www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-appliances.de.html malw...


From: GNUN
Subject: www/proprietary malware-appliances.de.html malw...
Date: Tue, 23 May 2017 13:59:41 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/05/23 13:59:41

Modified files:
        proprietary    : malware-appliances.de.html 
                         malware-appliances.fr.html 
                         malware-appliances.ru.html 
                         malware-google.fr.html malware-google.ru.html 
                         malware-mobiles.es.html malware-mobiles.fr.html 
                         malware-mobiles.ru.html 
                         proprietary-surveillance.de.html 
                         proprietary-surveillance.fr.html 
                         proprietary-surveillance.it.html 
                         proprietary-surveillance.ru.html 
        proprietary/po : malware-appliances.de-en.html 
                         malware-appliances.fr-en.html 
                         malware-appliances.ru-en.html 
                         malware-google.fr-en.html 
                         malware-google.ru-en.html 
                         malware-mobiles.es-en.html 
                         malware-mobiles.fr-en.html 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ru-en.html 
                         proprietary-surveillance.de-en.html 
                         proprietary-surveillance.fr-en.html 
                         proprietary-surveillance.it-en.html 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ru-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.de.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.fr.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.ru.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.fr.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.ru.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.de.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.78&r2=1.79

Patches:
Index: malware-appliances.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.de.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-appliances.de.html  8 May 2017 03:04:34 -0000       1.2
+++ malware-appliances.de.html  23 May 2017 17:59:40 -0000      1.3
@@ -304,7 +304,7 @@
 Autos lässt Verbraucher verrückt werden</a>.</p>
 </li>
 
-<li>
+<li id="cameras-bugs">
 <p>Überwachungskameras mit Verbindung ins Internet von mehr als <a
 href="//www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
 title="Remote Code Execution in CCTV-DVR affecting over 70 different
@@ -494,7 +494,7 @@
 einem Botnetz</a> gemacht, um Kreditkartendaten von Kunden zu sammeln.</p>
 </li>
 
-<li>
+<li id="vizio-snoop">
 <p>Vizio<ins>, ein nicht börsennotiertes US-Unternehmen im Bereich
 Unterhaltungselektronik,</ins> <a
 href="//boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"
@@ -761,7 +761,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/05/08 03:04:34 $
+$Date: 2017/05/23 17:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: malware-appliances.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.fr.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-appliances.fr.html  24 Apr 2017 14:29:20 -0000      1.19
+++ malware-appliances.fr.html  23 May 2017 17:59:40 -0000      1.20
@@ -267,7 +267,7 @@
 DRM des voitures vont conduire les consommateurs à la démence</a>.</p>
 </li>
 
-<li>
+<li id="cameras-bugs">
 <p>Plus de 70 modèles de caméras de surveillance connectées au réseau <a
 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>ont
 des failles de sécurité qui permettent à n'importe qui de s'en servir pour
@@ -429,7 +429,7 @@
 en botnet afin de récupérer les numéros de cartes de crédit des 
clients</a>.</p>
 </li>
 
-<li>
+<li id="vizio-snoop">
 <p>Vizio <a
 href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>a
 utilisé une « mise à niveau » du micrologiciel <cite>[firmware]</cite> 
pour
@@ -661,7 +661,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2017/04/24 14:29:20 $
+$Date: 2017/05/23 17:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: malware-appliances.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.ru.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- malware-appliances.ru.html  24 Apr 2017 11:01:40 -0000      1.18
+++ malware-appliances.ru.html  23 May 2017 17:59:40 -0000      1.19
@@ -259,7 +259,7 @@
 бешенство</a>.</p>
 </li>
 
-<li>
+<li id="cameras-bugs">
 <p>В камерах наблюдения более 70 марок 
обнаружены <a
 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>недочеты
 безопасности, позволяющие кому угодно 
подглядывать через них</a>.</p>
@@ -420,7 +420,7 @@
 карт клиентов.</p>
 </li>
 
-<li>
+<li id="vizio-snoop">
 <p>Vizio <a
 href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
 воспользовалась &ldquo;обновлением&rdquo; 
программ в устройствах, чтобы
@@ -650,7 +650,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2017/04/24 11:01:40 $
+$Date: 2017/05/23 17:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: malware-google.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.fr.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-google.fr.html      18 May 2017 16:29:14 -0000      1.11
+++ malware-google.fr.html      23 May 2017 17:59:40 -0000      1.12
@@ -192,7 +192,8 @@
 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>enregistre
 toutes les conversations</a>.</p>
   </li>
-  <li><p>Les thermomètres de Nest envoient au serveur <a
+  <li id="nest-thermometers">
+    <p>Les thermomètres de Nest envoient au serveur <a
 href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack";>beaucoup de
 données concernant l'utilisateur</a>.</p>
   </li>
@@ -330,7 +331,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2017/05/18 16:29:14 $
+$Date: 2017/05/23 17:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: malware-google.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.ru.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-google.ru.html      18 May 2017 09:29:12 -0000      1.11
+++ malware-google.ru.html      23 May 2017 17:59:40 -0000      1.12
@@ -183,7 +183,8 @@
 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>ведет
 протокол всех переговоров</a>.</p>
   </li>
-  <li><p>Термометры Nest <a
+  <li id="nest-thermometers">
+    <p>Термометры Nest <a
 href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack";>высылают 
много
 данных о пользователе</a>.</p>
   </li>
@@ -322,7 +323,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2017/05/18 09:29:12 $
+$Date: 2017/05/23 17:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- malware-mobiles.es.html     19 May 2017 16:28:44 -0000      1.21
+++ malware-mobiles.es.html     23 May 2017 17:59:40 -0000      1.22
@@ -68,13 +68,15 @@
 
 <h3 id="back-doors">Puertas traseras en los móviles</h3>
 <ul>
-  <li><p>La puerta trasera universal en los teléfonos móviles <a
+  <li id="back-door-microphone">
+    <p>La puerta trasera universal en los teléfonos móviles <a
 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/";>se
 emplea para convertirlos en dispositivos de escucha a través de sus
 micrófonos</a>.</p>
   </li>
 
-  <li><p>La mayoría de los teléfonos móviles tienen una puerta trasera 
universal que
+  <li id="back-door-malicious">
+    <p>La mayoría de los teléfonos móviles tienen una puerta trasera 
universal que
 ha sido utilizada para <a
 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
 convertirlos en maliciosos</a>.</p>
@@ -455,7 +457,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2017/05/19 16:28:44 $
+$Date: 2017/05/23 17:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- malware-mobiles.fr.html     18 May 2017 16:59:14 -0000      1.23
+++ malware-mobiles.fr.html     23 May 2017 17:59:40 -0000      1.24
@@ -66,12 +66,14 @@
 
 <h3 id="back-doors">Portes dérobées</h3>
 <ul>
-  <li><p>La porte dérobée universelle des téléphones portables <a
+  <li id="back-door-microphone">
+    <p>La porte dérobée universelle des téléphones portables <a
 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>est
 utilisée pour écouter leur micro</a>.</p>
   </li>
 
-  <li><p>La plupart des téléphones mobiles ont une porte dérobée 
universelle qui a
+  <li id="back-door-malicious">
+    <p>La plupart des téléphones mobiles ont une porte dérobée universelle 
qui a
 été utilisée pour <a
 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>les
 rendre malfaisants</a>.</p>
@@ -460,7 +462,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2017/05/18 16:59:14 $
+$Date: 2017/05/23 17:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- malware-mobiles.ru.html     18 May 2017 09:29:12 -0000      1.25
+++ malware-mobiles.ru.html     23 May 2017 17:59:40 -0000      1.26
@@ -65,12 +65,14 @@
 
 <h3 id="back-doors">Лазейки</h3>
 <ul>
-  <li><p>Универсальный черный ход в мобильных 
телефонах <a
+  <li id="back-door-microphone">
+    <p>Универсальный черный ход в мобильных 
телефонах <a
 href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
 задействуется для прослушивания через их 
микрофоны</a>.</p>
   </li>
 
-  <li><p><a
+  <li id="back-door-malicious">
+    <p><a
 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
 В большинстве мобильных телефонов есть 
универсальный черный ход</a>, который
 применяли для превращения их во 
вредоносные устройства.</p>
@@ -452,7 +454,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2017/05/18 09:29:12 $
+$Date: 2017/05/23 17:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.de.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-surveillance.de.html    10 May 2017 14:30:06 -0000      1.25
+++ proprietary-surveillance.de.html    23 May 2017 17:59:40 -0000      1.26
@@ -1077,7 +1077,7 @@
 unter: bloomberg.com 2016.">schnüffeln Geräte aus</a>.</p>
   </li>
 
-  <li><p>Das <ins>Großserien-Elektroauto</ins> <b>Nissan Leaf</b> hat ein 
eingebautes
+  <li id="nissan-modem"><p>Das <ins>Großserien-Elektroauto</ins> <b>Nissan 
Leaf</b> hat ein eingebautes
 Infotainment-System, das praktisch jedermann via Mobilfunkmodem erlaubt <a
 href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";
 title="Controlling vehicle features of Nissan LEAFs across the globe via
@@ -1099,7 +1099,7 @@
 …</p>
   </li>
 
-  <li><p>Proprietäre Software in Autos <a
+  <li id="records-drivers"><p>Proprietäre Software in Autos <a
 
href="//www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"
 title="Chris Woodyard and Jayne O'Donnell, Your car may be invading your
 privacy, unter: www.usatoday.com 2013.">zeichnet Informationen über
@@ -1667,7 +1667,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary-surveillance.fr.html    10 May 2017 14:30:06 -0000      1.82
+++ proprietary-surveillance.fr.html    23 May 2017 17:59:40 -0000      1.83
@@ -960,7 +960,7 @@
 des instruments d'espionnage</a>.</p>
   </li>
 
-  <li><p>La « Leaf » de Nissan a un modem de téléphonie mobile intégré 
qui permet à
+  <li id="nissan-modem"><p>La « Leaf » de Nissan a un modem de 
téléphonie mobile intégré qui permet à
 n'importe qui <a
 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>d'accéder
 à distance à ses ordinateurs et de changer différents réglages</a>.</p>
@@ -978,7 +978,7 @@
 physiquement.</p>
   </li>
 
-  <li><p>Dans certaines voitures, un logiciel privateur <a
+  <li id="records-drivers"><p>Dans certaines voitures, un logiciel privateur <a
 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>enregistre
 l'information concernant les mouvements des conducteurs</a>, information qui
 est mise à disposition des constructeurs automobiles et des compagnies
@@ -1438,7 +1438,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-surveillance.it.html    11 May 2017 21:29:25 -0000      1.34
+++ proprietary-surveillance.it.html    23 May 2017 17:59:40 -0000      1.35
@@ -945,7 +945,7 @@
 spiano gli utenti</a>.</p>
   </li>
 
-  <li><p>La Nissan Leaf ha un modem che permette a chiunque di <a
+  <li id="nissan-modem"><p>La Nissan Leaf ha un modem che permette a chiunque 
di <a
 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>accedere
 da remoto al computer di bordo e modificare alcune impostazioni</a>.</p>
 
@@ -961,7 +961,7 @@
 ma è possibile rimuovere il modem.</p>
   </li>
 
-  <li><p>Il software proprietario nelle auto <a
+  <li id="records-drivers"><p>Il software proprietario nelle auto <a
 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>registra
 informazioni sui movimenti dei guidatori</a> e ke rende disponibili ai
 produttori di auto, alle compagnie assicurative e ad altri.</p>
@@ -1401,7 +1401,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/05/23 17:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary-surveillance.ru.html    10 May 2017 14:30:06 -0000      1.82
+++ proprietary-surveillance.ru.html    23 May 2017 17:59:40 -0000      1.83
@@ -950,7 +950,7 @@
 шпионящими устройствами</a>.</p>
   </li>
 
-  <li><p>В Nissan Leaf есть встроенный телефонный 
модем, позволяющий фактически кому
+  <li id="nissan-modem"><p>В Nissan Leaf есть встроенный 
телефонный модем, позволяющий фактически 
кому
 угодно <a
 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>получать
 удаленный доступ к компьютерам и вносить 
изменения в различные
@@ -967,7 +967,7 @@
 автомобиля; хотя можно физически удалить 
модем сотовой связи.</p>
   </li>
 
-  <li><p>Несвободные программы в автомобилях <a
+  <li id="records-drivers"><p>Несвободные программы в 
автомобилях <a
 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>записывают
 сведения о движениях водителей</a>, а затем 
передают их производителям
 автомобиля, страховым компаниям и 
прочим.</p>
@@ -1415,7 +1415,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-appliances.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-appliances.de-en.html    8 May 2017 03:04:34 -0000       1.2
+++ po/malware-appliances.de-en.html    23 May 2017 17:59:40 -0000      1.3
@@ -243,7 +243,7 @@
 DRM in cars will drive consumers crazy</a>.</p>
 </li>
 
-<li>
+<li id="cameras-bugs">
 <p>Over 70 brands of network-connected surveillance cameras have <a
 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
 security bugs that allow anyone to watch through them</a>.</p>
@@ -401,7 +401,7 @@
 numbers.</p>
 </li>
 
-<li>
+<li id="vizio-snoop">
 <p>Vizio
 <a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
 used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
@@ -607,7 +607,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/08 03:04:34 $
+$Date: 2017/05/23 17:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-appliances.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/malware-appliances.fr-en.html    24 Apr 2017 14:29:20 -0000      1.19
+++ po/malware-appliances.fr-en.html    23 May 2017 17:59:40 -0000      1.20
@@ -243,7 +243,7 @@
 DRM in cars will drive consumers crazy</a>.</p>
 </li>
 
-<li>
+<li id="cameras-bugs">
 <p>Over 70 brands of network-connected surveillance cameras have <a
 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
 security bugs that allow anyone to watch through them</a>.</p>
@@ -401,7 +401,7 @@
 numbers.</p>
 </li>
 
-<li>
+<li id="vizio-snoop">
 <p>Vizio
 <a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
 used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
@@ -607,7 +607,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/04/24 14:29:20 $
+$Date: 2017/05/23 17:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-appliances.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/malware-appliances.ru-en.html    24 Apr 2017 11:01:41 -0000      1.19
+++ po/malware-appliances.ru-en.html    23 May 2017 17:59:40 -0000      1.20
@@ -243,7 +243,7 @@
 DRM in cars will drive consumers crazy</a>.</p>
 </li>
 
-<li>
+<li id="cameras-bugs">
 <p>Over 70 brands of network-connected surveillance cameras have <a
 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
 security bugs that allow anyone to watch through them</a>.</p>
@@ -401,7 +401,7 @@
 numbers.</p>
 </li>
 
-<li>
+<li id="vizio-snoop">
 <p>Vizio
 <a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
 used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
@@ -607,7 +607,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/04/24 11:01:41 $
+$Date: 2017/05/23 17:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-google.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-google.fr-en.html        18 May 2017 16:29:14 -0000      1.10
+++ po/malware-google.fr-en.html        23 May 2017 17:59:40 -0000      1.11
@@ -167,7 +167,8 @@
   <li><p>Google's new voice messaging app <a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>logs
       all conversations</a>.</p>
   </li>
-  <li><p>Nest thermometers
+  <li id="nest-thermometers">
+    <p>Nest thermometers
   send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack";>a
   lot of data about the user</a>.</p>
   </li>
@@ -277,7 +278,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/18 16:29:14 $
+$Date: 2017/05/23 17:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-google.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/malware-google.ru-en.html        18 May 2017 09:29:13 -0000      1.11
+++ po/malware-google.ru-en.html        23 May 2017 17:59:40 -0000      1.12
@@ -167,7 +167,8 @@
   <li><p>Google's new voice messaging app <a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>logs
       all conversations</a>.</p>
   </li>
-  <li><p>Nest thermometers
+  <li id="nest-thermometers">
+    <p>Nest thermometers
   send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack";>a
   lot of data about the user</a>.</p>
   </li>
@@ -277,7 +278,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/18 09:29:13 $
+$Date: 2017/05/23 17:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/malware-mobiles.es-en.html       19 May 2017 16:28:45 -0000      1.19
+++ po/malware-mobiles.es-en.html       23 May 2017 17:59:40 -0000      1.20
@@ -54,12 +54,14 @@
 
 <h3 id="back-doors">Mobile Back Doors</h3>
 <ul>
-  <li><p>The universal back door in portable phones <a
+  <li id="back-door-microphone">
+    <p>The universal back door in portable phones <a
     
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>is
     employed to listen through their microphones</a>.</p>
   </li>
 
-  <li><p>Most mobile phones have a universal back door, which has been
+  <li id="back-door-malicious">
+    <p>Most mobile phones have a universal back door, which has been
   used to <a
   
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
   turn them malicious</a>.</p>
@@ -400,7 +402,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/19 16:28:45 $
+$Date: 2017/05/23 17:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- po/malware-mobiles.fr-en.html       18 May 2017 16:59:14 -0000      1.22
+++ po/malware-mobiles.fr-en.html       23 May 2017 17:59:40 -0000      1.23
@@ -54,12 +54,14 @@
 
 <h3 id="back-doors">Mobile Back Doors</h3>
 <ul>
-  <li><p>The universal back door in portable phones <a
+  <li id="back-door-microphone">
+    <p>The universal back door in portable phones <a
     
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>is
     employed to listen through their microphones</a>.</p>
   </li>
 
-  <li><p>Most mobile phones have a universal back door, which has been
+  <li id="back-door-malicious">
+    <p>Most mobile phones have a universal back door, which has been
   used to <a
   
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
   turn them malicious</a>.</p>
@@ -400,7 +402,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/18 16:59:14 $
+$Date: 2017/05/23 17:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-mobiles.ja-diff.html     18 May 2017 05:32:18 -0000      1.10
+++ po/malware-mobiles.ja-diff.html     23 May 2017 17:59:40 -0000      1.11
@@ -75,12 +75,17 @@
 
 &lt;h3 id="back-doors"&gt;Mobile Back Doors&lt;/h3&gt;
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The universal back door in portable phones &lt;a
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="back-door-microphone"&gt;
+    &lt;p&gt;The</em></ins></span> universal back door in portable phones &lt;a
     
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
     employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Most mobile phones have a universal back door, which has 
been
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Most</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="back-door-malicious"&gt;
+    &lt;p&gt;Most</em></ins></span> mobile phones have a universal back door, 
which has been
   used to &lt;a
   
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
   turn them malicious&lt;/a&gt;.&lt;/p&gt;
@@ -421,7 +426,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/05/18 05:32:18 $
+$Date: 2017/05/23 17:59:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/malware-mobiles.ru-en.html       18 May 2017 09:29:13 -0000      1.23
+++ po/malware-mobiles.ru-en.html       23 May 2017 17:59:40 -0000      1.24
@@ -54,12 +54,14 @@
 
 <h3 id="back-doors">Mobile Back Doors</h3>
 <ul>
-  <li><p>The universal back door in portable phones <a
+  <li id="back-door-microphone">
+    <p>The universal back door in portable phones <a
     
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>is
     employed to listen through their microphones</a>.</p>
   </li>
 
-  <li><p>Most mobile phones have a universal back door, which has been
+  <li id="back-door-malicious">
+    <p>Most mobile phones have a universal back door, which has been
   used to <a
   
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
   turn them malicious</a>.</p>
@@ -400,7 +402,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/18 09:29:13 $
+$Date: 2017/05/23 17:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- po/proprietary-surveillance.de-en.html      10 May 2017 14:30:06 -0000      
1.22
+++ po/proprietary-surveillance.de-en.html      23 May 2017 17:59:40 -0000      
1.23
@@ -906,7 +906,7 @@
   snooping devices</a>.</p>
   </li>
 
-  <li><p>The Nissan Leaf has a built-in cell phone modem which allows
+  <li id="nissan-modem"><p>The Nissan Leaf has a built-in cell phone modem 
which allows
   effectively
   anyone <a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>to
   access its computers remotely and make changes in various
@@ -925,7 +925,7 @@
     though.</p>
   </li>
 
-  <li><p>Proprietary software in cars
+  <li id="records-drivers"><p>Proprietary software in cars
       <a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>records
 information about drivers' movements</a>,
       which is made available to car manufacturers, insurance companies, and
       others.</p>
@@ -1325,7 +1325,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/proprietary-surveillance.fr-en.html      10 May 2017 14:30:06 -0000      
1.75
+++ po/proprietary-surveillance.fr-en.html      23 May 2017 17:59:40 -0000      
1.76
@@ -906,7 +906,7 @@
   snooping devices</a>.</p>
   </li>
 
-  <li><p>The Nissan Leaf has a built-in cell phone modem which allows
+  <li id="nissan-modem"><p>The Nissan Leaf has a built-in cell phone modem 
which allows
   effectively
   anyone <a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>to
   access its computers remotely and make changes in various
@@ -925,7 +925,7 @@
     though.</p>
   </li>
 
-  <li><p>Proprietary software in cars
+  <li id="records-drivers"><p>Proprietary software in cars
       <a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>records
 information about drivers' movements</a>,
       which is made available to car manufacturers, insurance companies, and
       others.</p>
@@ -1325,7 +1325,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/proprietary-surveillance.it-en.html      11 May 2017 21:29:25 -0000      
1.31
+++ po/proprietary-surveillance.it-en.html      23 May 2017 17:59:40 -0000      
1.32
@@ -906,7 +906,7 @@
   snooping devices</a>.</p>
   </li>
 
-  <li><p>The Nissan Leaf has a built-in cell phone modem which allows
+  <li id="nissan-modem"><p>The Nissan Leaf has a built-in cell phone modem 
which allows
   effectively
   anyone <a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>to
   access its computers remotely and make changes in various
@@ -925,7 +925,7 @@
     though.</p>
   </li>
 
-  <li><p>Proprietary software in cars
+  <li id="records-drivers"><p>Proprietary software in cars
       <a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>records
 information about drivers' movements</a>,
       which is made available to car manufacturers, insurance companies, and
       others.</p>
@@ -1325,7 +1325,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/05/23 17:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-surveillance.ja-diff.html    10 May 2017 14:30:06 -0000      
1.19
+++ po/proprietary-surveillance.ja-diff.html    23 May 2017 17:59:40 -0000      
1.20
@@ -771,34 +771,33 @@
     &lt;p&gt;The company's statement that it <span 
class="removed"><del><strong>anonymizes</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the data may be
       true, but it doesn't really matter. If it <span 
class="removed"><del><strong>sells</strong></del></span> <span 
class="inserted"><ins><em>had sold</em></ins></span> the data to a
       data broker, the data broker <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>would have been able to</em></ins></span> figure out
-      who the <span class="removed"><del><strong>user is.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A computerized
-        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
-        on its users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;The app reports</strong></del></span> <span 
class="inserted"><ins><em>user was.&lt;/p&gt;
+      who the user <span 
class="removed"><del><strong>is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
     
     &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-       the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>company has been ordered to pay a 
total</em></ins></span> of <span class="inserted"><ins><em>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered to pay a total of C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it is surrounded 
by</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
+        vibrator</strong></del></span>
+  
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; 
toys with microphones</em></ins></span>
+      &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
+        on its users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;The app reports</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span>
        <span class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</em></ins></span> a <span class="removed"><del><strong>person's
-      body), and</strong></del></span> <span class="inserted"><ins><em>way to 
access</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether it is surrounded</strong></del></span> 
<span class="inserted"><ins><em>data&lt;/a&gt;
+      collected</em></ins></span> by <span class="removed"><del><strong>a 
person's
+      body), and</strong></del></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
 
-      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt;
-      collected by</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users can 
check</strong></del></span> <span class="inserted"><ins><em>manufacturer's 
snooping.&lt;/p&gt;
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>change.&lt;/p&gt;
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users can 
check</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and <span 
class="removed"><del><strong>change.&lt;/p&gt;
   &lt;/li&gt;</strong></del></span> <span class="inserted"><ins><em>the FBI 
could listen to these conversations
       was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
   
@@ -935,7 +934,9 @@
   snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li 
id="nissan-modem"&gt;&lt;p&gt;The</em></ins></span> Nissan Leaf has a built-in 
cell phone modem which allows
   effectively
   anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
   access its computers remotely and make changes in various
@@ -954,7 +955,9 @@
     though.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Proprietary software in cars
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li 
id="records-drivers"&gt;&lt;p&gt;Proprietary</em></ins></span> software in cars
       &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
       which is made available to car manufacturers, insurance companies, and
       others.&lt;/p&gt;
@@ -1355,7 +1358,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- po/proprietary-surveillance.ru-en.html      10 May 2017 14:30:06 -0000      
1.78
+++ po/proprietary-surveillance.ru-en.html      23 May 2017 17:59:40 -0000      
1.79
@@ -906,7 +906,7 @@
   snooping devices</a>.</p>
   </li>
 
-  <li><p>The Nissan Leaf has a built-in cell phone modem which allows
+  <li id="nissan-modem"><p>The Nissan Leaf has a built-in cell phone modem 
which allows
   effectively
   anyone <a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>to
   access its computers remotely and make changes in various
@@ -925,7 +925,7 @@
     though.</p>
   </li>
 
-  <li><p>Proprietary software in cars
+  <li id="records-drivers"><p>Proprietary software in cars
       <a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>records
 information about drivers' movements</a>,
       which is made available to car manufacturers, insurance companies, and
       others.</p>
@@ -1325,7 +1325,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]