[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy can-you-trust.nl.html po/can-you...
From: |
GNUN |
Subject: |
www/philosophy can-you-trust.nl.html po/can-you... |
Date: |
Mon, 26 Dec 2016 18:58:03 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 16/12/26 18:58:03
Modified files:
philosophy : can-you-trust.nl.html
philosophy/po : can-you-trust.nl-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/can-you-trust.nl.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.nl-diff.html?cvsroot=www&r1=1.13&r2=1.14
Patches:
Index: can-you-trust.nl.html
===================================================================
RCS file: /web/www/www/philosophy/can-you-trust.nl.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- can-you-trust.nl.html 18 Jul 2016 19:27:57 -0000 1.20
+++ can-you-trust.nl.html 26 Dec 2016 23:58:02 -0000 1.21
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/can-you-trust.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/can-you-trust.nl.po">
+ https://www.gnu.org/philosophy/po/can-you-trust.nl.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/can-you-trust.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/can-you-trust.nl-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-10-27" --><!--#set
var="ENGLISH_PAGE" value="/philosophy/can-you-trust.en.html" -->
<!--#include virtual="/server/header.nl.html" -->
<!-- Parent-Version: 1.77 -->
@@ -8,6 +13,7 @@
<!--#include virtual="/philosophy/po/can-you-trust.translist" -->
<!--#include virtual="/server/banner.nl.html" -->
+<!--#include virtual="/server/outdated.nl.html" -->
<h2>Kun je je computer vertrouwen?</h2>
<p>door <a href="http://www.stallman.org/">Richard Stallman</a></p>
@@ -333,7 +339,7 @@
<p class="unprintable"><!-- timestamp start -->
Bijgewerkt:
-$Date: 2016/07/18 19:27:57 $
+$Date: 2016/12/26 23:58:02 $
<!-- timestamp end -->
</p>
Index: po/can-you-trust.nl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/can-you-trust.nl-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/can-you-trust.nl-diff.html 11 Dec 2015 10:57:53 -0000 1.13
+++ po/can-you-trust.nl-diff.html 26 Dec 2016 23:58:03 -0000 1.14
@@ -11,7 +11,7 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.77</strong></del></span> <span
class="inserted"><ins><em>1.79</em></ins></span> -->
<title>Can You Trust Your Computer?
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/philosophy/po/can-you-trust.translist" -->
@@ -164,20 +164,17 @@
<h3>Postscripts</h3>
<ol>
-<span class="removed"><del><strong><li>The</strong></del></span>
-<span class="inserted"><ins><em><li><p>
-The</em></ins></span> computer security field uses the term “trusted
+<li><p>
+The computer security field uses the term “trusted
computing” in a different way—beware of confusion
-between the two <span class="removed"><del><strong>meanings.
-</li>
-<li>The</strong></del></span> <span
class="inserted"><ins><em>meanings.</p></li>
+between the two meanings.</p></li>
<li><p>
-The</em></ins></span> GNU Project distributes the GNU Privacy Guard, a program
that
+The GNU Project distributes the GNU Privacy Guard, a program that
implements public-key encryption and digital signatures, which you can
use to send secure and private email. It is useful to explore how GPG
differs from treacherous computing, and see what makes one helpful and
-the other so <span
class="removed"><del><strong>dangerous.</strong></del></span> <span
class="inserted"><ins><em>dangerous.</p></em></ins></span>
+the other so dangerous.</p>
<p>
When someone uses GPG to send you an encrypted document, and you use
GPG to decode it, the result is an unencrypted document that you can
@@ -189,12 +186,10 @@
Treacherous computing is designed to impose restrictions on the users;
<em>it</em> uses <em>them</em>.</p></li>
-<span class="removed"><del><strong><li></strong></del></span>
-
-<span class="inserted"><ins><em><li><p></em></ins></span>
+<li><p>
The supporters of treacherous computing focus their discourse on its
<a name="beneficial">beneficial uses</a>. What they say is often
-correct, just not <span
class="removed"><del><strong>important.</strong></del></span> <span
class="inserted"><ins><em>important.</p></em></ins></span>
+correct, just not important.</p>
<p>
Like most hardware, treacherous-computing hardware can be used for
purposes which are not harmful. But these features can be implemented in
@@ -207,15 +202,13 @@
freedom, while offering minor benefits to distract us from what we
would lose.</p></li>
-<span class="removed"><del><strong><li>Microsoft</strong></del></span>
-
-<span class="inserted"><ins><em><li><p>
-Microsoft</em></ins></span> presents Palladium as a security measure, and
claims that
+<li><p>
+Microsoft presents Palladium as a security measure, and claims that
it will protect against viruses, but this claim is evidently false. A
presentation by Microsoft Research in October 2002 stated that one of
the specifications of Palladium is that existing operating systems and
applications will continue to run; therefore, viruses will continue to
-be able to do all the things that they can do <span
class="removed"><del><strong>today.</strong></del></span> <span
class="inserted"><ins><em>today.</p></em></ins></span>
+be able to do all the things that they can do today.</p>
<p>
When Microsoft employees speak of “security” in connection with
Palladium, they do not mean what we normally mean by that word:
@@ -236,23 +229,22 @@
you trying to copy music. “Malicious code” means code
installed by you to do what someone else doesn't want your machine to
do. “Spoofing” doesn't mean someone's fooling you, it means
-your fooling Palladium. And so on.</p></li>
-
-<span class="removed"><del><strong><li>A</strong></del></span>
+<span class="removed"><del><strong>your</strong></del></span>
+<span class="inserted"><ins><em>you're</em></ins></span> fooling Palladium.
And so on.</p></li>
-<span class="inserted"><ins><em><li><p>
-A</em></ins></span> previous statement by the Palladium developers stated the
basic
+<li><p>
+A previous statement by the Palladium developers stated the basic
premise that whoever developed or collected information should have
total control of how you use it. This would represent a revolutionary
overturn of past ideas of ethics and of the legal system, and create
an unprecedented system of control. The specific problems of these
systems are no accident; they result from the basic goal. It is the
-goal we must <span
class="removed"><del><strong>reject.</li></strong></del></span> <span
class="inserted"><ins><em>reject.</p></li></em></ins></span>
+goal we must reject.</p></li>
</ol>
<hr />
-<span class="inserted"><ins><em><p>As of 2015, treacherous computing has
been implemented for PCs in
+<p>As of 2015, treacherous computing has been implemented for PCs in
the form of the “Trusted Platform Module”; however, for
practical reasons, the TPM has proved a total failure for the goal of
providing a platform for remote attestation to verify Digital
@@ -282,7 +274,7 @@
attestation feasible. We must not presume that all future attempts
will fail too.</p>
-<hr /></em></ins></span>
+<hr />
<blockquote id="fsfs"><p class="big">This essay is published
in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
@@ -318,18 +310,17 @@
information on coordinating and submitting translations of this
article.</p>
</div>
-<p>Copyright © 2002, 2007, <span
class="removed"><del><strong>2014</strong></del></span> <span
class="inserted"><ins><em>2014, 2015</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2002, 2007, 2014, <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2016</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
-<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative</strong></del></span>
-<span
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</em></ins></span>
-Commons <span class="removed"><del><strong>Attribution-NoDerivs 3.0 United
States</strong></del></span> <span
class="inserted"><ins><em>Attribution-NoDerivatives 4.0
International</em></ins></span> License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
<!--#include virtual="/server/bottom-notes.html" -->
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/12/11 10:57:53 $
+$Date: 2016/12/26 23:58:03 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy can-you-trust.nl.html po/can-you...,
GNUN <=