www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-mobiles.de.po malwar...


From: GNUN
Subject: www/proprietary/po malware-mobiles.de.po malwar...
Date: Sun, 30 Jul 2017 04:01:32 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/07/30 04:01:32

Modified files:
        proprietary/po : malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.ru.po 
                         malware-webpages.pot 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.pot?cvsroot=www&r1=1.1&r2=1.2

Patches:
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- malware-mobiles.de.po       28 Jul 2017 20:29:13 -0000      1.61
+++ malware-mobiles.de.po       30 Jul 2017 08:01:31 -0000      1.62
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-07-28 20:25+0000\n"
+"POT-Creation-Date: 2017-07-29 21:25+0000\n"
 "PO-Revision-Date: 2017-07-16 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -198,10 +198,20 @@
 "a> ermöglicht Zugriff auf beliebige Dateien im System."
 
 #. type: Content of: <ul><li><p>
+# | In Android, <a
+# | 
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
+# | Google has a back door to remotely delete [-apps.</a> (It-] {+apps</a>
+# | (it+} is in a program called GTalkService).
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps.</a> (It is in a program called "
+#| "GTalkService)."
 msgid ""
 "In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
 "google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps.</a> (It is in a program called GTalkService)."
+"to remotely delete apps</a> (it is in a program called GTalkService)."
 msgstr ""
 "Google hat in <a href=\"//www.computerworld.com/article/2506557/security0/"
 "google-throws--kill-switch--on-android-phones.html\" title=\"Google throws "
@@ -279,11 +289,19 @@
 "\"#malicious-wifi\" id=\"malicious-wifi-ref\" class=\"tnote\">[6]</a>"
 
 #. type: Content of: <ul><li><p>
+# | Samsung phones <a
+# | 
href=\"https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/\";>have
+# | a security hole that allows an SMS message to install ransom[-e-]ware</a>.
+#, fuzzy
+#| msgid ""
+#| "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/";
+#| "sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-"
+#| "attacks/\">have a security hole that allows an SMS message to install "
+#| "ransomeware</a>."
 msgid ""
 "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-";
 "exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
-"\">have a security hole that allows an SMS message to install ransomeware</"
-"a>."
+"\">have a security hole that allows an SMS message to install ransomware</a>."
 msgstr ""
 "Samsung-Handys <a href=\"https://www.bleepingcomputer.com/news/security/sms-";
 "exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
@@ -336,6 +354,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+"html\">are sold with spyware sending lots of data to China</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app listens all the time, <a href=\"http://www.independent.co.uk/";
 "life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-"
 "on-what-they-re-saying-claims-professor-a7057526.html\">to snoop on what "
@@ -375,14 +401,14 @@
 "Im Folgenden eine unvollständige Übersicht proprietärer VPN-Apps aus dem "
 "\tForschungsbericht, welche Nutzer verfolgen und die Privatsphäre verletzen:"
 
-#. type: Content of: <ul><li><ul><li>
-# | [-SurfEasy-]{+<em>SurfEasy</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "SurfEasy"
-msgid "<em>SurfEasy</em>"
+msgid "SurfEasy"
 msgstr "<b>SurfEasy VPN</b>"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Includes tracking libraries such as NativeX and Appflood, meant to track "
 "users and show them targeted ads."
@@ -390,14 +416,14 @@
 "Enthält Tracking-Bibliotheken wie <b>NativeX</b> und <b>Appflood</b>, "
 "bestimmt um Nutzer zu verfolgen und gezielte Werbung anzuzeigen."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-sFly-]{+<em>sFly+} Network [-Booster-] {+Booster</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "sFly Network Booster"
-msgid "<em>sFly Network Booster</em>"
+msgid "sFly Network Booster"
 msgstr "<b>sFly Network Booster</b>"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Requests the <code>READ_SMS</code> and <code>SEND_SMS</code> permissions "
 "upon installation, meaning it has full access to users' text messages."
@@ -406,14 +432,14 @@
 "\">READ_SMS</span> und <span class=\"teletype\">SEND_SMS</span>, somit "
 "vollen Zugriff auf Textnachrichten."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-DroidVPN-]{+<em>DroidVPN+} and [-TigerVPN-] {+TigerVPN</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "DroidVPN and TigerVPN"
-msgid "<em>DroidVPN and TigerVPN</em>"
+msgid "DroidVPN and TigerVPN"
 msgstr "<b>DroidVPN</b> und <b>TigerVPN</b>"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Requests the <code>READ_LOGS</code> permission to read logs for other apps "
 "and also core system logs. TigerVPN developers have confirmed this."
@@ -422,14 +448,14 @@
 "\">READ_LOGS</span> zum Lesen von Protokollen für Apps Dritter und auch "
 "Kernsystemprotokollen. TigerVPN-Entwickler bestätigten dies."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-HideMyAss-]{+<em>HideMyAss</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "HideMyAss"
-msgid "<em>HideMyAss</em>"
+msgid "HideMyAss"
 msgstr "<b>HideMyAss</b>"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Sends traffic to LinkedIn. Also, it stores detailed logs and may turn them "
 "over to the UK government if requested."
@@ -437,14 +463,14 @@
 "Sendet Datenverkehr an <i>LinkedIn</i>. Darüber hinaus werden detaillierte "
 "Protokolle gespeichert und auf Wunsch an die britische Regierung übergeben."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-VPN-]{+<em>VPN+} Services [-HotspotShield-] {+HotspotShield</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "VPN Services HotspotShield"
-msgid "<em>VPN Services HotspotShield</em>"
+msgid "VPN Services HotspotShield"
 msgstr "<b>Hotspot Shield VPN Service</b>"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into the HTML pages returned to the users. The "
 "stated purpose of the JS injection is to display ads. Uses roughly 5 "
@@ -456,14 +482,14 @@
 "Nutzt etwa 5 Tracking-Bibliotheken. Außerdem leitet es das "
 "Besucherdatenaufkommen via Valueclick.com (Internetwerbung) um."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-WiFi-]{+<em>WiFi+} Protector [-VPN-] {+VPN</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "WiFi Protector VPN"
-msgid "<em>WiFi Protector VPN</em>"
+msgid "WiFi Protector VPN"
 msgstr "<b>WiFi Protector VPN</b>"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into HTML pages, and also uses roughly 5 tracking "
 "libraries. Developers of this app have confirmed that the non-premium "

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-mobiles.es.po       28 Jul 2017 20:29:13 -0000      1.57
+++ malware-mobiles.es.po       30 Jul 2017 08:01:32 -0000      1.58
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-07-28 20:25+0000\n"
+"POT-Creation-Date: 2017-07-29 21:25+0000\n"
 "PO-Revision-Date: 2017-06-26 13:16+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -194,10 +194,20 @@
 "trasera de Samsung</a> permite el acceso a cualquier archivo del sistema."
 
 #. type: Content of: <ul><li><p>
+# | In Android, <a
+# | 
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
+# | Google has a back door to remotely delete [-apps.</a> (It-] {+apps</a>
+# | (it+} is in a program called GTalkService).
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps.</a> (It is in a program called "
+#| "GTalkService)."
 msgid ""
 "In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
 "google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps.</a> (It is in a program called GTalkService)."
+"to remotely delete apps</a> (it is in a program called GTalkService)."
 msgstr ""
 "En Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
 "google-throws--kill-switch--on-android-phones.html\">Google tiene una puerta "
@@ -266,11 +276,19 @@
 "a un fallo en el <cite>firmware</cite> no libre de Broadcom."
 
 #. type: Content of: <ul><li><p>
+# | Samsung phones <a
+# | 
href=\"https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/\";>have
+# | a security hole that allows an SMS message to install ransom[-e-]ware</a>.
+#, fuzzy
+#| msgid ""
+#| "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/";
+#| "sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-"
+#| "attacks/\">have a security hole that allows an SMS message to install "
+#| "ransomeware</a>."
 msgid ""
 "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-";
 "exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
-"\">have a security hole that allows an SMS message to install ransomeware</"
-"a>."
+"\">have a security hole that allows an SMS message to install ransomware</a>."
 msgstr ""
 "Los teléfonos de Samsung <a href=\"https://www.bleepingcomputer.com/news/";
 "security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-"
@@ -319,6 +337,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+"html\">are sold with spyware sending lots of data to China</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app listens all the time, <a href=\"http://www.independent.co.uk/";
 "life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-"
 "on-what-they-re-saying-claims-professor-a7057526.html\">to snoop on what "
@@ -358,14 +384,14 @@
 "privativas mencionadas en ese trabajo de investigación que rastrean a los "
 "usuarios y vulneran su privacidad:"
 
-#. type: Content of: <ul><li><ul><li>
-# | [-SurfEasy-]{+<em>SurfEasy</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "SurfEasy"
-msgid "<em>SurfEasy</em>"
+msgid "SurfEasy"
 msgstr "SurfEasy"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Includes tracking libraries such as NativeX and Appflood, meant to track "
 "users and show them targeted ads."
@@ -373,14 +399,14 @@
 "Contiene bibliotecas de rastreo tales como NativeX y Appflood, pensadas para "
 "rastrear a los usuarios y mostrarles anuncios personalizados."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-sFly-]{+<em>sFly+} Network [-Booster-] {+Booster</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "sFly Network Booster"
-msgid "<em>sFly Network Booster</em>"
+msgid "sFly Network Booster"
 msgstr "sFly Network Booster"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Requests the <code>READ_SMS</code> and <code>SEND_SMS</code> permissions "
 "upon installation, meaning it has full access to users' text messages."
@@ -389,14 +415,14 @@
 "<code>SEND_SMS</code>, lo que significa que tiene total acceso a los "
 "mensajes de texto de los usuarios."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-DroidVPN-]{+<em>DroidVPN+} and [-TigerVPN-] {+TigerVPN</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "DroidVPN and TigerVPN"
-msgid "<em>DroidVPN and TigerVPN</em>"
+msgid "DroidVPN and TigerVPN"
 msgstr "DroidVPN y TigerVPN"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Requests the <code>READ_LOGS</code> permission to read logs for other apps "
 "and also core system logs. TigerVPN developers have confirmed this."
@@ -405,14 +431,14 @@
 "aplicaciones y también los del núcleo del sistema. Los desarrolladores de "
 "TigerVPN lo han confirmado."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-HideMyAss-]{+<em>HideMyAss</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "HideMyAss"
-msgid "<em>HideMyAss</em>"
+msgid "HideMyAss"
 msgstr "HideMyAss"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Sends traffic to LinkedIn. Also, it stores detailed logs and may turn them "
 "over to the UK government if requested."
@@ -420,14 +446,14 @@
 "Envía tráfico a LinkedIn. Además, almacena registros detallados que puede "
 "remitir al Gobierno británico si este lo solicita."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-VPN-]{+<em>VPN+} Services [-HotspotShield-] {+HotspotShield</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "VPN Services HotspotShield"
-msgid "<em>VPN Services HotspotShield</em>"
+msgid "VPN Services HotspotShield"
 msgstr "VPN Services HotspotShield"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into the HTML pages returned to the users. The "
 "stated purpose of the JS injection is to display ads. Uses roughly 5 "
@@ -439,14 +465,14 @@
 "cinco bibliotecas de rastreo. Además, redirige el tráfico de los usuarios a 
"
 "través de valueclick.com (una página de publicidad personalizada)."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-WiFi-]{+<em>WiFi+} Protector [-VPN-] {+VPN</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "WiFi Protector VPN"
-msgid "<em>WiFi Protector VPN</em>"
+msgid "WiFi Protector VPN"
 msgstr "WiFi Protector VPN"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into HTML pages, and also uses roughly 5 tracking "
 "libraries. Developers of this app have confirmed that the non-premium "

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- malware-mobiles.fr.po       28 Jul 2017 21:08:11 -0000      1.66
+++ malware-mobiles.fr.po       30 Jul 2017 08:01:32 -0000      1.67
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-07-28 20:25+0000\n"
+"POT-Creation-Date: 2017-07-29 21:25+0000\n"
 "PO-Revision-Date: 2017-07-28 22:57+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-07-29 21:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -177,10 +178,20 @@
 "dérobée de Samsung</a> permet l'accès à n'importe quel fichier du 
système."
 
 #. type: Content of: <ul><li><p>
+# | In Android, <a
+# | 
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
+# | Google has a back door to remotely delete [-apps.</a> (It-] {+apps</a>
+# | (it+} is in a program called GTalkService).
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps.</a> (It is in a program called "
+#| "GTalkService)."
 msgid ""
 "In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
 "google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps.</a> (It is in a program called GTalkService)."
+"to remotely delete apps</a> (it is in a program called GTalkService)."
 msgstr ""
 "Dans Android, <a href=\"http://www.computerworld.com/article/2506557/";
 "security0/google-throws--kill-switch--on-android-phones.html\">Google a une "
@@ -249,11 +260,19 @@
 "bogue dans le micrologiciel <cite>[firmware]</cite> non libre de Broadcom."
 
 #. type: Content of: <ul><li><p>
+# | Samsung phones <a
+# | 
href=\"https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/\";>have
+# | a security hole that allows an SMS message to install ransom[-e-]ware</a>.
+#, fuzzy
+#| msgid ""
+#| "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/";
+#| "sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-"
+#| "attacks/\">have a security hole that allows an SMS message to install "
+#| "ransomeware</a>."
 msgid ""
 "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-";
 "exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
-"\">have a security hole that allows an SMS message to install ransomeware</"
-"a>."
+"\">have a security hole that allows an SMS message to install ransomware</a>."
 msgstr ""
 "Des téléphones Samsung <a href=\"https://www.bleepingcomputer.com/news/";
 "security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-"
@@ -301,6 +320,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+"html\">are sold with spyware sending lots of data to China</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app listens all the time, <a href=\"http://www.independent.co.uk/";
 "life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-"
 "on-what-they-re-saying-claims-professor-a7057526.html\">to snoop on what "
@@ -339,11 +366,14 @@
 "des applis VPN privatrices qui traquent les utilisateurs et portent atteinte "
 "à leur vie privée."
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>SurfEasy</em>"
+#. type: Content of: <ul><li><dl><dt>
+# | [-<em>SurfEasy</em>-]{+SurfEasy+}
+#, fuzzy
+#| msgid "<em>SurfEasy</em>"
+msgid "SurfEasy"
 msgstr "<em>SurfEasy</em>"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Includes tracking libraries such as NativeX and Appflood, meant to track "
 "users and show them targeted ads."
@@ -351,11 +381,14 @@
 "Comprend des bibliothèques comme NativeX et Appflood, destinées à pister "
 "l'utilisateur et à lui envoyer des pubs ciblées."
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>sFly Network Booster</em>"
+#. type: Content of: <ul><li><dl><dt>
+# | [-<em>sFly-]{+sFly+} Network [-Booster</em>-] {+Booster+}
+#, fuzzy
+#| msgid "<em>sFly Network Booster</em>"
+msgid "sFly Network Booster"
 msgstr "<em>sFly Network Booster</em>"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Requests the <code>READ_SMS</code> and <code>SEND_SMS</code> permissions "
 "upon installation, meaning it has full access to users' text messages."
@@ -364,11 +397,14 @@
 "de l'installation, ce qui veut dire qu'il a un accès complet aux textos de "
 "l'utilisateur."
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>DroidVPN and TigerVPN</em>"
+#. type: Content of: <ul><li><dl><dt>
+# | [-<em>DroidVPN-]{+DroidVPN+} and [-TigerVPN</em>-] {+TigerVPN+}
+#, fuzzy
+#| msgid "<em>DroidVPN and TigerVPN</em>"
+msgid "DroidVPN and TigerVPN"
 msgstr "<em>DroidVPN et TigerVPN</em>"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Requests the <code>READ_LOGS</code> permission to read logs for other apps "
 "and also core system logs. TigerVPN developers have confirmed this."
@@ -377,11 +413,14 @@
 "autres applis, et aussi ceux du système. Les développeurs de TigerVPN l'ont 
"
 "confirmé."
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>HideMyAss</em>"
+#. type: Content of: <ul><li><dl><dt>
+# | [-<em>HideMyAss</em>-]{+HideMyAss+}
+#, fuzzy
+#| msgid "<em>HideMyAss</em>"
+msgid "HideMyAss"
 msgstr "<em>HideMyAss</em>"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Sends traffic to LinkedIn. Also, it stores detailed logs and may turn them "
 "over to the UK government if requested."
@@ -389,11 +428,14 @@
 "Envoie du trafic à LinkedIn. De plus, cette appli conserve des journaux "
 "détaillés et peut les transmettre au gouvernement britannique sur sa 
demande."
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>VPN Services HotspotShield</em>"
+#. type: Content of: <ul><li><dl><dt>
+# | [-<em>VPN-]{+VPN+} Services [-HotspotShield</em>-] {+HotspotShield+}
+#, fuzzy
+#| msgid "<em>VPN Services HotspotShield</em>"
+msgid "VPN Services HotspotShield"
 msgstr "<em>Service VPN HotspotShield</em>"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into the HTML pages returned to the users. The "
 "stated purpose of the JS injection is to display ads. Uses roughly 5 "
@@ -405,11 +447,14 @@
 "cinq bibliothèques de traçage environ. En outre, elle redirige le trafic de 
"
 "l'utilisateur par valueclick.com (un site de publicité)."
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>WiFi Protector VPN</em>"
+#. type: Content of: <ul><li><dl><dt>
+# | [-<em>WiFi-]{+WiFi+} Protector [-VPN</em>-] {+VPN+}
+#, fuzzy
+#| msgid "<em>WiFi Protector VPN</em>"
+msgid "WiFi Protector VPN"
 msgstr "<em>WiFi Protector</em>"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into HTML pages, and also uses roughly 5 tracking "
 "libraries. Developers of this app have confirmed that the non-premium "

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-mobiles.it.po       28 Jul 2017 20:29:13 -0000      1.63
+++ malware-mobiles.it.po       30 Jul 2017 08:01:32 -0000      1.64
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-07-28 20:25+0000\n"
+"POT-Creation-Date: 2017-07-29 21:25+0000\n"
 "PO-Revision-Date: 2017-07-06 22:25+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -188,10 +188,20 @@
 "Samsung</a> fornisce accesso a qualsiasi file sul sistema."
 
 #. type: Content of: <ul><li><p>
+# | In Android, <a
+# | 
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
+# | Google has a back door to remotely delete [-apps.</a> (It-] {+apps</a>
+# | (it+} is in a program called GTalkService).
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps.</a> (It is in a program called "
+#| "GTalkService)."
 msgid ""
 "In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
 "google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps.</a> (It is in a program called GTalkService)."
+"to remotely delete apps</a> (it is in a program called GTalkService)."
 msgstr ""
 "In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
 "google-throws--kill-switch--on-android-phones.html\">Google ha una backdoor "
@@ -259,11 +269,19 @@
 "falla nel firmware non libero di Broadcom."
 
 #. type: Content of: <ul><li><p>
+# | Samsung phones <a
+# | 
href=\"https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/\";>have
+# | a security hole that allows an SMS message to install ransom[-e-]ware</a>.
+#, fuzzy
+#| msgid ""
+#| "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/";
+#| "sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-"
+#| "attacks/\">have a security hole that allows an SMS message to install "
+#| "ransomeware</a>."
 msgid ""
 "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-";
 "exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
-"\">have a security hole that allows an SMS message to install ransomeware</"
-"a>."
+"\">have a security hole that allows an SMS message to install ransomware</a>."
 msgstr ""
 "I telefoni Samsung hanno un problema di sicurezza che permette <a href="
 "\"https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-";
@@ -311,6 +329,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+"html\">are sold with spyware sending lots of data to China</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app listens all the time, <a href=\"http://www.independent.co.uk/";
 "life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-"
 "on-what-they-re-saying-claims-professor-a7057526.html\">to snoop on what "
@@ -346,14 +372,14 @@
 "Ecco una lista, non completa, di applicazioni VPN proprietarie che secondo "
 "l'articolo violano la privacy degli utenti:"
 
-#. type: Content of: <ul><li><ul><li>
-# | [-SurfEasy-]{+<em>SurfEasy</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "SurfEasy"
-msgid "<em>SurfEasy</em>"
+msgid "SurfEasy"
 msgstr "SurfEasy"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Includes tracking libraries such as NativeX and Appflood, meant to track "
 "users and show them targeted ads."
@@ -361,14 +387,14 @@
 "Include le librerie di tracciamento NativeX e Appflood, usate per "
 "personalizzare gli annunci pubblicitari."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-sFly-]{+<em>sFly+} Network [-Booster-] {+Booster</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "sFly Network Booster"
-msgid "<em>sFly Network Booster</em>"
+msgid "sFly Network Booster"
 msgstr "sFly Network Booster"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Requests the <code>READ_SMS</code> and <code>SEND_SMS</code> permissions "
 "upon installation, meaning it has full access to users' text messages."
@@ -376,14 +402,14 @@
 "Richiede i due permessi <code>READ_SMS</code> e <code>SEND_SMS</code> ed ha "
 "quindi pieno accesso ai messaggi testuali dell'utente."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-DroidVPN-]{+<em>DroidVPN+} and [-TigerVPN-] {+TigerVPN</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "DroidVPN and TigerVPN"
-msgid "<em>DroidVPN and TigerVPN</em>"
+msgid "DroidVPN and TigerVPN"
 msgstr "DroidVPN e TigerVPN"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Requests the <code>READ_LOGS</code> permission to read logs for other apps "
 "and also core system logs. TigerVPN developers have confirmed this."
@@ -391,14 +417,14 @@
 "Richiede il permesso <code>READ_LOGS</code> per leggere i logo di altre "
 "applicazioni e del sistema, come confermato dagli sviluppatori di TigerVPN."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-HideMyAss-]{+<em>HideMyAss</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "HideMyAss"
-msgid "<em>HideMyAss</em>"
+msgid "HideMyAss"
 msgstr "HideMyAss"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Sends traffic to LinkedIn. Also, it stores detailed logs and may turn them "
 "over to the UK government if requested."
@@ -406,14 +432,14 @@
 "Invia traffico a LinkedIn. Inoltre conserva log dettagliati che possono "
 "essere forniti al governo britannico se richiesto."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-VPN-]{+<em>VPN+} Services [-HotspotShield-] {+HotspotShield</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "VPN Services HotspotShield"
-msgid "<em>VPN Services HotspotShield</em>"
+msgid "VPN Services HotspotShield"
 msgstr "VPN Services HotspotShield"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into the HTML pages returned to the users. The "
 "stated purpose of the JS injection is to display ads. Uses roughly 5 "
@@ -425,14 +451,14 @@
 "di tracciamento. Instrada il traffico dell'utente su valueclick.com (sito "
 "pubblicitario)."
 
-#. type: Content of: <ul><li><ul><li>
-# | [-WiFi-]{+<em>WiFi+} Protector [-VPN-] {+VPN</em>+}
+#. type: Content of: <ul><li><dl><dt>
+# || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid "WiFi Protector VPN"
-msgid "<em>WiFi Protector VPN</em>"
+msgid "WiFi Protector VPN"
 msgstr "WiFi Protector VPN"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into HTML pages, and also uses roughly 5 tracking "
 "libraries. Developers of this app have confirmed that the non-premium "

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-mobiles.ja-diff.html        28 Jul 2017 20:29:13 -0000      1.19
+++ malware-mobiles.ja-diff.html        30 Jul 2017 08:01:32 -0000      1.20
@@ -14,13 +14,17 @@
 &lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.83</em></ins></span> --&gt;
 &lt;title&gt;Malware in Mobile Devices
 - GNU Project - Free Software Foundation&lt;/title&gt;
- &lt;!--#include virtual="/proprietary/po/malware-mobiles.translist" --&gt;
-<span class="removed"><del><strong>&lt;style type="text/css" 
media="print,screen"&gt;
+ <span class="removed"><del><strong>&lt;!--#include 
virtual="/proprietary/po/malware-mobiles.translist" --&gt;</strong></del></span>
+&lt;style type="text/css" <span 
class="removed"><del><strong>media="print,screen"&gt;
 &lt;!--
-#content div.toc li { list-style: none; margin-bottom: 1em; }
-#content div.toc { margin-top: 1em; }
---&gt;
-&lt;/style&gt;</strong></del></span>
+#content div.toc</strong></del></span> <span 
class="inserted"><ins><em>media="print,screen"&gt;&lt;!--</em></ins></span>
+li <span class="inserted"><ins><em>dl</em></ins></span> { <span 
class="removed"><del><strong>list-style: none; margin-bottom: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin-top: 
.3em;</em></ins></span> }
+<span class="removed"><del><strong>#content div.toc</strong></del></span>
+<span class="inserted"><ins><em>li dl dt</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>margin: .3em 0 0 0; font-weight: normal; font-style: 
italic;</em></ins></span> }
+<span class="inserted"><ins><em>li dl dd { margin: 0 3%; }
+--&gt;&lt;/style&gt;
+&lt;!--#include 
virtual="/proprietary/po/malware-mobiles.translist"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;/style&gt;</strong></del></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Malware in Mobile Devices&lt;/h2&gt;
 
@@ -104,7 +108,7 @@
   &lt;li&gt;
   &lt;p&gt;In Android, &lt;a
   
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-  Google has a back door to remotely delete apps.&lt;/a&gt;  (It is in a 
program
+  Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;  (It</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt; (it</em></ins></span> is in a program
   called GTalkService).
   &lt;/p&gt;
 
@@ -145,7 +149,7 @@
 &lt;p&gt;Samsung
 phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
 a security hole that allows an SMS message to install
-ransomeware&lt;/a&gt;.&lt;/p&gt;
+ransomware&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -169,9 +173,11 @@
 
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 &lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;
-  <span class="inserted"><ins><em>&lt;p&gt;Facebook's app listens all the 
time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+  &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
   on what people are listening to or watching&lt;/a&gt;. In addition, it may
   be analyzing people's conversations to serve them with targeted
   advertisements.&lt;/p&gt;
@@ -192,39 +198,39 @@
     the research paper that tracks and infringes the privacy of
     users:&lt;/p&gt;
 
-  &lt;ul&gt;
-    &lt;li&gt;&lt;em&gt;SurfEasy&lt;/em&gt;&lt;br /&gt;
-      Includes tracking libraries such as NativeX and Appflood,
-      meant to track users and show them targeted ads.&lt;/li&gt;
+  &lt;dl&gt;
+    &lt;dt&gt;SurfEasy&lt;/dt&gt;
+      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.&lt;/dd&gt;
 
-    &lt;li&gt;&lt;em&gt;sFly Network Booster&lt;/em&gt;&lt;br /&gt;
-      Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
       permissions upon installation, meaning it has full access to
-      users' text messages.&lt;/li&gt;
+      users' text messages.&lt;/dd&gt;
 
-    &lt;li&gt;&lt;em&gt;DroidVPN and TigerVPN&lt;/em&gt;&lt;br /&gt;
-      Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to read logs
+    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
       for other apps and also core system logs. TigerVPN developers
-      have confirmed this.&lt;/li&gt;
+      have confirmed this.&lt;/dd&gt;
 
-    &lt;li&gt;&lt;em&gt;HideMyAss&lt;/em&gt;&lt;br /&gt;
-      Sends traffic to LinkedIn. Also, it stores detailed logs
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
       and may turn them over to the UK government if
-      requested.&lt;/li&gt;
+      requested.&lt;/dd&gt;
 
-    &lt;li&gt;&lt;em&gt;VPN Services HotspotShield&lt;/em&gt;&lt;br /&gt;
-      Injects JavaScript code into the HTML pages returned to the
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
       users. The stated purpose of the JS injection is to display
       ads. Uses roughly 5 tracking libraries. Also, it redirects the
       user's traffic through valueclick.com (an advertising
-      website).&lt;/li&gt;
+      website).&lt;/dd&gt;
 
-    &lt;li&gt;&lt;em&gt;WiFi Protector VPN&lt;/em&gt;&lt;br /&gt;
-      Injects JavaScript code into HTML pages, and also uses
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
       roughly 5 tracking libraries. Developers of this app have
       confirmed that the non-premium version of the app does
-      JavaScript injection for tracking and display ads.&lt;/li&gt;
-  &lt;/ul&gt;
+      JavaScript injection for tracking and display ads.&lt;/dd&gt;
+  &lt;/dl&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -304,9 +310,9 @@
 &lt;/li&gt;
 &lt;li&gt;&lt;p&gt;The Meitu photo-editing
 app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+user data to a Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
 
-&lt;li&gt;</em></ins></span>
+&lt;li&gt;
 &lt;p&gt;A half-blind security critique of a tracking app: it found that &lt;a
 
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
 blatant flaws allowed anyone to snoop on a user's personal data&lt;/a&gt;.
@@ -496,7 +502,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/07/28 20:29:13 $
+$Date: 2017/07/30 08:01:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-mobiles.ja.po       28 Jul 2017 20:29:13 -0000      1.59
+++ malware-mobiles.ja.po       30 Jul 2017 08:01:32 -0000      1.60
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-07-28 20:25+0000\n"
+"POT-Creation-Date: 2017-07-29 21:25+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -181,10 +181,16 @@
 "クドア</a>はシステム
上のどんなファイルにもアクセスを提供します。"
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps.</a> (It is in a program called "
+#| "GTalkService)."
 msgid ""
 "In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
 "google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps.</a> (It is in a program called GTalkService)."
+"to remotely delete apps</a> (it is in a program called GTalkService)."
 msgstr ""
 "アンドロイドで<a href=\"http://www.computerworld.com/article/2506557/";
 
"security0/google-throws--kill-switch--on-android-phones.html\">グーグルはé
 éš”"
@@ -246,8 +252,7 @@
 msgid ""
 "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-";
 "exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
-"\">have a security hole that allows an SMS message to install ransomeware</"
-"a>."
+"\">have a security hole that allows an SMS message to install ransomware</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -290,6 +295,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+"html\">are sold with spyware sending lots of data to China</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app listens all the time, <a href=\"http://www.independent.co.uk/";
 "life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-"
 "on-what-they-re-saying-claims-professor-a7057526.html\">to snoop on what "
@@ -313,51 +326,51 @@
 "paper that tracks and infringes the privacy of users:"
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>SurfEasy</em>"
+#. type: Content of: <ul><li><dl><dt>
+msgid "SurfEasy"
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Includes tracking libraries such as NativeX and Appflood, meant to track "
 "users and show them targeted ads."
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>sFly Network Booster</em>"
+#. type: Content of: <ul><li><dl><dt>
+msgid "sFly Network Booster"
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Requests the <code>READ_SMS</code> and <code>SEND_SMS</code> permissions "
 "upon installation, meaning it has full access to users' text messages."
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>DroidVPN and TigerVPN</em>"
+#. type: Content of: <ul><li><dl><dt>
+msgid "DroidVPN and TigerVPN"
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Requests the <code>READ_LOGS</code> permission to read logs for other apps "
 "and also core system logs. TigerVPN developers have confirmed this."
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>HideMyAss</em>"
+#. type: Content of: <ul><li><dl><dt>
+msgid "HideMyAss"
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Sends traffic to LinkedIn. Also, it stores detailed logs and may turn them "
 "over to the UK government if requested."
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>VPN Services HotspotShield</em>"
+#. type: Content of: <ul><li><dl><dt>
+msgid "VPN Services HotspotShield"
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into the HTML pages returned to the users. The "
 "stated purpose of the JS injection is to display ads. Uses roughly 5 "
@@ -365,11 +378,11 @@
 "com (an advertising website)."
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>WiFi Protector VPN</em>"
+#. type: Content of: <ul><li><dl><dt>
+msgid "WiFi Protector VPN"
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into HTML pages, and also uses roughly 5 tracking "
 "libraries. Developers of this app have confirmed that the non-premium "

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- malware-mobiles.ru.po       29 Jul 2017 08:01:04 -0000      1.89
+++ malware-mobiles.ru.po       30 Jul 2017 08:01:32 -0000      1.90
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-07-28 20:25+0000\n"
+"POT-Creation-Date: 2017-07-29 21:25+0000\n"
 "PO-Revision-Date: 2017-07-29 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-07-29 21:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -174,10 +175,20 @@
 "Samsung</a> предоставляет доступ к любому 
файлу в системе."
 
 #. type: Content of: <ul><li><p>
+# | In Android, <a
+# | 
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
+# | Google has a back door to remotely delete [-apps.</a> (It-] {+apps</a>
+# | (it+} is in a program called GTalkService).
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps.</a> (It is in a program called "
+#| "GTalkService)."
 msgid ""
 "In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
 "google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps.</a> (It is in a program called GTalkService)."
+"to remotely delete apps</a> (it is in a program called GTalkService)."
 msgstr ""
 "В Android <a href=\"http://www.computerworld.com/article/2506557/security0/";
 "google-throws--kill-switch--on-android-phones.html\"> у Google есть 
черный "
@@ -244,11 +255,19 @@
 "работает."
 
 #. type: Content of: <ul><li><p>
+# | Samsung phones <a
+# | 
href=\"https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/\";>have
+# | a security hole that allows an SMS message to install ransom[-e-]ware</a>.
+#, fuzzy
+#| msgid ""
+#| "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/";
+#| "sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-"
+#| "attacks/\">have a security hole that allows an SMS message to install "
+#| "ransomeware</a>."
 msgid ""
 "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-";
 "exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
-"\">have a security hole that allows an SMS message to install ransomeware</"
-"a>."
+"\">have a security hole that allows an SMS message to install ransomware</a>."
 msgstr ""
 "В телефонах Samsung есть <a 
href=\"https://www.bleepingcomputer.com/news/";
 "security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-"
@@ -296,6 +315,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+"html\">are sold with spyware sending lots of data to China</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app listens all the time, <a href=\"http://www.independent.co.uk/";
 "life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-"
 "on-what-they-re-saying-claims-professor-a7057526.html\">to snoop on what "
@@ -333,11 +360,14 @@
 "Далее следует неисчерпывающий список 
несвободных приложений для VPN, которые "
 "следят за пользователями и вторгаются в их
 личную жизнь:"
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>SurfEasy</em>"
+#. type: Content of: <ul><li><dl><dt>
+# | [-<em>SurfEasy</em>-]{+SurfEasy+}
+#, fuzzy
+#| msgid "<em>SurfEasy</em>"
+msgid "SurfEasy"
 msgstr "SurfEasy"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Includes tracking libraries such as NativeX and Appflood, meant to track "
 "users and show them targeted ads."
@@ -345,11 +375,14 @@
 "Использует библиотеки слежки, такие как 
NativeX и Appflood, предназначенные "
 "для отслеживания пользователей и показа 
им направленной рекламы."
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>sFly Network Booster</em>"
+#. type: Content of: <ul><li><dl><dt>
+# | [-<em>sFly-]{+sFly+} Network [-Booster</em>-] {+Booster+}
+#, fuzzy
+#| msgid "<em>sFly Network Booster</em>"
+msgid "sFly Network Booster"
 msgstr "sFly Network Booster"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Requests the <code>READ_SMS</code> and <code>SEND_SMS</code> permissions "
 "upon installation, meaning it has full access to users' text messages."
@@ -357,11 +390,14 @@
 "Запрашивает при установке разрешения на 
чтение и отправку SMS, что означает "
 "полный доступ к текстовым сообщениям 
пользователей."
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>DroidVPN and TigerVPN</em>"
+#. type: Content of: <ul><li><dl><dt>
+# | [-<em>DroidVPN-]{+DroidVPN+} and [-TigerVPN</em>-] {+TigerVPN+}
+#, fuzzy
+#| msgid "<em>DroidVPN and TigerVPN</em>"
+msgid "DroidVPN and TigerVPN"
 msgstr "DroidVPN and TigerVPN"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Requests the <code>READ_LOGS</code> permission to read logs for other apps "
 "and also core system logs. TigerVPN developers have confirmed this."
@@ -369,11 +405,14 @@
 "Запрашивают разрешение на чтение 
журналов других приложений, а также "
 "системных журналов. Разработчики TigerVPN это 
подтвердили."
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>HideMyAss</em>"
+#. type: Content of: <ul><li><dl><dt>
+# | [-<em>HideMyAss</em>-]{+HideMyAss+}
+#, fuzzy
+#| msgid "<em>HideMyAss</em>"
+msgid "HideMyAss"
 msgstr "HideMyAss"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Sends traffic to LinkedIn. Also, it stores detailed logs and may turn them "
 "over to the UK government if requested."
@@ -381,11 +420,14 @@
 "Посылает данные в LinkedIn. Кроме того, сох
раняет подробный журнал и может "
 "по требованию передавать его 
государственным органам Великобритании."
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>VPN Services HotspotShield</em>"
+#. type: Content of: <ul><li><dl><dt>
+# | [-<em>VPN-]{+VPN+} Services [-HotspotShield</em>-] {+HotspotShield+}
+#, fuzzy
+#| msgid "<em>VPN Services HotspotShield</em>"
+msgid "VPN Services HotspotShield"
 msgstr "VPN Services HotspotShield"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into the HTML pages returned to the users. The "
 "stated purpose of the JS injection is to display ads. Uses roughly 5 "
@@ -397,11 +439,14 @@
 "рекламы. Использует около 5 библиотек 
слежки. Кроме того, пропускает поток "
 "данных пользователя через valueclick.com (сайт 
рекламы)."
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>WiFi Protector VPN</em>"
+#. type: Content of: <ul><li><dl><dt>
+# | [-<em>WiFi-]{+WiFi+} Protector [-VPN</em>-] {+VPN+}
+#, fuzzy
+#| msgid "<em>WiFi Protector VPN</em>"
+msgid "WiFi Protector VPN"
 msgstr "WiFi Protector VPN"
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into HTML pages, and also uses roughly 5 tracking "
 "libraries. Developers of this app have confirmed that the non-premium "

Index: malware-webpages.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.pot,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- malware-webpages.pot        28 Jul 2017 12:59:13 -0000      1.1
+++ malware-webpages.pot        30 Jul 2017 08:01:32 -0000      1.2
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-webpages.html\n"
-"POT-Creation-Date: 2017-07-28 12:26+0000\n"
+"POT-Creation-Date: 2017-07-30 07:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -52,16 +52,17 @@
 #. type: Content of: <p>
 msgid ""
 "This page lists web sites containing proprietary JavaScript programs that "
-"spy on users or mislead them. Of course, many sites collect information that "
-"the user sends, via forms or otherwise, but here we're not talking about "
-"that."
+"spy on users or mislead them. They make use of what we call the <a "
+"href=\"/philosophy/javascript-trap.html\">JavaScript Trap</a>. Of course, "
+"many sites collect information that the user sends, via forms or otherwise, "
+"but here we're not talking about that."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
 "Many web sites <a "
 
"href=\"http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081\";>
 "
-"snoop on information that users have typed into a form but not sent </a>."
+"snoop on information that users have typed into a form but not sent</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -81,11 +82,11 @@
 "research paper that tracks users and infringes their privacy:"
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>VPN Services HotspotShield</em>"
+#. type: Content of: <ul><li><dl><dt>
+msgid "VPN Services HotspotShield"
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into the HTML pages returned to the users. The "
 "stated purpose of the JS injection is to display ads. Uses roughly five "
@@ -93,11 +94,11 @@
 "valueclick.com (an advertising website)."
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
-msgid "<em>WiFi Protector VPN</em>"
+#. type: Content of: <ul><li><dl><dt>
+msgid "WiFi Protector VPN"
 msgstr ""
 
-#. type: Content of: <ul><li><ul><li>
+#. type: Content of: <ul><li><dl><dd>
 msgid ""
 "Injects JavaScript code into HTML pages, and also uses roughly five tracking "
 "libraries. Developers of this app have confirmed that the non-premium "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]