www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy can-you-trust.nl.html po/can-you...


From: GNUN
Subject: www/philosophy can-you-trust.nl.html po/can-you...
Date: Mon, 26 Dec 2016 18:58:03 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/12/26 18:58:03

Modified files:
        philosophy     : can-you-trust.nl.html 
        philosophy/po  : can-you-trust.nl-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/can-you-trust.nl.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.nl-diff.html?cvsroot=www&r1=1.13&r2=1.14

Patches:
Index: can-you-trust.nl.html
===================================================================
RCS file: /web/www/www/philosophy/can-you-trust.nl.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- can-you-trust.nl.html       18 Jul 2016 19:27:57 -0000      1.20
+++ can-you-trust.nl.html       26 Dec 2016 23:58:02 -0000      1.21
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/can-you-trust.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/can-you-trust.nl.po">
+ https://www.gnu.org/philosophy/po/can-you-trust.nl.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/can-you-trust.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/can-you-trust.nl-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-10-27" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/can-you-trust.en.html" -->
 
 <!--#include virtual="/server/header.nl.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/philosophy/po/can-you-trust.translist" -->
 <!--#include virtual="/server/banner.nl.html" -->
+<!--#include virtual="/server/outdated.nl.html" -->
 <h2>Kun je je computer vertrouwen?</h2>
 
 <p>door <a href="http://www.stallman.org/";>Richard Stallman</a></p>
@@ -333,7 +339,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Bijgewerkt:
 
-$Date: 2016/07/18 19:27:57 $
+$Date: 2016/12/26 23:58:02 $
 
 <!-- timestamp end -->
 </p>

Index: po/can-you-trust.nl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/can-you-trust.nl-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/can-you-trust.nl-diff.html       11 Dec 2015 10:57:53 -0000      1.13
+++ po/can-you-trust.nl-diff.html       26 Dec 2016 23:58:03 -0000      1.14
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.77 --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.79</em></ins></span> --&gt;
 &lt;title&gt;Can You Trust Your Computer?
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;!--#include virtual="/philosophy/po/can-you-trust.translist" --&gt;
@@ -164,20 +164,17 @@
 &lt;h3&gt;Postscripts&lt;/h3&gt;
 
 &lt;ol&gt;
-<span class="removed"><del><strong>&lt;li&gt;The</strong></del></span>
-<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;
-The</em></ins></span> computer security field uses the term &ldquo;trusted
+&lt;li&gt;&lt;p&gt;
+The computer security field uses the term &ldquo;trusted
 computing&rdquo; in a different way&mdash;beware of confusion
-between the two <span class="removed"><del><strong>meanings.
-&lt;/li&gt;
-&lt;li&gt;The</strong></del></span> <span 
class="inserted"><ins><em>meanings.&lt;/p&gt;&lt;/li&gt;
+between the two meanings.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;
-The</em></ins></span> GNU Project distributes the GNU Privacy Guard, a program 
that
+The GNU Project distributes the GNU Privacy Guard, a program that
 implements public-key encryption and digital signatures, which you can
 use to send secure and private email.  It is useful to explore how GPG
 differs from treacherous computing, and see what makes one helpful and
-the other so <span 
class="removed"><del><strong>dangerous.</strong></del></span> <span 
class="inserted"><ins><em>dangerous.&lt;/p&gt;</em></ins></span>
+the other so dangerous.&lt;/p&gt;
 &lt;p&gt;
 When someone uses GPG to send you an encrypted document, and you use
 GPG to decode it, the result is an unencrypted document that you can
@@ -189,12 +186,10 @@
 Treacherous computing is designed to impose restrictions on the users;
 &lt;em&gt;it&lt;/em&gt; uses &lt;em&gt;them&lt;/em&gt;.&lt;/p&gt;&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;</em></ins></span>
+&lt;li&gt;&lt;p&gt;
 The supporters of treacherous computing focus their discourse on its
 &lt;a name="beneficial"&gt;beneficial uses&lt;/a&gt;.  What they say is often
-correct, just not <span 
class="removed"><del><strong>important.</strong></del></span> <span 
class="inserted"><ins><em>important.&lt;/p&gt;</em></ins></span>
+correct, just not important.&lt;/p&gt;
 &lt;p&gt;
 Like most hardware, treacherous-computing hardware can be used for
 purposes which are not harmful.  But these features can be implemented in
@@ -207,15 +202,13 @@
 freedom, while offering minor benefits to distract us from what we
 would lose.&lt;/p&gt;&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;Microsoft</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;
-Microsoft</em></ins></span> presents Palladium as a security measure, and 
claims that
+&lt;li&gt;&lt;p&gt;
+Microsoft presents Palladium as a security measure, and claims that
 it will protect against viruses, but this claim is evidently false.  A
 presentation by Microsoft Research in October 2002 stated that one of
 the specifications of Palladium is that existing operating systems and
 applications will continue to run; therefore, viruses will continue to
-be able to do all the things that they can do <span 
class="removed"><del><strong>today.</strong></del></span> <span 
class="inserted"><ins><em>today.&lt;/p&gt;</em></ins></span>
+be able to do all the things that they can do today.&lt;/p&gt;
 &lt;p&gt;
 When Microsoft employees speak of &ldquo;security&rdquo; in connection with
 Palladium, they do not mean what we normally mean by that word:
@@ -236,23 +229,22 @@
 you trying to copy music.  &ldquo;Malicious code&rdquo; means code
 installed by you to do what someone else doesn't want your machine to
 do.  &ldquo;Spoofing&rdquo; doesn't mean someone's fooling you, it means
-your fooling Palladium.  And so on.&lt;/p&gt;&lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;A</strong></del></span>
+<span class="removed"><del><strong>your</strong></del></span>
+<span class="inserted"><ins><em>you're</em></ins></span> fooling Palladium.  
And so on.&lt;/p&gt;&lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;
-A</em></ins></span> previous statement by the Palladium developers stated the 
basic
+&lt;li&gt;&lt;p&gt;
+A previous statement by the Palladium developers stated the basic
 premise that whoever developed or collected information should have
 total control of how you use it.  This would represent a revolutionary
 overturn of past ideas of ethics and of the legal system, and create
 an unprecedented system of control.  The specific problems of these
 systems are no accident; they result from the basic goal.  It is the
-goal we must <span 
class="removed"><del><strong>reject.&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>reject.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+goal we must reject.&lt;/p&gt;&lt;/li&gt;
 &lt;/ol&gt;
 
 &lt;hr /&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;As of 2015, treacherous computing has 
been implemented for PCs in
+&lt;p&gt;As of 2015, treacherous computing has been implemented for PCs in
 the form of the &ldquo;Trusted Platform Module&rdquo;; however, for
 practical reasons, the TPM has proved a total failure for the goal of
 providing a platform for remote attestation to verify Digital
@@ -282,7 +274,7 @@
 attestation feasible.  We must not presume that all future attempts
 will fail too.&lt;/p&gt;
 
-&lt;hr /&gt;</em></ins></span>
+&lt;hr /&gt;
 
 &lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
 in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
@@ -318,18 +310,17 @@
 information on coordinating and submitting translations of this 
article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; 2002, 2007, <span 
class="removed"><del><strong>2014</strong></del></span> <span 
class="inserted"><ins><em>2014, 2015</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2002, 2007, 2014, <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2016</em></ins></span> Richard 
Stallman&lt;/p&gt;
   
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative</strong></del></span>
-<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</em></ins></span>
-Commons <span class="removed"><del><strong>Attribution-NoDerivs 3.0 United 
States</strong></del></span> <span 
class="inserted"><ins><em>Attribution-NoDerivatives 4.0 
International</em></ins></span> License&lt;/a&gt;.&lt;/p&gt;
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2015/12/11 10:57:53 $
+$Date: 2016/12/26 23:58:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;



reply via email to

[Prev in Thread] Current Thread [Next in Thread]