[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-mobiles.de.po malwar...
From: |
GNUN |
Subject: |
www/proprietary/po malware-mobiles.de.po malwar... |
Date: |
Mon, 11 Sep 2017 22:59:55 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/09/11 22:59:54
Modified files:
proprietary/po : malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po
proprietary-insecurity.de.po
proprietary-insecurity.fr.po
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.142&r2=1.143
Patches:
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-mobiles.de.po 5 Sep 2017 05:31:23 -0000 1.63
+++ malware-mobiles.de.po 12 Sep 2017 02:59:54 -0000 1.64
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
"PO-Revision-Date: 2017-07-16 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -273,6 +273,14 @@
"Annahme zu widerlegen, dass renommierte proprietäre Software keine "
"schwerwiegenden Fehler hat."
+#. type: Content of: <ul><li><p>
+msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
#
https://www.golem.de/news/broadcom-sicherheitsluecke-vom-wlan-chip-das-smartphone-uebernehmen-1704-127287.html
#. type: Content of: <ul><li><p>
msgid ""
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- malware-mobiles.es.po 5 Sep 2017 05:31:23 -0000 1.60
+++ malware-mobiles.es.po 12 Sep 2017 02:59:54 -0000 1.61
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
"PO-Revision-Date: 2017-08-06 12:19+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -240,6 +240,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-"
"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- malware-mobiles.fr.po 5 Sep 2017 09:35:22 -0000 1.71
+++ malware-mobiles.fr.po 12 Sep 2017 02:59:54 -0000 1.72
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
"PO-Revision-Date: 2017-09-05 11:34+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-09-12 02:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -238,6 +239,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-"
"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-mobiles.it.po 5 Sep 2017 05:31:23 -0000 1.65
+++ malware-mobiles.it.po 12 Sep 2017 02:59:54 -0000 1.66
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
"PO-Revision-Date: 2017-07-06 22:25+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -258,6 +258,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-"
"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- malware-mobiles.ja-diff.html 11 Sep 2017 08:07:52 -0000 1.22
+++ malware-mobiles.ja-diff.html 12 Sep 2017 02:59:54 -0000 1.23
@@ -20,9 +20,9 @@
#content div.toc</strong></del></span> <span
class="inserted"><ins><em>media="print,screen"><!--</em></ins></span>
li <span class="inserted"><ins><em>dl</em></ins></span> { <span
class="removed"><del><strong>list-style: none; margin-bottom:
1em;</strong></del></span> <span class="inserted"><ins><em>margin-top:
.3em;</em></ins></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>li dl dt</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>margin: .3em 0 0 0; font-weight: normal; font-style:
italic;</em></ins></span> }
-<span class="inserted"><ins><em>li dl dd { margin: 0 3%; }
---></style>
+<span class="inserted"><ins><em>li dl dt</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>margin: .3em 0 0 0; font-weight: normal; font-style:
italic; }
+li dl dd { margin: 0 3%;</em></ins></span> }
+<span class="inserted"><ins><em>--></style>
<!--#include
virtual="/proprietary/po/malware-mobiles.translist"</em></ins></span> -->
<span class="removed"><del><strong></style></strong></del></span>
<!--#include virtual="/server/banner.html" -->
@@ -140,7 +140,13 @@
<ul>
<li>
- <p>Many <span class="inserted"><ins><em>Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
+ <span class="inserted"><ins><em><p>Siri, Alexa, and all the other
voice-control systems can be
+ <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs that play commands in ultrasound that humans can't hear</a>.
+ </p>
+</li>
+
+<li>
+ <p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because of a bug in
Broadcom's non-free firmware.</p>
</li>
@@ -152,8 +158,8 @@
ransomware</a>.</p>
</li>
-<li>
-<p>Many</em></ins></span> proprietary payment apps <a
+<li></em></ins></span>
+<p>Many proprietary payment apps <a
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
transmit personal data in an insecure way</a>.
However, the worse aspect of these apps is that
@@ -510,7 +516,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/09/11 08:07:52 $
+$Date: 2017/09/12 02:59:54 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- malware-mobiles.ja.po 5 Sep 2017 05:31:23 -0000 1.61
+++ malware-mobiles.ja.po 12 Sep 2017 02:59:54 -0000 1.62
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -242,6 +242,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-"
"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- malware-mobiles.pot 5 Sep 2017 05:31:23 -0000 1.40
+++ malware-mobiles.pot 12 Sep 2017 02:59:54 -0000 1.41
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -171,6 +171,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a "
+"href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\">hijacked
"
+"by programs that play commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android devices <a "
"href=\"https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\">
"
"can be hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's "
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- malware-mobiles.ru.po 5 Sep 2017 07:02:39 -0000 1.95
+++ malware-mobiles.ru.po 12 Sep 2017 02:59:54 -0000 1.96
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-09-05 05:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
"PO-Revision-Date: 2017-09-05 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-09-12 02:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -232,6 +233,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-"
"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary-insecurity.de.po 20 Jul 2017 12:59:46 -0000 1.85
+++ proprietary-insecurity.de.po 12 Sep 2017 02:59:54 -0000 1.86
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-07-02 09:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
"PO-Revision-Date: 2017-07-16 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-09-12 02:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -94,6 +95,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
"microphone-cameras.html\"> Crackers found a way to break security on a "
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary-insecurity.fr.po 5 Sep 2017 09:35:22 -0000 1.108
+++ proprietary-insecurity.fr.po 12 Sep 2017 02:59:54 -0000 1.109
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-07-02 09:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
"PO-Revision-Date: 2017-09-05 11:34+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-09-12 02:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -97,6 +98,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
"microphone-cameras.html\"> Crackers found a way to break security on a "
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary-insecurity.it.po 6 Jul 2017 20:59:55 -0000 1.113
+++ proprietary-insecurity.it.po 12 Sep 2017 02:59:54 -0000 1.114
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-07-02 09:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
"PO-Revision-Date: 2017-07-06 22:45+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-09-12 02:56+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -94,6 +95,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
"microphone-cameras.html\"> Crackers found a way to break security on a "
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary-insecurity.ja-diff.html 11 Sep 2017 08:07:53 -0000 1.15
+++ proprietary-insecurity.ja-diff.html 12 Sep 2017 02:59:54 -0000 1.16
@@ -49,7 +49,13 @@
users helpless is what's culpable about proprietary
software.</p></em></ins></span>
<ul>
-<span class="inserted"><ins><em><li id="break-security-smarttv">
+<li>
+ <span class="inserted"><ins><em><p>Siri, Alexa, and all the other
voice-control systems can be
+ <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs that play commands in ultrasound that humans can't hear</a>.
+ </p>
+</li>
+
+<li id="break-security-smarttv">
<p><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
Crackers found a way to break security on a “smart”
TV</a> and use its camera
@@ -172,9 +178,9 @@
phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
a security hole that allows an SMS message to install
ransomeware</a>.</p>
-</li></em></ins></span>
+</li>
-<li>
+<li></em></ins></span>
<p>4G LTE phone networks are drastically insecure. They can be
<a
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
taken
@@ -534,7 +540,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/09/11 08:07:53 $
+$Date: 2017/09/12 02:59:54 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-insecurity.ja.po 2 Jul 2017 09:31:06 -0000 1.86
+++ proprietary-insecurity.ja.po 12 Sep 2017 02:59:54 -0000 1.87
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-07-02 09:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -94,6 +94,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
"microphone-cameras.html\"> Crackers found a way to break security on a "
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary-insecurity.pot 2 Jul 2017 09:31:06 -0000 1.56
+++ proprietary-insecurity.pot 12 Sep 2017 02:59:54 -0000 1.57
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-07-02 09:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -68,6 +68,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a "
+"href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\">hijacked
"
+"by programs that play commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"<a "
"href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html\">
"
"Crackers found a way to break security on a “smart” TV</a> and "
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary-insecurity.ru.po 2 Jul 2017 10:38:58 -0000 1.142
+++ proprietary-insecurity.ru.po 12 Sep 2017 02:59:54 -0000 1.143
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-07-02 09:26+0000\n"
+"POT-Creation-Date: 2017-09-12 02:56+0000\n"
"PO-Revision-Date: 2017-07-02 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-09-12 02:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -95,6 +96,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
"microphone-cameras.html\"> Crackers found a way to break security on a "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary/po malware-mobiles.de.po malwar...,
GNUN <=