www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-mobiles.de.po malwar...


From: GNUN
Subject: www/proprietary/po malware-mobiles.de.po malwar...
Date: Mon, 11 Sep 2017 22:59:55 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/09/11 22:59:54

Modified files:
        proprietary/po : malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.142&r2=1.143

Patches:
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-mobiles.de.po       5 Sep 2017 05:31:23 -0000       1.63
+++ malware-mobiles.de.po       12 Sep 2017 02:59:54 -0000      1.64
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
 "PO-Revision-Date: 2017-07-16 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -273,6 +273,14 @@
 "Annahme zu widerlegen, dass renommierte proprietäre Software keine "
 "schwerwiegenden Fehler hat."
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
 # 
https://www.golem.de/news/broadcom-sicherheitsluecke-vom-wlan-chip-das-smartphone-uebernehmen-1704-127287.html
 #. type: Content of: <ul><li><p>
 msgid ""

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- malware-mobiles.es.po       5 Sep 2017 05:31:23 -0000       1.60
+++ malware-mobiles.es.po       12 Sep 2017 02:59:54 -0000      1.61
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
 "PO-Revision-Date: 2017-08-06 12:19+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -240,6 +240,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
 "range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
 "hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- malware-mobiles.fr.po       5 Sep 2017 09:35:22 -0000       1.71
+++ malware-mobiles.fr.po       12 Sep 2017 02:59:54 -0000      1.72
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
 "PO-Revision-Date: 2017-09-05 11:34+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-09-12 02:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -238,6 +239,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
 "range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
 "hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-mobiles.it.po       5 Sep 2017 05:31:23 -0000       1.65
+++ malware-mobiles.it.po       12 Sep 2017 02:59:54 -0000      1.66
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
 "PO-Revision-Date: 2017-07-06 22:25+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -258,6 +258,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
 "range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
 "hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- malware-mobiles.ja-diff.html        11 Sep 2017 08:07:52 -0000      1.22
+++ malware-mobiles.ja-diff.html        12 Sep 2017 02:59:54 -0000      1.23
@@ -20,9 +20,9 @@
 #content div.toc</strong></del></span> <span 
class="inserted"><ins><em>media="print,screen"&gt;&lt;!--</em></ins></span>
 li <span class="inserted"><ins><em>dl</em></ins></span> { <span 
class="removed"><del><strong>list-style: none; margin-bottom: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin-top: 
.3em;</em></ins></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>li dl dt</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>margin: .3em 0 0 0; font-weight: normal; font-style: 
italic;</em></ins></span> }
-<span class="inserted"><ins><em>li dl dd { margin: 0 3%; }
---&gt;&lt;/style&gt;
+<span class="inserted"><ins><em>li dl dt</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>margin: .3em 0 0 0; font-weight: normal; font-style: 
italic; }
+li dl dd { margin: 0 3%;</em></ins></span> }
+<span class="inserted"><ins><em>--&gt;&lt;/style&gt;
 &lt;!--#include 
virtual="/proprietary/po/malware-mobiles.translist"</em></ins></span> --&gt;
 <span class="removed"><del><strong>&lt;/style&gt;</strong></del></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
@@ -140,7 +140,13 @@
 &lt;ul&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Many <span class="inserted"><ins><em>Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
+  <span class="inserted"><ins><em>&lt;p&gt;Siri, Alexa, and all the other 
voice-control systems can be
+  &lt;a 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs that play commands in ultrasound that humans can't hear&lt;/a&gt;.
+  &lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Many Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
        can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
        Broadcom's non-free firmware.&lt;/p&gt;
 &lt;/li&gt;
@@ -152,8 +158,8 @@
 ransomware&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;Many</em></ins></span> proprietary payment apps &lt;a
+&lt;li&gt;</em></ins></span>
+&lt;p&gt;Many proprietary payment apps &lt;a
 
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
 transmit personal data in an insecure way&lt;/a&gt;.
 However, the worse aspect of these apps is that
@@ -510,7 +516,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/09/11 08:07:52 $
+$Date: 2017/09/12 02:59:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- malware-mobiles.ja.po       5 Sep 2017 05:31:23 -0000       1.61
+++ malware-mobiles.ja.po       12 Sep 2017 02:59:54 -0000      1.62
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -242,6 +242,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
 "range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
 "hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- malware-mobiles.pot 5 Sep 2017 05:31:23 -0000       1.40
+++ malware-mobiles.pot 12 Sep 2017 02:59:54 -0000      1.41
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -171,6 +171,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a "
+"href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\";>hijacked
 "
+"by programs that play commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android devices <a "
 
"href=\"https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\";>
 "
 "can be hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's "

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- malware-mobiles.ru.po       5 Sep 2017 07:02:39 -0000       1.95
+++ malware-mobiles.ru.po       12 Sep 2017 02:59:54 -0000      1.96
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
 "PO-Revision-Date: 2017-09-05 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-09-12 02:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -232,6 +233,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
 "range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
 "hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"

Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary-insecurity.de.po        20 Jul 2017 12:59:46 -0000      1.85
+++ proprietary-insecurity.de.po        12 Sep 2017 02:59:54 -0000      1.86
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-07-02 09:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
 "PO-Revision-Date: 2017-07-16 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-09-12 02:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -94,6 +95,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-";
 "penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
 "microphone-cameras.html\"> Crackers found a way to break security on a "

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary-insecurity.fr.po        5 Sep 2017 09:35:22 -0000       1.108
+++ proprietary-insecurity.fr.po        12 Sep 2017 02:59:54 -0000      1.109
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-07-02 09:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
 "PO-Revision-Date: 2017-09-05 11:34+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-09-12 02:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -97,6 +98,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-";
 "penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
 "microphone-cameras.html\"> Crackers found a way to break security on a "

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary-insecurity.it.po        6 Jul 2017 20:59:55 -0000       1.113
+++ proprietary-insecurity.it.po        12 Sep 2017 02:59:54 -0000      1.114
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-07-02 09:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
 "PO-Revision-Date: 2017-07-06 22:45+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-09-12 02:56+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -94,6 +95,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-";
 "penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
 "microphone-cameras.html\"> Crackers found a way to break security on a "

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary-insecurity.ja-diff.html 11 Sep 2017 08:07:53 -0000      1.15
+++ proprietary-insecurity.ja-diff.html 12 Sep 2017 02:59:54 -0000      1.16
@@ -49,7 +49,13 @@
 users helpless is what's culpable about proprietary 
software.&lt;/p&gt;</em></ins></span>
 
 &lt;ul&gt;
-<span class="inserted"><ins><em>&lt;li id="break-security-smarttv"&gt;
+&lt;li&gt;
+  <span class="inserted"><ins><em>&lt;p&gt;Siri, Alexa, and all the other 
voice-control systems can be
+  &lt;a 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs that play commands in ultrasound that humans can't hear&lt;/a&gt;.
+  &lt;/p&gt;
+&lt;/li&gt;
+       
+&lt;li id="break-security-smarttv"&gt;
   &lt;p&gt;&lt;a
        
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
       Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera
@@ -172,9 +178,9 @@
 phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
 a security hole that allows an SMS message to install
 ransomeware&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;</em></ins></span>
+&lt;/li&gt;
 
-&lt;li&gt;
+&lt;li&gt;</em></ins></span>
 &lt;p&gt;4G LTE phone networks are drastically insecure. They can be
 &lt;a 
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;
 taken
@@ -534,7 +540,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/09/11 08:07:53 $
+$Date: 2017/09/12 02:59:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-insecurity.ja.po        2 Jul 2017 09:31:06 -0000       1.86
+++ proprietary-insecurity.ja.po        12 Sep 2017 02:59:54 -0000      1.87
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-07-02 09:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -94,6 +94,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-";
 "penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
 "microphone-cameras.html\"> Crackers found a way to break security on a "

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary-insecurity.pot  2 Jul 2017 09:31:06 -0000       1.56
+++ proprietary-insecurity.pot  12 Sep 2017 02:59:54 -0000      1.57
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-07-02 09:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -68,6 +68,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a "
+"href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\";>hijacked
 "
+"by programs that play commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a "
 
"href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html\";>
 "
 "Crackers found a way to break security on a &ldquo;smart&rdquo; TV</a> and "

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary-insecurity.ru.po        2 Jul 2017 10:38:58 -0000       1.142
+++ proprietary-insecurity.ru.po        12 Sep 2017 02:59:54 -0000      1.143
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-07-02 09:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
 "PO-Revision-Date: 2017-07-02 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-09-12 02:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -95,6 +96,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-";
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-";
 "penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
 "microphone-cameras.html\"> Crackers found a way to break security on a "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]