www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www gnu/po/why-programs-should-be-shared.transl...


From: GNUN
Subject: www gnu/po/why-programs-should-be-shared.transl...
Date: Sat, 11 Nov 2017 01:31:41 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/11/11 01:31:41

Modified files:
        gnu/po         : why-programs-should-be-shared.translist 
                         yes-give-it-away.translist 
        graphics/po    : gnu-linux-logos.translist 
        philosophy     : surveillance-vs-democracy.ru.html 
        proprietary    : proprietary-insecurity.de.html 
                         proprietary-insecurity.it.html 
                         proprietary-jails.de.html 
                         proprietary-surveillance.de.html 
                         proprietary-tethers.de.html 
        proprietary/po : malware-adobe.translist malware-cars.translist 
                         malware-games.translist 
                         potential-malware.translist 
                         proprietary-insecurity.de-en.html 
                         proprietary-insecurity.de.po 
                         proprietary-jails.de-en.html 
                         proprietary-surveillance.de-en.html 
                         proprietary-surveillance.de.po 
        thankgnus      : 2017supporters.de.html 
        thankgnus/po   : 2017supporters.de-en.html 
Added files:
        proprietary/po : proprietary-insecurity.it-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/gnu/po/why-programs-should-be-shared.translist?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/gnu/po/yes-give-it-away.translist?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/gnu-linux-logos.translist?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ru.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.de.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.it.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.de.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.de.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.de.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.translist?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.translist?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.translist?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.translist?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/2017supporters.de.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2017supporters.de-en.html?cvsroot=www&r1=1.9&r2=1.10

Patches:
Index: gnu/po/why-programs-should-be-shared.translist
===================================================================
RCS file: /web/www/www/gnu/po/why-programs-should-be-shared.translist,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- gnu/po/why-programs-should-be-shared.translist      26 Nov 2016 14:27:58 
-0000      1.6
+++ gnu/po/why-programs-should-be-shared.translist      11 Nov 2017 06:31:39 
-0000      1.7
@@ -3,6 +3,7 @@
 value='<div id="translations">
 <p>
 <span dir="ltr" class="original"><a lang="en" hreflang="en" 
href="/gnu/why-programs-should-be-shared.en.html">English</a>&nbsp;[en]</span> 
&nbsp;
+<span dir="ltr"><a lang="de" hreflang="de" 
href="/gnu/why-programs-should-be-shared.de.html">Deutsch</a>&nbsp;[de]</span> 
&nbsp;
 <span dir="ltr"><a lang="fr" hreflang="fr" 
href="/gnu/why-programs-should-be-shared.fr.html">français</a>&nbsp;[fr]</span>
 &nbsp;
 <span dir="ltr"><a lang="ja" hreflang="ja" 
href="/gnu/why-programs-should-be-shared.ja.html">日本語</a>&nbsp;[ja]</span>
 &nbsp;
 <span dir="ltr"><a lang="nl" hreflang="nl" 
href="/gnu/why-programs-should-be-shared.nl.html">Nederlands</a>&nbsp;[nl]</span>
 &nbsp;
@@ -12,6 +13,7 @@
 </div>' -->
 <link rel="alternate" type="text/html" 
href="/gnu/why-programs-should-be-shared.html" hreflang="x-default" />
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/gnu/why-programs-should-be-shared.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de" 
href="/gnu/why-programs-should-be-shared.de.html" title="Deutsch" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/gnu/why-programs-should-be-shared.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/gnu/why-programs-should-be-shared.ja.html" title="日本語" />
 <link rel="alternate" type="text/html" lang="nl" hreflang="nl" 
href="/gnu/why-programs-should-be-shared.nl.html" title="Nederlands" />

Index: gnu/po/yes-give-it-away.translist
===================================================================
RCS file: /web/www/www/gnu/po/yes-give-it-away.translist,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- gnu/po/yes-give-it-away.translist   26 Nov 2016 14:57:47 -0000      1.6
+++ gnu/po/yes-give-it-away.translist   11 Nov 2017 06:31:39 -0000      1.7
@@ -3,6 +3,7 @@
 value='<div id="translations">
 <p>
 <span dir="ltr" class="original"><a lang="en" hreflang="en" 
href="/gnu/yes-give-it-away.en.html">English</a>&nbsp;[en]</span> &nbsp;
+<span dir="ltr"><a lang="de" hreflang="de" 
href="/gnu/yes-give-it-away.de.html">Deutsch</a>&nbsp;[de]</span> &nbsp;
 <span dir="ltr"><a lang="fr" hreflang="fr" 
href="/gnu/yes-give-it-away.fr.html">français</a>&nbsp;[fr]</span> &nbsp;
 <span dir="ltr"><a lang="ja" hreflang="ja" 
href="/gnu/yes-give-it-away.ja.html">日本語</a>&nbsp;[ja]</span> &nbsp;
 <span dir="ltr"><a lang="nl" hreflang="nl" 
href="/gnu/yes-give-it-away.nl.html">Nederlands</a>&nbsp;[nl]</span> &nbsp;
@@ -12,6 +13,7 @@
 </div>' -->
 <link rel="alternate" type="text/html" href="/gnu/yes-give-it-away.html" 
hreflang="x-default" />
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/gnu/yes-give-it-away.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de" 
href="/gnu/yes-give-it-away.de.html" title="Deutsch" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/gnu/yes-give-it-away.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/gnu/yes-give-it-away.ja.html" title="日本語" />
 <link rel="alternate" type="text/html" lang="nl" hreflang="nl" 
href="/gnu/yes-give-it-away.nl.html" title="Nederlands" />

Index: graphics/po/gnu-linux-logos.translist
===================================================================
RCS file: /web/www/www/graphics/po/gnu-linux-logos.translist,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- graphics/po/gnu-linux-logos.translist       1 Jul 2017 06:00:14 -0000       
1.1
+++ graphics/po/gnu-linux-logos.translist       11 Nov 2017 06:31:40 -0000      
1.2
@@ -3,8 +3,10 @@
 value='<div id="translations">
 <p>
 <span dir="ltr" class="original"><a lang="en" hreflang="en" 
href="/graphics/gnu-linux-logos.en.html">English</a>&nbsp;[en]</span> &nbsp;
+<span dir="ltr"><a lang="de" hreflang="de" 
href="/graphics/gnu-linux-logos.de.html">Deutsch</a>&nbsp;[de]</span> &nbsp;
 </p>
 </div>' -->
 <link rel="alternate" type="text/html" href="/graphics/gnu-linux-logos.html" 
hreflang="x-default" />
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/graphics/gnu-linux-logos.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de" 
href="/graphics/gnu-linux-logos.de.html" title="Deutsch" />
 <!-- end translist file -->

Index: philosophy/surveillance-vs-democracy.ru.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.ru.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- philosophy/surveillance-vs-democracy.ru.html        11 Nov 2017 05:59:03 
-0000      1.29
+++ philosophy/surveillance-vs-democracy.ru.html        11 Nov 2017 06:31:40 
-0000      1.30
@@ -17,7 +17,7 @@
 -->
 </style>
 
-<!-- GNUN: localize URL /graphics/dog.small.jpg -->
+<!-- GNUN: localize URL /graphics/dog.small.ru.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.ru.html" -->
 <h2 class="center">Сколько слежки может выдержать 
демократия?</h2>
@@ -34,7 +34,7 @@
 <div id="intro">
 <div class="pict wide">
 <a href="/graphics/dog.html">
-<img src="/graphics/dog.small.jpg" alt="Карикатура: собака с 
удивлением смотрит на рекламу, выскочившую 
на экране ее
+<img src="/graphics/dog.small.ru.jpg" alt="Карикатура: собака 
с удивлением смотрит на рекламу, 
выскочившую на экране ее
 компьютера" /></a>
 <p>&ldquo;Как они узнали, что я&nbsp;&mdash; 
собака?&rdquo;</p>
 </div>
@@ -620,7 +620,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2017/11/11 05:59:03 $
+$Date: 2017/11/11 06:31:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.de.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/proprietary-insecurity.de.html  25 Oct 2017 12:31:02 -0000      
1.21
+++ proprietary/proprietary-insecurity.de.html  11 Nov 2017 06:31:40 -0000      
1.22
@@ -44,6 +44,17 @@
 
 <ul>
 <li>
+  <p><ins><a
+href="https://www.spiegel.de/auto/aktuell/computerexperten-hacken-auto-software-a-914783.html";>„Der
+Schutz, den die Hersteller eingebaut haben, lasse sich bei Autos praktisch
+aller Massenhersteller binnen Sekunden knacken“</a></ins> und ermöglicht <a
+href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937";
+title="CVE-2017-14937, unter:
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937 The MITRE
+Corporation 2017.">den Airbag<ins>&#160;&#8209;&#160;während der
+Fahrt&#160;&#8209;&#160;</ins>aus der Ferne auszulösen</a>.</p>
+</li>
+<li>
   <p>Eine „kluge“ für Krankenhäuser entworfene intravenöse Pumpe ist 
mit dem
 Internet verbunden. Selbstredend ist deren <a
 
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml";
@@ -717,7 +728,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/10/25 12:31:02 $
+$Date: 2017/11/11 06:31:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.it.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/proprietary-insecurity.it.html  11 Sep 2017 08:07:52 -0000      
1.27
+++ proprietary/proprietary-insecurity.it.html  11 Nov 2017 06:31:40 -0000      
1.28
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-insecurity.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-insecurity.it.po">
+ https://www.gnu.org/proprietary/po/proprietary-insecurity.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-insecurity.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-insecurity.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-09-12" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-insecurity.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-insecurity.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2>Scarsa sicurezza proprietaria</h2>
 
 <a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -571,7 +577,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/09/11 08:07:52 $
+$Date: 2017/11/11 06:31:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-jails.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.de.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/proprietary-jails.de.html       29 Sep 2017 05:59:41 -0000      
1.15
+++ proprietary/proprietary-jails.de.html       11 Nov 2017 06:31:40 -0000      
1.16
@@ -1,19 +1,13 @@
-<!--#set var="PO_FILE"
- value='<a href="/proprietary/po/proprietary-jails.de.po">
- https://www.gnu.org/proprietary/po/proprietary-jails.de.po</a>'
- --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary-jails.html"
- --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-jails.de-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2017-07-31" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-jails.en.html" -->
+<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-jails.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
-<!-- Parent-Version: 1.79 -->
+<!-- Parent-Version: 1.84 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Proprietäre Gefängnisse - GNU-Projekt - Free Software 
Foundation</title>
 
 <!--#include virtual="/proprietary/po/proprietary-jails.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
-<!--#include virtual="/server/outdated.de.html" -->
 <h2>Proprietäre Gefängnisse</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -41,20 +35,49 @@
 
 <ul>
 
+<li>
+<p>Apple <a
+href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html";
+title=", unter:
+https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html,
+The New York Times Company 2017.">löschte etliche VPNs aus seinem App Store
+für China</a>, indem es seine eigene Zensurmacht nutzte, um hierdurch das
+der chinesischen Regierung zu unterstreichen.
+</p>
+</li>
+
+<li>
+<p>Apple <a
+href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";
+title="Iranian Hardliners Want An Isolated Internet — US Politicians and
+Companies Shouldn't Help, unter:
+https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet
+2017.">zensiert Apps auch für die US-Regierung</a>. Besonders werden Apps
+<ins>Iranischer Entwickler</ins> gelöscht.
+</p>
+
+<p>Die Wurzel dieses Unrechts liegt bei Apple. Hätte Apple die iMonster nicht
+entworfen um Anwendungen zensieren zu können, würde Apple nicht die Macht
+besitzen Nutzer davon abzuhalten welche App auch immer zu installieren.</p>
+</li>
+
   <li>
-       <p><b>Windows 10 S</b> sollte <b>Windows 10 J</b> für „das 
Gefängnis“ genannt
-werden: <a
+       <p><b>Windows 10 S</b> sollte besser <b>Windows 10
+G</b>&#160;&#8209;&#160;<em>G</em> für
+<em>Gefängnis</em>&#160;&#8209;&#160;genannt werden: <a
 
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";
 title="What is Windows 10 S and how is it different from regular Windows
-10?, unter: theguardian.com 2017.">Ausschließlich Programme aus dem
-<i>Windows Store</i> können heruntergeladen und ausgeführt werden</a>.</p>
+10?, unter:
+https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison
+2017.">ausschließlich Programme aus dem <i>Windows Store</i> können
+heruntergeladen und ausgeführt werden</a>.</p>
 
        <p>Wenn die Geschichte von iOS als Gefängnis irgendein Hinweis ist, 
wird
-Windows 10 J nicht besser sein.</p>
+„Windows 10 G“ nicht besser sein.</p>
 
        </li>
 
-  <li><p><b>Google Chrome</b> unter Windows, <a
+  <li><p><b>Google Chrome</b> unter Windows <a
 
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/";
 title="Google Chrome Listening In To Your Room Shows The Importance Of
 Privacy Defense In Depth, unter: PrivateInternetAccess.com 2015.">entspricht
@@ -80,22 +103,23 @@
 Apple-Zensur-System: <a
 
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china";
 title="Apple removes New York Times app in China, unter: TheGuardian.com
-2017.">New York Times-Apps aus chinesischen App-Store
-gelöscht</a>&#160;&#8209;&#160;um Chinas Zensur durchzusetzen.</p></li>
+2017.">New York Times-Apps aus chinesischen App-Store gelöscht</a>: um
+Chinas Zensur durchzusetzen.</p></li>
 
   <li><p>
 Apple zensiert Spiele. <a
-href="https://web.archive.org/web/20160602092236///arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game/";
+href="https://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game/";
 title="Apple says game about Palestinian child isn’t a game, Ars Technica,
-unter: web.archive.org 2016.">Einige werden aufgrund deren politischen
-Ansichten im App Store verboten</a>, einige werden offenbar als akzeptabel
-betrachtet.</p>
+unter:
+https://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game/
+2016.">Einige werden aufgrund deren politischen Ansichten im App Store
+verboten</a>, einige werden offenbar als akzeptabel betrachtet.</p>
 </li>
 
 <li><p>
 <a href="//ifixit.org/blog/7401/ifixit-app-pulled/" title="iFixit App Pulled
 from Apple’s Store, unter: ifixit.org 2015.">Ein Programm wurde aus dem App
-Store verbannt</a>, weil Entwickler die Ungeheuerlichkeit begingen, einige
+Store verbannt</a>, weil Entwickler die Ungeheuerlichkeit begingen einige
 iDinger zu disassemblieren.
 </p></li>
 
@@ -110,28 +134,31 @@
 </p></li>
 
 <li><p>
-(2015) Apple <a
-href="//www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"
+Seit 2015 <a
+href="https://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";
 title="Jess Zimmerman, Apple, your anti-choice tendencies are showing in
-your app store, unter: //www.theguardian.com 2015.">blockiert systematisch
-Apps, die das Recht auf Schwangerschaftsabbrüche befürworten oder jegliche
-Suche danach unterstützen würden</a>.</p>
+your app store, unter: //www.theguardian.com 2015.">blockiert Apple
+systematisch Apps die das Recht auf Schwangerschaftsabbrüche befürworten
+oder jegliche Suche danach unterstützen würden</a>.</p>
 
 <p>
 Diese besondere politische Schräge <a
-href="//www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"
+href="https://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions";
 title=" Siri's abortion bias embarrasses Apple as it rues 'unintentional
-omissions', unter: //www.theguardian.com 2011.">beeinflusst auch andere
-Apple-Dienste</a>.
+omissions', unter:
+https://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions
+2011.">beeinflusst auch andere Apple-Dienste</a>.
 </p></li>
 
 <li><p>
 <a
-href="//www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"
+href="https://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones";
 title="Jasper Jackson, Google pulls adblocking app for Samsung phones, The
-Guardian 2016.">Google zensiert Installation von Samsungs Werbeblocker</a>
-mit der Begründung, dass das Blockieren von Werbung eine „Interferenz“ mit
-den werbenden (und Benutzer mittels Werbeanzeigen überwachenden)
+Guardian, unter:
+https://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones
+2016.">Google zensiert Installation von Samsungs Werbeblocker</a> mit der
+Begründung, dass das Blockieren von Werbung eine „Interferenz“ mit den
+werbenden (und Benutzer mittels Werbeanzeigen überwachenden)
 Internetpräsenzen verursacht.</p>
 
 <p>Der Werbeblocker ist proprietäre Software, ebenso wie das Programm (Google
@@ -300,7 +327,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/09/29 05:59:41 $
+$Date: 2017/11/11 06:31:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.de.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/proprietary-surveillance.de.html        25 Oct 2017 12:31:02 
-0000      1.30
+++ proprietary/proprietary-surveillance.de.html        11 Nov 2017 06:31:40 
-0000      1.31
@@ -175,6 +175,15 @@
 </div>
 
 <ul>
+  <li><p>Windows 10 Telemetrie-Dienst sendet Informationen an Microsoft über 
Rechner
+des Nutzers und deren Nutzung des Rechners.</p>
+
+<p>Für Benutzer, die das 4. stabile Build von Windows 10 installierten,
+„Creators Update“, maximierte Windows die Überwachung darüber hinaus <a
+href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>durch
+zwangsweises einstellen des Telemetrie-Verfahrens auf <em>vollständig</em>
+[„<em>Full</em> Creators Update“, A. d. Ü.]</a>.</p></li>
+
   <li><p>Windows-DRM-Dateien <a
 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>können
 genutzt werden, um Personen, die mit Tor surfen, zu identifizieren</a>. Die
@@ -1863,7 +1872,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/10/25 12:31:02 $
+$Date: 2017/11/11 06:31:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tethers.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.de.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/proprietary-tethers.de.html     25 Oct 2017 12:31:02 -0000      
1.4
+++ proprietary/proprietary-tethers.de.html     11 Nov 2017 06:31:40 -0000      
1.5
@@ -85,7 +85,7 @@
 <p>Eine halbblinde Sicherheitsrezension einer Verfolger-App stellte fest: <a
 
href="//www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">eklatante
 Fehler erlaubten jedermann in den persönlichen Benutzerdaten
-herumzuschnüffeln.</a>. Die Rezension versäumt jedoch die Besorgnis zum
+herumzuschnüffeln</a>. Die Rezension versäumt jedoch die Besorgnis zum
 Ausdruck bringen, dass die App die personenbezogenen Daten selbst an einen
 Server sendet, wo der <em>Entwickler</em> sämtliche Daten abgreift. Dieser
 „Dienst“ ist für Dumme!</p>
@@ -184,7 +184,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/10/25 12:31:02 $
+$Date: 2017/11/11 06:31:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-adobe.translist
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.translist,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/malware-adobe.translist      30 Aug 2016 06:30:15 -0000      
1.4
+++ proprietary/po/malware-adobe.translist      11 Nov 2017 06:31:40 -0000      
1.5
@@ -3,6 +3,7 @@
 value='<div id="translations">
 <p>
 <span dir="ltr" class="original"><a lang="en" hreflang="en" 
href="/proprietary/malware-adobe.en.html">English</a>&nbsp;[en]</span> &nbsp;
+<span dir="ltr"><a lang="de" hreflang="de" 
href="/proprietary/malware-adobe.de.html">Deutsch</a>&nbsp;[de]</span> &nbsp;
 <span dir="ltr"><a lang="fr" hreflang="fr" 
href="/proprietary/malware-adobe.fr.html">français</a>&nbsp;[fr]</span> &nbsp;
 <span dir="ltr"><a lang="ja" hreflang="ja" 
href="/proprietary/malware-adobe.ja.html">日本語</a>&nbsp;[ja]</span> &nbsp;
 <span dir="ltr"><a lang="ru" hreflang="ru" 
href="/proprietary/malware-adobe.ru.html">русский</a>&nbsp;[ru]</span> 
&nbsp;
@@ -10,6 +11,7 @@
 </div>' -->
 <link rel="alternate" type="text/html" href="/proprietary/malware-adobe.html" 
hreflang="x-default" />
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/proprietary/malware-adobe.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de" 
href="/proprietary/malware-adobe.de.html" title="Deutsch" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/malware-adobe.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/malware-adobe.ja.html" title="日本語" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/malware-adobe.ru.html" title="русский" />

Index: proprietary/po/malware-cars.translist
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.translist,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/malware-cars.translist       7 Nov 2017 09:33:14 -0000       
1.3
+++ proprietary/po/malware-cars.translist       11 Nov 2017 06:31:40 -0000      
1.4
@@ -3,12 +3,14 @@
 value='<div id="translations">
 <p>
 <span dir="ltr" class="original"><a lang="en" hreflang="en" 
href="/proprietary/malware-cars.en.html">English</a>&nbsp;[en]</span> &nbsp;
+<span dir="ltr"><a lang="de" hreflang="de" 
href="/proprietary/malware-cars.de.html">Deutsch</a>&nbsp;[de]</span> &nbsp;
 <span dir="ltr"><a lang="fr" hreflang="fr" 
href="/proprietary/malware-cars.fr.html">français</a>&nbsp;[fr]</span> &nbsp;
 <span dir="ltr"><a lang="ru" hreflang="ru" 
href="/proprietary/malware-cars.ru.html">русский</a>&nbsp;[ru]</span> 
&nbsp;
 </p>
 </div>' -->
 <link rel="alternate" type="text/html" href="/proprietary/malware-cars.html" 
hreflang="x-default" />
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/proprietary/malware-cars.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de" 
href="/proprietary/malware-cars.de.html" title="Deutsch" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/malware-cars.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/malware-cars.ru.html" title="русский" />
 <!-- end translist file -->

Index: proprietary/po/malware-games.translist
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.translist,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/malware-games.translist      31 Oct 2016 06:30:15 -0000      
1.4
+++ proprietary/po/malware-games.translist      11 Nov 2017 06:31:40 -0000      
1.5
@@ -3,6 +3,7 @@
 value='<div id="translations">
 <p>
 <span dir="ltr" class="original"><a lang="en" hreflang="en" 
href="/proprietary/malware-games.en.html">English</a>&nbsp;[en]</span> &nbsp;
+<span dir="ltr"><a lang="de" hreflang="de" 
href="/proprietary/malware-games.de.html">Deutsch</a>&nbsp;[de]</span> &nbsp;
 <span dir="ltr"><a lang="fr" hreflang="fr" 
href="/proprietary/malware-games.fr.html">français</a>&nbsp;[fr]</span> &nbsp;
 <span dir="ltr"><a lang="ja" hreflang="ja" 
href="/proprietary/malware-games.ja.html">日本語</a>&nbsp;[ja]</span> &nbsp;
 <span dir="ltr"><a lang="ru" hreflang="ru" 
href="/proprietary/malware-games.ru.html">русский</a>&nbsp;[ru]</span> 
&nbsp;
@@ -10,6 +11,7 @@
 </div>' -->
 <link rel="alternate" type="text/html" href="/proprietary/malware-games.html" 
hreflang="x-default" />
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/proprietary/malware-games.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de" 
href="/proprietary/malware-games.de.html" title="Deutsch" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/malware-games.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/malware-games.ja.html" title="日本語" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/malware-games.ru.html" title="русский" />

Index: proprietary/po/potential-malware.translist
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.translist,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/potential-malware.translist  12 Sep 2017 10:05:40 -0000      
1.3
+++ proprietary/po/potential-malware.translist  11 Nov 2017 06:31:40 -0000      
1.4
@@ -3,12 +3,14 @@
 value='<div id="translations">
 <p>
 <span dir="ltr" class="original"><a lang="en" hreflang="en" 
href="/proprietary/potential-malware.en.html">English</a>&nbsp;[en]</span> 
&nbsp;
+<span dir="ltr"><a lang="de" hreflang="de" 
href="/proprietary/potential-malware.de.html">Deutsch</a>&nbsp;[de]</span> 
&nbsp;
 <span dir="ltr"><a lang="fr" hreflang="fr" 
href="/proprietary/potential-malware.fr.html">français</a>&nbsp;[fr]</span> 
&nbsp;
 <span dir="ltr"><a lang="ru" hreflang="ru" 
href="/proprietary/potential-malware.ru.html">русский</a>&nbsp;[ru]</span>
 &nbsp;
 </p>
 </div>' -->
 <link rel="alternate" type="text/html" 
href="/proprietary/potential-malware.html" hreflang="x-default" />
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/proprietary/potential-malware.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de" 
href="/proprietary/potential-malware.de.html" title="Deutsch" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/potential-malware.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/potential-malware.ru.html" title="русский" />
 <!-- end translist file -->

Index: proprietary/po/proprietary-insecurity.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/proprietary-insecurity.de-en.html    25 Oct 2017 12:31:03 
-0000      1.15
+++ proprietary/po/proprietary-insecurity.de-en.html    11 Nov 2017 06:31:40 
-0000      1.16
@@ -36,6 +36,11 @@
 
 <ul>
 <li>
+  <p>Bad security in some cars makes it possible
+    to <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937";>
+      remotely activate the airbags</a>.</p>
+</li>
+<li>
   <p>A &ldquo;smart&rdquo; intravenous pump designed for
     hospitals is connected to the internet. Naturally <a
 
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml";>
@@ -546,7 +551,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/10/25 12:31:03 $
+$Date: 2017/11/11 06:31:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary/po/proprietary-insecurity.de.po 11 Nov 2017 06:06:47 -0000      
1.97
+++ proprietary/po/proprietary-insecurity.de.po 11 Nov 2017 06:31:40 -0000      
1.98
@@ -98,14 +98,14 @@
 "org/cgi-bin/cvename.cgi?name=CVE-2017-14937\"> remotely activate the "
 "airbags</a>."
 msgstr ""
-"<ins><a href=\"https://www.spiegel.de/auto/aktuell/computerexperten-";
-"hacken-auto-software-a-914783.html\">„Der Schutz, den die Hersteller "
-"eingebaut haben, lasse sich bei Autos praktisch aller Massenhersteller "
-"binnen Sekunden knacken“</a></ins> und ermöglicht <a href=\"https://cve.";
-"mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937\" title=\"CVE-2017-14937, "
-"unter: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937 The "
-"MITRE Corporation 2017.\">den Airbag<ins>&#160;&#8209;&#160;während der "
-"Fahrt&#160;&#8209;&#160;</ins>aus der Ferne auszulösen</a>."
+"<ins><a href=\"https://www.spiegel.de/auto/aktuell/computerexperten-hacken-";
+"auto-software-a-914783.html\">„Der Schutz, den die Hersteller eingebaut "
+"haben, lasse sich bei Autos praktisch aller Massenhersteller binnen Sekunden "
+"knacken“</a></ins> und ermöglicht <a href=\"https://cve.mitre.org/cgi-bin/";
+"cvename.cgi?name=CVE-2017-14937\" title=\"CVE-2017-14937, unter: https://cve.";
+"mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937 The MITRE Corporation 2017."
+"\">den Airbag<ins>&#160;&#8209;&#160;während der Fahrt&#160;&#8209;&#160;</"
+"ins>aus der Ferne auszulösen</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: proprietary/po/proprietary-jails.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-jails.de-en.html 8 May 2017 03:04:35 -0000       
1.6
+++ proprietary/po/proprietary-jails.de-en.html 11 Nov 2017 06:31:40 -0000      
1.7
@@ -1,11 +1,11 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.79 -->
+<!-- Parent-Version: 1.84 -->
 <title>Proprietary Jails - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary-jails.translist" -->
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Jails</h2>
 
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
 <p>Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
@@ -28,6 +28,29 @@
 
 <ul>
 
+<li>
+<p>Apple <a
+href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html";>
+deleted several VPNs from its app store for China</a>, 
+thus using its own censorship power to strengthen that of the Chinese 
+government.
+</p>
+</li>
+
+<li>
+<p>Apple is <a
+href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
+censoring apps for the US government too</a>. Specifically, it is deleting
+apps developed by Iranians.
+</p>
+
+<p>The root of these wrongs are in Apple.
+If Apple had not designed the iMonsters to let Apple censor
+applications,
+Apple would not have had the power to stop users from installing
+whatever kind of apps.</p>
+</li>
+
   <li>
        <p>Windows 10 S ought to be called Windows 10 J, for &ldquo;Jail&rdquo;:
        <a 
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>only
 programs from the Windows Store can be
@@ -232,7 +255,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/08 03:04:35 $
+$Date: 2017/11/11 06:31:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/proprietary-surveillance.de-en.html  25 Oct 2017 12:31:03 
-0000      1.25
+++ proprietary/po/proprietary-surveillance.de-en.html  11 Nov 2017 06:31:40 
-0000      1.26
@@ -173,6 +173,15 @@
 </div>
 
 <ul>
+  <li><p>Windows 10 telemetry program sends information to Microsoft about the
+      user's computer and their use of the computer.</p>
+
+<p>Furthermore, for users who installed the fourth stable build of
+Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the
+surveillance <a
+href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
+by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p></li>
+
   <li><p>Windows DRM
   files <a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>can
   be used to identify people browsing through Tor</a>. The
@@ -1490,7 +1499,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/10/25 12:31:03 $
+$Date: 2017/11/11 06:31:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary/po/proprietary-surveillance.de.po       11 Nov 2017 01:47:51 
-0000      1.182
+++ proprietary/po/proprietary-surveillance.de.po       11 Nov 2017 06:31:40 
-0000      1.183
@@ -1165,10 +1165,10 @@
 "Quelle: <a href=\"https://www.apple.com/de/icloud/photos/\";>Apple – iCloud 
– "
 "Fotos:</a>, unter: https://www.apple.com/de/icloud/photos. (abgerufen:  "
 "2015-09-24)<br />Das iCloud-Feature wird <a href=\"https://support.apple.com/";
-"en-us/HT202033\">beim Startvorgang von iOS aktiviert</a>. Der Begriff "
-"<em>„Cloud“</em> bzw. <em>„Datenwolke“</em> bedeutet soviel wie 
<em>‚Bitte "
-"stell’ keine Fragen wo <ins>(meine Daten gespeichert und verarbeitet "
-"werden)</ins>‘</em>."
+"en-us/HT202033\">beim Startvorgang von iOS aktiviert</a>. Der Begriff <em>"
+"„Cloud“</em> bzw. <em>„Datenwolke“</em> bedeutet soviel wie 
<em>‚Bitte "
+"stell’ keine Fragen wo <ins>(meine Daten gespeichert und verarbeitet 
werden)"
+"</ins>‘</em>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -2375,8 +2375,8 @@
 msgstr ""
 "Mehr oder weniger alle <a href=\"//www.myce.com/news/reseachers-all-smart-"
 "tvs-spy-on-you-sony-monitors-all-channel-switches-72851/\" title=\"Willem "
-"Aldershoff, Researchers: All Smart TVs spy on you, unter: myce.com 2014."
-"\">„Smart“-TVs spionieren</a> Nutzer aus."
+"Aldershoff, Researchers: All Smart TVs spy on you, unter: myce.com 2014.\">"
+"„Smart“-TVs spionieren</a> Nutzer aus."
 
 #. type: Content of: <ul><li><p>
 msgid "The report was as of 2014, but we don't expect this has got better."
@@ -2892,8 +2892,8 @@
 "data-fbi-and-nsa/\" title=\"Microsoft openly offered cloud data to support "
 "NSA PRISM programme, unter: itproportal.com 2014.\"><b>Microsoft SkyDrive</"
 "b> ermöglicht der NSA die direkte Auswertung von Nutzerdaten</a>.<a href="
-"\"#tn08\" class=\"transnote\">[8]</a><a href=\"#tn09\" class=\"transnote"
-"\">[9]</a>"
+"\"#tn08\" class=\"transnote\">[8]</a><a href=\"#tn09\" class=\"transnote\">"
+"[9]</a>"
 
 #. type: Content of: <div><h4>
 msgid "Spyware in Chrome"

Index: thankgnus/2017supporters.de.html
===================================================================
RCS file: /web/www/www/thankgnus/2017supporters.de.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- thankgnus/2017supporters.de.html    31 Oct 2017 18:58:57 -0000      1.10
+++ thankgnus/2017supporters.de.html    11 Nov 2017 06:31:41 -0000      1.11
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" value="/thankgnus/2017supporters.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
-<!-- Parent-Version: 1.83  -->
+<!-- Parent-Version: 1.84  -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Danke, GNUs (2017) - GNU-Projekt - Free Software Foundation</title>
@@ -52,6 +52,13 @@
 </h4>
 
 <!-- Let's keep all lists in alphabetical order.  Thanks.  -->
+<ul>
+  <li>Bytemark</li>
+  <li>Markley Group</li>
+  <li>TowardEX</li>
+</ul>
+
+
 <h4>
 <a href="#TOCpatrons" id="patrons">Förderer (Gold)</a> (5.000 $ oder 
mehr)</h4>
 
@@ -71,6 +78,7 @@
   <li>Alain Brenzikofer</li>
   <li>Alexey Eromenko</li>
   <li>Cătălin Frâncu</li>
+  <li>Colin Carr</li>
   <li>CSATS Inc</li>
   <li>Daniel Riek</li>
   <li>Donald and Jill Knuth</li>
@@ -79,6 +87,7 @@
   <li>Jeffrey Cliff</li>
   <li>Marinos Yannikos</li>
   <li>Puduvankunnil Udayakumar</li>
+  <li>René Genz</li>
   <li>Robert Dionne</li>
   <li>Seungwon Park</li>
   <li>Sreeram Ramachandran</li>
@@ -94,6 +103,7 @@
 <!-- Let's keep all lists in alphabetical order.  Thanks.  -->
 <ul>
   <li>Adam Klotblixt</li>
+  <li>Adam Ymeren</li>
   <li>Alison Chaiken</li>
   <li>Allen Curtis</li>
   <li>Andrew Fox</li>
@@ -104,7 +114,9 @@
   <li>Ben Simmonds</li>
   <li>Bijan Soleymani</li>
   <li>Brett Holleman</li>
+  <li>Charles Birk</li>
   <li>Chase Kelley</li>
+  <li>Christopher Samuel</li>
   <li>Conan Chiles</li>
   <li>Colin Klingman</li>
   <li>Daniel Hoodin</li>
@@ -136,8 +148,10 @@
   <li>Pablo Adrian Nieto</li>
   <li>Paul Eggert</li>
   <li>Peter Kunze</li>
+  <li>Peter Rock</li>
   <li>Philipp Weis</li>
   <li>René Genz</li>
+  <li>Rich Haase</li>
   <li>Richard Harlow</li>
   <li>Salim Badakhchani</li>
   <li>Sam Halliday</li>
@@ -146,8 +160,10 @@
   <li>Shawn C (alias Citypw)</li>
   <li>Stephanie Ogden</li>
   <li>Steve Sprang</li>
-  <li>Tyler Romeo</li>
+  <li>Tiago Vieira</li>
+  <li>Tom Gedra</li>
   <li>Trevor Spiteri</li>
+  <li>Tyler Romeo</li>
   <li>Valerio Poggi</li>
   <li>Wade Brainerd</li>
   <li>Xavier ALT</li>
@@ -259,7 +275,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/10/31 18:58:57 $
+$Date: 2017/11/11 06:31:41 $
 
 <!-- timestamp end -->
 </p>

Index: thankgnus/po/2017supporters.de-en.html
===================================================================
RCS file: /web/www/www/thankgnus/po/2017supporters.de-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- thankgnus/po/2017supporters.de-en.html      31 Oct 2017 18:58:58 -0000      
1.9
+++ thankgnus/po/2017supporters.de-en.html      11 Nov 2017 06:31:41 -0000      
1.10
@@ -1,5 +1,5 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.83  -->
+<!-- Parent-Version: 1.84  -->
 
 <title>Thank GNUs, 2017
 - GNU Project - Free Software Foundation</title>
@@ -47,6 +47,11 @@
 </h4>
 
 <!-- Let's keep all lists in alphabetical order.  Thanks.  -->
+<ul>
+  <li>Bytemark</li>
+  <li>Markley Group</li>
+  <li>TowardEX</li>
+</ul>
 
 
 <h4>
@@ -71,6 +76,7 @@
   <li>Alain Brenzikofer</li>
   <li>Alexey Eromenko</li>
   <li>Cătălin Frâncu</li>
+  <li>Colin Carr</li>
   <li>CSATS Inc</li>
   <li>Daniel Riek</li>
   <li>Donald and Jill Knuth</li>
@@ -79,6 +85,7 @@
   <li>Jeffrey Cliff</li>
   <li>Marinos Yannikos</li>
   <li>Puduvankunnil Udayakumar</li>
+  <li>René Genz</li>
   <li>Robert Dionne</li>
   <li>Seungwon Park</li>
   <li>Sreeram Ramachandran</li>
@@ -95,6 +102,7 @@
 <!-- Let's keep all lists in alphabetical order.  Thanks.  -->
 <ul>
   <li>Adam Klotblixt</li>
+  <li>Adam Ymeren</li>
   <li>Alison Chaiken</li>
   <li>Allen Curtis</li>
   <li>Andrew Fox</li>
@@ -105,7 +113,9 @@
   <li>Ben Simmonds</li>
   <li>Bijan Soleymani</li>
   <li>Brett Holleman</li>
+  <li>Charles Birk</li>
   <li>Chase Kelley</li>
+  <li>Christopher Samuel</li>
   <li>Conan Chiles</li>
   <li>Colin Klingman</li>
   <li>Daniel Hoodin</li>
@@ -137,8 +147,10 @@
   <li>Pablo Adrian Nieto</li>
   <li>Paul Eggert</li>
   <li>Peter Kunze</li>
+  <li>Peter Rock</li>
   <li>Philipp Weis</li>
   <li>René Genz</li>
+  <li>Rich Haase</li>
   <li>Richard Harlow</li>
   <li>Salim Badakhchani</li>
   <li>Sam Halliday</li>
@@ -147,8 +159,10 @@
   <li>Shawn C [ a.k.a &ldquo;citypw&rdquo;]</li>
   <li>Stephanie Ogden</li>
   <li>Steve Sprang</li>
-  <li>Tyler Romeo</li>
+  <li>Tiago Vieira</li>
+  <li>Tom Gedra</li>
   <li>Trevor Spiteri</li>
+  <li>Tyler Romeo</li>
   <li>Valerio Poggi</li>
   <li>Wade Brainerd</li>
   <li>Xavier ALT</li>
@@ -221,7 +235,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/10/31 18:58:58 $
+$Date: 2017/11/11 06:31:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: proprietary/po/proprietary-insecurity.it-diff.html
diff -N proprietary/po/proprietary-insecurity.it-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary/po/proprietary-insecurity.it-diff.html  11 Nov 2017 06:31:40 
-0000      1.1
@@ -0,0 +1,573 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-insecurity.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.84 --&gt;
+&lt;title&gt;Proprietary Insecurity
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-insecurity.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Proprietary Insecurity&lt;/h2&gt;
+
+&lt;a href="/proprietary/proprietary.html"&gt;Other examples of proprietary 
malware&lt;/a&gt;
+
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers often exercise that power to the
+detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This page lists clearly established cases of insecurity in
+proprietary software that has grave consequences or is otherwise
+noteworthy.&lt;/p&gt;
+
+&lt;p&gt;It is incorrect to compare free software with a fictitious idea of
+proprietary software as perfect, but the press often implicitly does
+that whenever a security hole in a free program is discovered.  The
+examples below show that proprietary software isn't perfect, and
+is often quite sloppy.&lt;/p&gt;
+
+&lt;p&gt;It would be equally incorrect to compare proprietary software with
+a fictitious idea of free software as perfect.  Every nontrivial
+program has bugs, and any system, free or proprietary, may have
+security errors.  To err is human, and not culpable.  But proprietary
+software developers frequently disregard gaping holes, or even
+introduce them deliberately.  In any case, they keep users
+&lt;em&gt;helpless to fix any security problems that arise&lt;/em&gt;.  
Keeping the
+users helpless is what's culpable about proprietary software.&lt;/p&gt;
+
+&lt;ul&gt;
+<span class="inserted"><ins><em>&lt;li&gt;
+  &lt;p&gt;Bad security in some cars makes it possible
+    to &lt;a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"&gt;
+      remotely activate the airbags&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
+    hospitals is connected to the internet. Naturally &lt;a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+    its security has been cracked&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Note that this article misuses the term &lt;a
+href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
+     referring to crackers.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;The bad security in many Internet of Stings devices
+    allows &lt;a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+  &lt;p&gt;It is unfortunate that the article uses the term &lt;a
+     href="/philosophy/words-to-avoid.html#Monetize"&gt;
+     &ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be
+  &lt;a
+href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
+  hijacked by programs that play commands in ultrasound that humans can't
+  hear&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;</em></ins></span>
+       
+&lt;li id="break-security-smarttv"&gt;
+  &lt;p&gt;&lt;a
+       
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+      Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera
+      to watch the people who are watching TV.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Many models of Internet-connected cameras &lt;a
+  href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
+  have backdoors&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;That is a malicious functionality, but in addition it is a gross
+  insecurity since anyone, including malicious crackers, &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
 find those accounts and use them to get into
+  users' cameras&lt;/a&gt;.&lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;
+    Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+    pre-installed on 28 models of HP laptops logged the user's
+    keystroke to a file in the filesystem. Any process with access to
+    the filesystem or the MapViewOfFile API could gain access to the
+    log. Furthermore, &lt;a 
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
+    to modzero&lt;/a&gt; the &ldquo;information-leak via Covert Storage
+    Channel enables malware authors to capture keystrokes without
+    taking the risk of being classified as malicious task by AV
+    heuristics&rdquo;.
+  &lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
+medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+
+&lt;li&gt;
+  &lt;p&gt;Exploits of bugs in Windows, which were developed by the NSA
+       and then leaked by the Shadowbrokers group, are now being used to
+       &lt;a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack
 a great number
+       of Windows computers with ransomware&lt;/a&gt;.
+       &lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li  id="intel-me-10-year-vulnerability"&gt;
+  &lt;p&gt;Intel's CPU backdoor&mdash;the Intel Management Engine&mdash;had a
+       &lt;a 
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/"&gt;major
 security
+       vulnerability for 10 years&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The vulnerability allowed a cracker to access the computer's Intel 
Active
+      Management Technology
+      (AMT) &lt;a 
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/"&gt;
+      web interface with an empty password and gave administrative
+      access&lt;/a&gt; to access the computer's keyboard, mouse, monitor
+      among other privileges.&lt;/p&gt;
+
+       &lt;p&gt;It does not help that in newer Intel processors, it is 
impossible
+       to turn off the Intel Management Engine. Thus, even users who are 
+       proactive about their security can do nothing to protect themselves 
+       besides using machines that don't come with the backdoor.&lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Many Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
+       can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
+       Broadcom's non-free firmware.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher is
+&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to the Internet,
+its security is crap&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;For example, a cracker can gain access to the dishwasher's 
filesystem, 
+infect it with malware, and force the dishwasher to launch attacks on other
+devices in the network. Since these dishwashers are used in hospitals, such
+attacks could potentially put hundreds of lives at risk.&lt;/p&gt;
+
+&lt;/li&gt;
+&lt;li&gt;&lt;p&gt;WhatsApp has a feature that 
+    &lt;a 
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/"&gt;
+      has been described as a &ldquo;back door&rdquo;&lt;/a&gt;
+    because it would enable governments to nullify its encryption.&lt;/p&gt;
+  &lt;p&gt;The developers say that it wasn't intended as a back door, and that
+    may well be true. But that leaves the crucial question of whether it
+    functions as one. Because the program is nonfree, we cannot check by
+    studying it.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be
+&lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;remotely
 controlled with a mobile phone&lt;/a&gt;; physical access
+is not necessary. This would enable crackers to listen in on a child's
+conversations, and even speak into the toys themselves.&lt;/p&gt;
+
+&lt;p&gt;This means a burglar could speak into the toys and ask the child to
+unlock the front door while Mommy's not looking.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The mobile apps for
+communicating &lt;a 
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
+a smart but foolish car have very bad security&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;This is in addition to the fact that the car contains a cellular
+modem that tells big brother all the time where it is.  If you own
+such a car, it would be wise to disconnect the modem so as to turn off
+the tracking.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator,
+etc.,
+usually &lt;a 
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
+previous owners can still remotely control it&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Samsung
+phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
+a security hole that allows an SMS message to install
+ransomeware&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;4G LTE phone networks are drastically insecure. They can be
+&lt;a 
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;
+taken
+over by third parties and used for man-in-the-middle 
attacks&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Due to weak security, &lt;a 
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it
+is easy to open the doors of 100 million cars built by 
Volkswagen&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Ransomware &lt;a 
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;has
+been developed for a thermostat that uses proprietary 
software&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in
+Internet Explorer and Edge&lt;/a&gt; allows an attacker to retrieve
+Microsoft account credentials, if the user is tricked into visiting a
+malicious link.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
+WhatsApp messages are not entirely deleted&lt;/a&gt;. They can be recovered
+in various ways.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to
+&lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+  malacious code from any application which uses this API to render a
+  certain kind of image file&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;A bug in a proprietary ASN.1 library, used in cell phone towers as
+well as cell phones and
+routers, &lt;a 
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
+taking control of those systems&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Antivirus programs have so many errors
+  that &lt;a 
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374"&gt;they
+  may make security worse&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;GNU/Linux does not need antivirus software.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Over 70 brands of network-connected surveillance
+cameras &lt;a 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;have
+security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Samsung's &ldquo;Smart Home&rdquo; has a big security
+hole; &lt;a 
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;unauthorized
+people can remotely control it&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform so the
+problem is partly the fault of app developers. That is clearly true if
+the apps are proprietary software.&lt;/p&gt;
+
+&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going to
+screw you.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+The Nissan Leaf has a built-in cell phone modem which allows
+effectively
+anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+access its computers remotely and make changes in various
+settings&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;That's easy to do because the system has no authentication when
+accessed through the modem.  However, even if it asked for
+authentication, you couldn't be confident that Nissan has no
+access.  The software in the car is
+proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
+enables the phone company to track the car's movements all the time;
+it is possible to physically remove the cell phone modem though.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Malware found
+on &lt;a 
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;security
+cameras available through Amazon&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;A camera that records locally on physical media, and has no network
+  connection, does not threaten people with surveillance&mdash;neither by
+  watching people through the camera, nor through malware in the camera.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;A bug in the iThings Messages
+app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
+a malicious web site to extract all the user's messaging history&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Many proprietary payment apps &lt;a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
+transmit personal data in an insecure way&lt;/a&gt;.
+However, the worse aspect of these apps is that
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not 
anonymous&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+FitBit fitness trackers &lt;a 
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+have a Bluetooth vulnerability&lt;/a&gt; that allows
+attackers to send malware to the devices, which can subsequently spread
+to computers and other FitBit trackers that interact with them.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+&ldquo;Self-encrypting&rdquo; disk drives do the encryption with proprietary
+firmware so you can't trust it. Western Digital's &ldquo;My Passport&rdquo;
+drives
+&lt;a 
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have
 a back door&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Mac OS X had an
+&lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local back door for 4 years&lt;/a&gt;, which could be
+exploited by attackers to gain root privileges.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Security researchers discovered a
+&lt;a 
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text"&gt;
+vulnerability in diagnostic dongles used for vehicle tracking and
+insurance&lt;/a&gt; that let them take remote control of a car or
+lorry using an SMS.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Crackers were able to
+&lt;a 
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"&gt;take
 remote control of the Jeep&lt;/a&gt;
+&ldquo;connected car&rdquo;.
+&lt;br/&gt;They could track the car, start or stop the engine, and
+activate or deactivate the brakes, and more.
+&lt;/p&gt;
+&lt;p&gt;
+I expect that Chrysler and the NSA can do this too.
+&lt;/p&gt;
+&lt;p&gt;
+If I ever own a car, and it contains a portable phone, I will
+deactivate that.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Hospira infusion pumps, which are used to administer drugs to
+a patient, were rated
+&ldquo;&lt;a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
+secure IP device I've ever seen&lt;/a&gt;&rdquo;
+by a security researcher.
+&lt;/p&gt;
+&lt;p&gt;
+Depending on what drug is being infused, the insecurity could
+open the door to murder.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Due to bad security in a drug pump, crackers could use it to
+&lt;a 
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;kill
 patients&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+The NSA can tap data in smart phones, including iPhones, Android, and
+BlackBerry&lt;/a&gt;.  While there is not much detail here, it seems that
+this does not operate via the universal back door that we know nearly
+all portable phones have.  It may involve exploiting various bugs.
+There
+are &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+lots of bugs in the phones' radio software&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
+&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly vulnerable to
+intrusion.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The
+&lt;a 
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/"&gt;insecurity
 of WhatsApp&lt;/a&gt;
+makes eavesdropping a snap.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
+The FTC punished a company for making webcams with bad security so
+that it was easy for anyone to watch them&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/"&gt;
+It is possible to take control of some car computers through malware
+in music files&lt;/a&gt;.
+Also &lt;a 
href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0"&gt;by
+radio&lt;/a&gt;.  Here is &lt;a href="http://www.autosec.org/faq.html"&gt;more
+information&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
+It is possible to kill people by taking control of medical implants by
+radio&lt;/a&gt;.  Here
+is &lt;a href="http://www.bbc.co.uk/news/technology-17631838"&gt;more
+information&lt;/a&gt;.  And &lt;a 
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;here&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Lots of &lt;a 
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;hospital 
equipment has lousy security&lt;/a&gt;, and it can be fatal.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+Point-of-sale terminals running Windows were taken over and turned
+into a botnet for the purpose of collecting customers' credit card
+numbers&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;An app to prevent &ldquo;identity theft&rdquo; (access to personal 
data)
+by storing users' data on a special server
+&lt;a 
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/"&gt;was
+deactivated by its developer&lt;/a&gt; which had discovered a security flaw.
+&lt;/p&gt;
+
+&lt;p&gt;
+That developer seems to be conscientious about protecting personal
+data from third parties in general, but it can't protect that data
+from the state.  Quite the contrary: confiding your data to someone
+else's server, if not first encrypted by you with free software,
+undermines your rights.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some flash
+memories have modifiable software&lt;/a&gt;, which makes them vulnerable to
+viruses.&lt;/p&gt;
+
+&lt;p&gt;We don't call this a &ldquo;back door&rdquo; because it is normal
+that you can install a new system in a computer given physical access
+to it.  However, memory sticks and cards should not be modifiable in
+this way.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a href="http://spritesmods.com/?art=hddhack&amp;page=6"&gt; 
Replaceable
+nonfree software in disk drives can be written by a nonfree
+program.&lt;/a&gt;  This makes any system vulnerable to persistent attacks
+that normal forensics won't detect.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html"&gt;
+Many smartphone apps use insecure authentication methods when storing
+your personal data on remote servers.&lt;/a&gt;
+This leaves personal information like email addresses, passwords, and health 
information vulnerable. Because many
+of these apps are proprietary it makes it hard to impossible to know which 
apps are at risk.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;/ul&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2013, 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2017/11/11 06:31:40 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]