surveillance society, we must consider surveillance "
 "a kind of social pollution, and limit the surveillance impact of each new "
@@ -537,7 +537,7 @@
 "у стеження кожної нової цифрової системи 
точно так само, як ми обмежуємо "
 "вплив фізичних споруд на навколишнє 
середовище."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For example: &ldquo;smart&rdquo; meters for electricity are touted for "
 "sending the power company moment-by-moment data about each customer's "
@@ -561,16 +561,16 @@
 "порівнювати це з своїми вимірами за 
потрібний період з середнім графіком "
 "витрат за цей період. Те ж саме, тільки без 
стеження!"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid "We need to design such privacy into all our digital systems."
 msgstr ""
 "Нам треба вбудовувати таку ж 
конфіденційність у всі наші цифрові 
системи."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Collecting Data: Leaving It Dispersed"
 msgstr "Захід проти збору даних: залишайте їх 
розосередженими"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One way to make monitoring safe for privacy is to <a name=\"dispersal\">keep "
 "the data dispersed and inconvenient to access</a>.  Old-fashioned security "
@@ -590,7 +590,7 @@
 "про злочин. Було фізично неможливо 
збирати кожен день мільйони стрічок, а "
 "потім переглядати або копіювати їх."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Nowadays, security cameras have become surveillance cameras: they are "
 "connected to the Internet so recordings can be collected in a data center "
@@ -606,7 +606,7 @@
 "підозрюваних журналістів зможуть 
постійно відслідковувати на вулиці, щоб "
 "побачити, з ким вони спілкуються."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet-connected cameras often have lousy digital security themselves, "
 "which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-";
@@ -628,7 +628,7 @@
 "відеозаписи, але систематичне 
накопичення таких даних у Інтернеті 
повинне "
 "обмежуватися."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a name=\"privatespace\"><b>*</b></a>I assume here that the security camera "
 "points at the inside of a store, or at the street.  Any camera pointed at "
@@ -640,11 +640,11 @@
 "особистий простір кимось іншим, 
втручається в особисте життя, але це інше "
 "питання."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Internet Commerce Surveillance"
 msgstr "Заходи проти комерційного стеження в 
Інтернеті"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Most data collection comes from people's own digital activities.  Usually "
 "the data is collected first by companies.  But when it comes to the threat "
@@ -658,7 +658,7 @@
 "стеження державою безпосередньо або її 
доручають підприємству, тому що дані, "
 "які збирають компанії, систематично 
доступні державі."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">gotten into the databases of many large Internet "
@@ -687,7 +687,7 @@
 "частину шкоди, яку вони наносять, збираючи 
ці дані. Крім того, багато з цих "
 "компаній безпосередньо зловживають 
даними, продаючи їх на біржі даних."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The goal of making journalism and democracy safe therefore requires that we "
 "reduce the data collected about people by any organization, not just by the "
@@ -703,7 +703,7 @@
 "операціях, їм не повинно бути дозволено 
зберігати їх довше, ніж короткий час "
 "після того, що принципово необхідно їм для 
роботи з нами."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "One of the motives for the current level of surveillance of the Internet is "
 "that sites are financed through advertising based on tracking users' "
@@ -723,7 +723,7 @@
 "скоріше виправдання для порушення 
конфіденційності, ніж наміри 
дотримуватися "
 "її."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 #, fuzzy
 #| msgid ""
 #| "We could correct both problems by adopting a system of anonymous "
@@ -756,7 +756,7 @@
 "вісімдесяті роки XX&nbsp;століття</a>; нам 
бракує тільки підприємств, які "
 "займалися б цим, і держави, яка б не 
перешкоджала цьому."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "A further threat from sites' collection of personal data is that security "
 "breakers might get in, take it, and misuse it.  This includes customers' "
@@ -769,11 +769,11 @@
 "із цією загрозою: пролом у захисті сайту 
не може зашкодити вам, коли сайт "
 "нічого про вас не знає."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Travel Surveillance"
 msgstr "Заходи проти стеження за 
пересуваннями"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "We must convert digital toll collection to anonymous payment (using digital "
 "cash, for instance).  License-plate recognition systems recognize all "
@@ -795,7 +795,7 @@
 "причому повні дані не повинні бути 
доступні по Інтернету; доступ до даних "
 "повинен бути обмежений списком номерів 
автомобілів у розшуку."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a href="
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
@@ -805,7 +805,7 @@
 "\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-";
 "justice/victory-federal-court-recognizes\">покарання без 
суду</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "It is acceptable to have a list of people whose person and luggage will be "
 "searched with extra care, and anonymous passengers on domestic flights could "
@@ -820,7 +820,7 @@
 "взагалі не дозволено в'їзд в країну, 
доступ на рейси з посадками в цій "
 "країні. Цього повинно бути достатньо для 
всіх законних цілей."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Many mass transit systems use some kind of smart cards or RFIDs for "
 "payment.  These systems accumulate personal data: if you once make the "
@@ -836,7 +836,7 @@
 "пов'язані з кожною карткою. Все це разом 
становить систему масового "
 "стеження. Збір цих даних потрібно 
скоротити."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Navigation services do surveillance: the user's computer tells the map "
 "service the user's location and where the user wants to go; then the server "
@@ -859,7 +859,7 @@
 "маршрут і відображати його, не передаючи 
нікуди розташування та пункт "
 "призначення."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Systems for borrowing bicycles, etc., can be designed so that the borrower's "
 "identity is known only inside the station where the item was borrowed.  "
@@ -889,11 +889,11 @@
 "проінформувати центр; у цьому випадку 
вона могла б негайно повідомити про "
 "особистості того, хто взяв цю одиницю."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "Remedy for Communications Dossiers"
 msgstr "Заходи проти комунікаційних досьє"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
@@ -920,7 +920,7 @@
 "sure-sounds-nsa-tracking-your-location\">Агентство 
національної безпеки "
 "масово збирає дані про місце знаходження 
стільникових телефонів</a>."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unmonitored communication is impossible where systems create such dossiers.  "
 "So it should be illegal to create or keep them.  ISPs and phone companies "
@@ -933,7 +933,7 @@
 "довго, якщо тільки спостереження за 
певною особою не встановлено в судовому "
 "порядку."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
@@ -955,7 +955,7 @@
 "знову ввела таке  стеження, воно не набуло 
б дані про телефонні переговори "
 "кожного, проведені до цього часу."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For privacy about who you exchange email with, a simple partial solution is "
 "for you and others to use email services in a country that would never "
@@ -977,11 +977,11 @@
 "служби електронної пошти, але було б важко 
визначити, що ви послали "
 "повідомлення мені."
 
-#. type: Content of: <h3>
+#. type: Content of: <div><h3>
 msgid "But Some Surveillance Is Necessary"
 msgstr "Але іноді стеження необхідне"
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "For the state to find criminals, it needs to be able to investigate specific "
 "crimes, or specific suspected planned crimes, under a court order.  With the "
@@ -999,7 +999,7 @@
 "можливості знаходити інформаторів заднім 
числом, якщо (як я рекомендував) ми "
 "запобіжимо попередньому масовому 
накопиченню досьє цифровими системами."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1024,7 +1024,7 @@
 "ubiquitous-surveillance-police-edition\">застосування сили 
поліцейськими "
 "скоротилося на 60%</a>. ACLU підтримує це."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?";
 "action_KEY=12266\">Corporations are not people, and not entitled to human "
@@ -1047,7 +1047,7 @@
 "Порівняно з небезпекою таких дій 
(згадаймо витік нафти BP, аварію на АЕС у "
 "Фукусімі і фінансову кризу 2008&nbsp;року) 
загроза тероризму нищівно мала."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "However, journalism must be protected from surveillance even when it is "
 "carried out as part of a business."
@@ -1055,7 +1055,7 @@
 "Проте журналістику потрібно захищати від 
спостереження, навіть якщо вона "
 "ведеться в ході підприємницької 
діяльності."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Digital technology has brought about a tremendous increase in the level of "
 "surveillance of our movements, actions, and communications.  It is far more "
@@ -1073,7 +1073,7 @@
 "законодавчі обмеження щодо використання 
державою накопичених даних не "
 "змінюють цього."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Companies are designing even more intrusive surveillance.  Some project that "
 "pervasive surveillance, hooked to companies such as Facebook, could have "
@@ -1089,7 +1089,7 @@
 "але загроза демократії&nbsp;&mdash; не вигадка. 
Сьогодні вона існує і цілком "
 "відчутна."
 
-#. type: Content of: <p>
+#. type: Content of: <div><div><p>
 msgid ""
 "Unless we believe that our free countries previously suffered from a grave "
 "surveillance deficit, and ought to be surveilled more than the Soviet Union "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]