www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/categories.es.html philosophy/su...


From: GNUN
Subject: www philosophy/categories.es.html philosophy/su...
Date: Wed, 17 Jan 2018 12:02:55 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/01/17 12:02:54

Modified files:
        philosophy     : categories.es.html 
                         surveillance-vs-democracy.ru.html 
        proprietary    : malware-mobiles.ru.html 
                         proprietary-back-doors.fr.html 
                         proprietary-back-doors.ru.html 
                         proprietary-subscriptions.fr.html 
                         proprietary-subscriptions.ru.html 
                         proprietary-surveillance.fr.html 
                         proprietary-surveillance.ru.html 
                         proprietary.es.html proprietary.fr.html 
                         proprietary.ru.html 
        proprietary/po : malware-mobiles.ru-en.html 
                         proprietary-back-doors.fr-en.html 
                         proprietary-back-doors.ru-en.html 
                         proprietary-back-doors.ru.po 
                         proprietary-subscriptions.fr-en.html 
                         proprietary-subscriptions.ru-en.html 
                         proprietary-subscriptions.ru.po 
                         proprietary-surveillance.fr-en.html 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ru-en.html 
                         proprietary-surveillance.ru.po 
                         proprietary.es-en.html proprietary.es.po 
                         proprietary.fr-en.html proprietary.ja-diff.html 
                         proprietary.pl-diff.html proprietary.ru-en.html 
                         proprietary.ru.po 
        server         : sitemap.ar.html sitemap.de.html sitemap.es.html 
                         sitemap.fr.html sitemap.it.html sitemap.ja.html 
                         sitemap.nl.html sitemap.ro.html sitemap.ru.html 
                         sitemap.sq.html sitemap.uk.html 
        server/po      : sitemap.fr-en.html sitemap.ja.po 
                         sitemap.ru-en.html sitemap.sq.po sitemap.uk.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/categories.es.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ru.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ru.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.fr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.ru.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.ar.html?cvsroot=www&r1=1.247&r2=1.248
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.de.html?cvsroot=www&r1=1.327&r2=1.328
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.es.html?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.fr.html?cvsroot=www&r1=1.373&r2=1.374
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.it.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.ja.html?cvsroot=www&r1=1.323&r2=1.324
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.nl.html?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.ro.html?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.ru.html?cvsroot=www&r1=1.318&r2=1.319
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.sq.html?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.uk.html?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.fr-en.html?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.ja.po?cvsroot=www&r1=1.334&r2=1.335
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.ru-en.html?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.sq.po?cvsroot=www&r1=1.269&r2=1.270
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.uk.po?cvsroot=www&r1=1.317&r2=1.318

Patches:
Index: philosophy/categories.es.html
===================================================================
RCS file: /web/www/www/philosophy/categories.es.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- philosophy/categories.es.html       14 Jan 2018 10:01:22 -0000      1.53
+++ philosophy/categories.es.html       17 Jan 2018 17:02:50 -0000      1.54
@@ -21,9 +21,9 @@
 <p>Véase también el artículo <a 
href="/philosophy/words-to-avoid.html">Palabras
 y frases confusas que vale la pena evitar</a>.</p>
 
-<!-- GNUN: localize URL /philosophy/category.png -->
+<!-- GNUN: localize URL /philosophy/category.es.png -->
 <p id="diagram" class="c">
-<img src="/philosophy/category.png" alt="[Categorías de software]" />
+<img src="/philosophy/category.es.png" alt="[Categorías de software]" />
 </p>
 
       <p>Este diagrama, diseñado originalmente por Chao-Kuei y actualizado 
desde
@@ -456,7 +456,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2018/01/14 10:01:22 $
+$Date: 2018/01/17 17:02:50 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/surveillance-vs-democracy.ru.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.ru.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- philosophy/surveillance-vs-democracy.ru.html        13 Jan 2018 17:00:33 
-0000      1.34
+++ philosophy/surveillance-vs-democracy.ru.html        17 Jan 2018 17:02:52 
-0000      1.35
@@ -17,7 +17,7 @@
 -->
 </style>
 
-<!-- GNUN: localize URL /graphics/dog.small.jpg -->
+<!-- GNUN: localize URL /graphics/dog.small.ru.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.ru.html" -->
 <h2 class="center">Сколько слежки может выдержать 
демократия?</h2>
@@ -34,7 +34,7 @@
 <div id="intro">
 <div class="pict wide">
 <a href="/graphics/dog.html">
-<img src="/graphics/dog.small.jpg" alt="Карикатура: собака с 
удивлением смотрит на рекламу, выскочившую 
на экране ее
+<img src="/graphics/dog.small.ru.jpg" alt="Карикатура: собака 
с удивлением смотрит на рекламу, 
выскочившую на экране ее
 компьютера" /></a>
 <p>&ldquo;Как они узнали, что я&nbsp;&mdash; 
собака?&rdquo;</p>
 </div>
@@ -628,7 +628,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/01/13 17:00:33 $
+$Date: 2018/01/17 17:02:52 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/malware-mobiles.ru.html 12 Sep 2017 09:04:57 -0000      1.35
+++ proprietary/malware-mobiles.ru.html 17 Jan 2018 17:02:52 -0000      1.36
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
 
 <!--#include virtual="/server/header.ru.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Вредоносные программы в мобильных 
устройствах - Проект GNU - Фонд свободного
@@ -40,6 +40,47 @@
 </p>
 </div>
 
+<div class="highlight-para">
+<p>Почти все мобильные телефоны причиняют 
две серьезных несправедливости своим
+пользователям: отслеживают их перемещения 
и прослушивают их переговоры. Вот
+почему мы называем их &ldquo;мечтой 
Сталина&rdquo;.</p>
+</div>
+
+<ul>
+  <li><p>Телефонная сеть <a
+href="https://ssd.eff.org/en/module/problem-mobile-phones";> 
отслеживает
+перемещения каждого телефона</a>.</p>
+    <p>Это заложено в схеме телефонной сети: 
пока телефон связывается с сетью,
+помешать сети записывать его 
местоположение невозможно. Многие страны 
(в том
+числе США и Евросоюз) требуют, чтобы сеть х
ранила эти данные о
+местоположении в течение месяцев или 
лет.</p>
+  </li>
+  <li><p id="universal-back-door">В коммуникационном 
процессоре почти любого телефона есть 
универсальный
+черный ход, который <a
+href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
+часто применяется, чтобы заставить 
телефон передавать все разговоры, которые
+он слышит</a>.</p>
+    <p>Лазейка <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>может
+принимать форму ошибок, которые остаются 
неисправленными по 20
+лет</a>. Решение оставить прорехи в защите 
незаделанными нравственно
+эквивалентно написанию лазейки.</p>
+    <p>Лазейка находится в &ldquo;модемном 
процессоре&rdquo;, который отвечает за
+связь с радиосетью. В большинстве 
телефонов модемный процессор контролирует
+работу микрофона. В большинстве телефонов 
он может переписывать программы и
+в главном процессоре.</p>
+    <p>Есть модели телефонов, специально 
спроектированные, чтобы микрофон не
+контролировался модемным процессором и 
чтобы он не мог изменять программы в
+главном процессоре. Лазейка в них есть, но 
по крайней мере с ее помощью
+невозможно превратить телефон в 
подслушивающее устройство.</p>
+    <p>Универсальный черный ход, очевидно, 
применяется также, чтобы заставлять
+телефоны <a
+href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
+передавать, даже когда они выключены</a>. 
Это значит, что их перемещения
+отслеживаются, а возможно, включается и 
прослушивание.</p>
+  </li>
+</ul>
+
 <p>Здесь приводятся примеры вредоносных 
программ на мобильных
 устройствах. См. также описание 
вредоносных функций, характерных для
 ай-штучек, на <a 
href="/proprietary/malware-apple.html">странице о
@@ -72,16 +113,9 @@
 <h3 id="back-doors">Лазейки</h3>
 <ul>
   <li>
-    <p>Универсальный черный ход в мобильных 
телефонах <a
-href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
-задействуется для прослушивания через их 
микрофоны</a>.</p>
-    <p><a
-href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
-В большинстве мобильных телефонов есть 
универсальный черный ход</a>, который
-применяли для превращения их во 
вредоносные устройства.</p>
-    <p>Подробности <a
-href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>о
-природе этой лазейки</a>.</p>
+    <p>Выше описана <a 
href="#universal-back-door">универсальная лазейка</a>,
+которая есть по сути во всех мобильных 
телефонах и которая позволяет
+превращать их в штатные подслушивающие 
устройства.</p>
   </li>
 
   <li><p><a
@@ -98,15 +132,17 @@
   <li>
   <p>В Android <a
 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
-у Google есть черный ход для удаления 
программ по сети</a> (в программе под
-названием GTalkService).
+у Google есть черный ход для удаления 
программ по сети</a>. (Программа
+называлась GTalkService, но кажется, ее 
объединили с Google Play.)
   </p>
 
-<p>Google может также с помощью GTalkService (которая 
со времени написания
-статьи, кажется, была объединена с Google Play) <a
-href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>
-принудительно устанавливать программы по 
сети</a>. Это вводит практически
-универсальный черный ход. </p>
+  <p>
+  Google может также <a
+href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>
+принудительно устанавливать приложения 
по сети</a> через Google Play. Это не
+эквивалентно универсальной лазейке, но 
позволяет проделывать различные
+грязные трюки.
+  </p>
 
   <p>
   Хотя <em>осуществление</em> этой власти 
компанией Google до сих пор не было
@@ -527,7 +563,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc.</p>
 
 <p>Это произведение доступно по <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.ru";>лицензии
@@ -547,7 +583,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2017/09/12 09:04:57 $
+$Date: 2018/01/17 17:02:52 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/proprietary-back-doors.fr.html  25 Dec 2017 20:29:12 -0000      
1.40
+++ proprietary/proprietary-back-doors.fr.html  17 Jan 2018 17:02:52 -0000      
1.41
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-back-doors.en.html" -->
 
 <!--#include virtual="/server/header.fr.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Portes dérobées du logiciel privateur - Projet GNU - Free Software
@@ -31,7 +31,7 @@
 
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>porte
 dérobée universelle</a>. Même si ce produit, tel qu'il est livré, n'est pas
 utilisable comme appareil d'écoute, il pourrait sûrement le devenir après
-une modification du code.</p>
+une modification à distance du code.</p>
   </li>
 
   <li>
@@ -125,17 +125,30 @@
 le contrôle total de la machine en réclamant sans arrêt un mot de passe
 administrateur</a>.</p>
     </li>
-  <li>
-    <p>La porte dérobée universelle des téléphones portables <a
-href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>est
-utilisée pour écouter à travers leur micro</a>.</p>
-    <p>La plupart des téléphones possèdent cette porte dérobée 
universelle, qui a
-été utilisée pour <a
-href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>les
-rendre malfaisants</a>.</p>
-    <p>Plus d'info sur <a
-href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>la
-nature de ce problème</a>.</p>
+  <li><p id="universal-back-door">Chacun, ou presque, des processeurs de 
communication utilisés en téléphonie
+a une porte dérobée universelle qui est <a
+href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>souvent
+employée pour forcer le téléphone à transmettre toutes les conversations
+qu'il entend</a>.</p>
+    <p>Cette porte dérobée <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>peut
+prendre la forme de bogues qui sont restées non corrigées pendant 20
+ans</a>. Le choix de laisser ces failles de sécurité en place est
+l'équivalent moral de la création d'une porte dérobée.</p>
+    <p>La porte dérobée est dans le « processeur du modem », dont le 
rôle est de
+communiquer avec le réseau hertzien. Dans la plupart des téléphones, le
+processeur du modem a le contrôle du micro et en général il a aussi la
+capacité de réécrire le logiciel du processeur principal.</p>
+    <p>Quelques modèles de téléphone sont spécialement conçus pour que le
+processeur du modem ne contrôle pas le micro et par conséquent ne puisse pas
+changer le logiciel du processeur principal. Ils ont tout de même une porte
+dérobée, mais au moins elle est incapable de transformer le téléphone en
+appareil d'écoute.</p>
+    <p>Il semble que la porte dérobée universelle soit également utilisée 
pour
+forcer les téléphones à <a
+href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>transmettre
+même quand ils sont éteints</a>. Cela signifie que leurs mouvements sont
+suivis et que la fonction d'écoute peut être rendue opérante.</p>
   </li>
 
   <li><p><a
@@ -285,26 +298,21 @@
 vous devez avoir le droit de décider si vous voulez faire confiance à
 quelqu'un pour cela, et à qui.
 </p>
-
-<p>
-Comme le montrent ces pages, si vous voulez débarrasser votre ordinateur des
-logiciels malveillants, le premier à éliminer est Windows ou iOS.
-</p>
 </li>
 
 <li>
 <p>Dans Android, <a
 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>Google
 a une porte dérobée qui lui permet de supprimer des applications à
-distance</a> (elle est dans un programme appelé GTalkService).
+distance</a> (elle est dans un programme appelé GTalkService qui semble,
+depuis la parution de cet article, avoir été intégré à Google Play).
 </p>
 
 <p>
-Via GTalkService, Google peut aussi <a
+Google peut aussi <a
 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>installer
-des applis, de force et à distance</a> (ce service semble avoir fusionné
-avec Google Play depuis la parution de cet article).  Ce n'est pas
-l'équivalent d'une porte dérobée universelle, mais cela rend possibles
+des applis, de force et à distance</a> au moyen de GTalkService.  Ce n'est
+pas l'équivalent d'une porte dérobée universelle, mais cela rend possibles
 divers mauvais coups.
 </p>
 
@@ -465,7 +473,7 @@
 href="/server/standards/README.translations.html">guide de traduction</a>.</p>
 </div>
 
-<p>Copyright &copy; 2014-2017 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014-2018 Free Software Foundation, Inc.</p>
 
 <p>Cette page peut être utilisée suivant les conditions de la licence <a
 rel="license"
@@ -483,7 +491,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2017/12/25 20:29:12 $
+$Date: 2018/01/17 17:02:52 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ru.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/proprietary-back-doors.ru.html  25 Dec 2017 16:28:46 -0000      
1.39
+++ proprietary/proprietary-back-doors.ru.html  17 Jan 2018 17:02:52 -0000      
1.40
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-back-doors.en.html" -->
 
 <!--#include virtual="/server/header.ru.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Лазейки в несвободных программах - 
Проект GNU - Фонд свободного программного
@@ -30,7 +30,7 @@
 
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
 универсальный черный ход</a>. Если продукт в 
том виде, в каком он
 поставляется, не действует как 
подслушивающее устройство, то изменение
-программы наверняка может превратить его 
в такое устройство.</p>
+программы по сети наверняка может 
превратить его в такое устройство.</p>
   </li>
 
   <li>
@@ -119,17 +119,29 @@
 берет машину под свой полный контроль, 
постоянно запрашивая у пользователя
 пароль системного администратора</a>.</p>
     </li>
-  <li>
-    <p>Универсальный черный ход в мобильных 
телефонах <a
+  <li><p id="universal-back-door">В коммуникационном 
процессоре почти любого телефона есть 
универсальный
+черный ход, который <a
 href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
-задействуется для прослушивания через их 
микрофоны</a>.</p>
-    <p><a
+часто применяется, чтобы заставить 
телефон передавать все разговоры, которые
+он слышит</a>.</p>
+    <p>Лазейка <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>может
+принимать форму ошибок, которые остаются 
неисправленными по 20
+лет</a>. Решение оставить прорехи в защите 
незаделанными нравственно
+эквивалентно написанию лазейки.</p>
+    <p>Лазейка находится в &ldquo;модемном 
процессоре&rdquo;, который отвечает за
+связь с радиосетью. В большинстве 
телефонов модемный процессор контролирует
+работу микрофона. В большинстве телефонов 
но может переписывать программы и
+в главном процессоре.</p>
+    <p>Есть модели телефонов, специально 
спроектированные, чтобы микрофон не
+контролировался модемным процессором и 
чтобы он не мог изменять программы в
+главном процессоре. Лазейка в них есть, но 
по крайней мере с ее помощью
+невозможно превратить телефон в 
подслушивающее устройство.</p>
+    <p>Универсальный черный ход, очевидно, 
применяется также, чтобы заставлять
+телефоны <a
 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
-В большинстве мобильных телефонов есть 
универсальный черный ход</a>, который
-применяли для превращения их во 
вредоносные устройства.</p>
-    <p>Подробнее <a
-href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>о
-природе этой проблемы</a>.</p>
+передавать, даже когда они выключены</a>. 
Это значит, что их перемещения
+отслеживаются, а возможно, включается и 
прослушивание.</p>
   </li>
 
   <li><p><a
@@ -275,26 +287,21 @@
 быть право решать, кому доверять таким 
образом (и доверять ли кому-нибудь
 вообще).
 </p>
-
-<p>
-Как показано на этих страницах, если вы х
отите очистить свой компьютер от
-вредоносных программ, прежде всего вам 
нужно удалить Windows или iOS.
-</p>
 </li>
 
 <li>
 <p>В Android <a
 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
-у Google есть черный ход для удаления 
программ по сети</a> (в программе под
-названием GTalkService).
+у Google есть черный ход для удаления 
программ по сети</a>. (Программа
+называлась GTalkService, но кажется, ее 
объединили с Google Play.)
 </p>
 
 <p>
-Google может также с помощью GTalkService (которая 
со времени написания
-статьи, кажется, была объединена с Google Play) <a
+Google может также <a
 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>
-принудительно устанавливать программы по 
сети</a>. Это не эквивалентно
-универсальному черному ходу, но допускает 
различные грязные трюки.
+принудительно устанавливать приложения 
по сети</a> через Google Play. Это не
+эквивалентно универсальной лазейке, но 
позволяет проделывать различные
+грязные трюки.
 </p>
 
 <p>
@@ -449,7 +456,7 @@
 переводам&rdquo;</a>.</p>
 </div>
 
-<p>Copyright &copy; 2014-2017 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014-2018 Free Software Foundation, Inc.</p>
 
 <p>Это произведение доступно по <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.ru";>лицензии
@@ -469,7 +476,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2017/12/25 16:28:46 $
+$Date: 2018/01/17 17:02:52 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-subscriptions.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.fr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary-subscriptions.fr.html       1 Jan 2018 17:34:55 
-0000       1.5
+++ proprietary/proprietary-subscriptions.fr.html       17 Jan 2018 17:02:52 
-0000      1.6
@@ -28,7 +28,12 @@
 malveillantes.</p>
 
 <ul>
+<li><p>Microsoft Office force ses utilisateurs <a
+href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>Ã
 
+s'abonner à Office 360 pour pouvoir créer ou éditer des documents</a>.</p>
+</li>
 <li>
+
 <p>Sony a ressorti son robot de compagnie Aibo, cette fois-ci <a
 
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>avec
 une porte dérobée universelle, ainsi qu'une dépendance à un serveur avec
@@ -128,7 +133,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/01/01 17:34:55 $
+$Date: 2018/01/17 17:02:52 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-subscriptions.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.ru.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/proprietary-subscriptions.ru.html       1 Jan 2018 10:42:50 
-0000       1.4
+++ proprietary/proprietary-subscriptions.ru.html       17 Jan 2018 17:02:52 
-0000      1.5
@@ -28,7 +28,12 @@
 сервер проверяет дату. И то, и другое 
является вредоносной функцией.</p>
 
 <ul>
+<li><p>Microsoft Office принуждает пользователей <a
+href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>подписываться
+на Office 360, чтобы получить возможность 
редактировать документы</a>.</p>
+</li>
 <li>
+
 <p>Sony снова выпустила свою собачку-робота 
Aibo, на этот раз <a
 
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
 с универсальным черным ходом, и привязала 
к серверу, который требует
@@ -130,7 +135,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/01/01 10:42:50 $
+$Date: 2018/01/17 17:02:52 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary/proprietary-surveillance.fr.html        3 Jan 2018 19:01:23 
-0000       1.106
+++ proprietary/proprietary-surveillance.fr.html        17 Jan 2018 17:02:52 
-0000      1.107
@@ -358,6 +358,40 @@
 
 <ul>
 <li>
+  <p>Une vingtaine d'applis Android malhonnêtes ont enregistré <a
+href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts";>des
+appels téléphoniques et les ont envoyées à des fouineurs, ainsi que des
+textos et des emails</a>.</p>
+
+  <p>Google n'a pas forcé ces applis à espionner ; au contraire, elle a 
essayé
+d'empêcher ça de diverses manières et a supprimé ces applis après avoir
+découvert ce qu'elles faisaient. Donc nous ne pouvons pas mettre sur le dos
+de Google ce comportement fouineur particulier.</p>
+
+  <p>Cependant, Google redistribue des applis Android non libres et donc 
partage
+la responsabilité de l'injustice qu'entraîne leur caractère privateur. De
+plus, cette société redistribue ses propres applis non libres (par exemple
+Google Play), <a
+href="/philosophy/free-software-even-more-important.html">qui sont
+malveillantes</a>.</p>
+
+  <p>Est-ce que Google aurait pu faire plus pour empêcher ces applis de 
tricher ?
+Il n'y a aucun moyen systématique pour Google, ni pour les utilisateurs
+d'Android, d'inspecter les applis privatrices exécutables pour voir ce
+qu'elles font.</p>
+
+  <p>Google pourrait demander le code source de ces applis et l'étudier pour
+déterminer si elles font du tort aux utilisateurs d'une façon ou d'une
+autre. Si ce contrôle était fait correctement, l'espionnage pourrait être
+plus ou moins évité, sauf si les développeurs d'applis étaient assez
+astucieux pour le déjouer.</p>
+
+  <p>Mais puisque Google développe ses propres applis malveillantes, nous ne
+pouvons pas lui faire confiance pour nous protéger. Nous devons exiger la
+publication du code source, pour que nous puissions compter les uns sur les
+autres.</p>
+</li>
+<li>
   <p>Un <a
 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>article
 de recherche</a> a étudié 283 applis VPN pour Android du point de vue de la
@@ -1689,7 +1723,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/01/03 19:01:23 $
+$Date: 2018/01/17 17:02:52 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary/proprietary-surveillance.ru.html        3 Jan 2018 19:01:23 
-0000       1.110
+++ proprietary/proprietary-surveillance.ru.html        17 Jan 2018 17:02:52 
-0000      1.111
@@ -356,6 +356,39 @@
 
 <ul>
 <li>
+  <p>20 нечестных приложений Android <a
+href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts";>записывали
+телефонные звонки и отправляли их в виде 
текстовых сообщений и электронной
+почты тем, кто следит за 
пользователями</a>.</p>
+
+  <p>Компания Google не нарочно сделала, чтобы 
эти приложения шпионили; напротив,
+она принимала различные меры, чтобы 
предотвратить это, и удалила эти
+приложения, когда выяснилось, что они 
делают. Так что мы не можем обвинять
+Google в том, что эти приложения шпионили.</p>
+
+  <p>С другой стороны, Google 
перераспространяет несвободные 
приложения Android,
+а стало быть, разделяет ответственность за 
несправедливость, состоящую в
+том, что они несвободны. Компания 
распространяет также свои собственные
+несвободные приложения, такие как Google Play, <a
+href="/philosophy/free-software-even-more-important.html">которые
+злонамеренны</a>.</p>
+
+  <p>Могла ли компания Google предотвращать 
жульничество со стороны приложений
+более тщательно? Ни для Google, ни для 
пользователей Android не существует
+систематического способа инспектировать 
исполняемые файлы несвободных
+приложений, чтобы понять, что они делают.</p>
+
+  <p>В Google могли бы требовать исходный текст 
этих приложений и изучать
+каким-то образом исходный текст, чтобы 
определять, не делают ли они
+пользователям что-то плохое. Если бы 
компания делала это хорошо, она могла
+бы более или менее предотвращать такое 
подглядывание, кроме случаев, когда
+разработчики приложения достаточно умны, 
чтобы перехитрить проверку.</p>
+
+  <p>Но поскольку Google сама разрабатывает 
злонамеренные приложения, мы не можем
+доверять Google нашу защиту. Мы должны 
требовать выпуска исходного текста
+для публики, чтобы мы могли защищать друг 
друга.</p>
+</li>
+<li>
   <p>В статье с исследованием приватности и 
защищенности 283 приложений Android
 для VPN сделан вывод, что &ldquo;несмотря на 
обещания приватности,
 защищенности и анонимности, которое дают 
большинство приложений для VPN, <a
@@ -1658,7 +1691,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/01/03 19:01:23 $
+$Date: 2018/01/17 17:02:52 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/proprietary.es.html     5 Nov 2017 11:59:12 -0000       1.22
+++ proprietary/proprietary.es.html     17 Jan 2018 17:02:52 -0000      1.23
@@ -66,8 +66,6 @@
 Amazon</a></li>
   <li><a href="/proprietary/malware-webpages.html"><cite>Malware</cite> en 
páginas
 web</a></li>
-  <li><a href="/proprietary/malware-phones.html"><cite>Malware</cite> en
-teléfonos</a></li>
   <li><a href="/proprietary/malware-mobiles.html"><cite>Malware</cite> en los
 dispositivos móviles</a></li>
   <li><a href="/proprietary/malware-games.html"><cite>Malware</cite> en los
@@ -174,7 +172,8 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software
+Foundation, Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES";>Creative
@@ -190,7 +189,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2017/11/05 11:59:12 $
+$Date: 2018/01/17 17:02:52 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/proprietary.fr.html     5 Nov 2017 10:59:16 -0000       1.31
+++ proprietary/proprietary.fr.html     17 Jan 2018 17:02:53 -0000      1.32
@@ -61,7 +61,6 @@
   <li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
   <li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
   <li><a href="/proprietary/malware-webpages.html">Pages web</a></li>
-  <li><a href="/proprietary/malware-phones.html">Téléphones</a></li>
   <li><a href="/proprietary/malware-mobiles.html">Périphériques 
mobiles</a></li>
   <li><a href="/proprietary/malware-games.html">Jeux</a></li>
   <li><a href="/proprietary/malware-appliances.html">Appareils divers</a></li>
@@ -160,7 +159,8 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software
+Foundation, Inc.</p>
 
 <p>Cette page peut être utilisée suivant les conditions de la licence <a
 rel="license"
@@ -178,7 +178,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2017/11/05 10:59:16 $
+$Date: 2018/01/17 17:02:53 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/proprietary.ru.html     7 Nov 2017 09:33:14 -0000       1.25
+++ proprietary/proprietary.ru.html     17 Jan 2018 17:02:53 -0000      1.26
@@ -65,8 +65,6 @@
   <li><a href="/proprietary/malware-amazon.html"> Вредоносные 
программы Amazon</a></li>
   <li><a href="/proprietary/malware-webpages.html">Вредоносные 
программы на
 страницах сайтов</a></li>
-  <li><a href="/proprietary/malware-phones.html">Вредоносные 
программы в
-телефонах</a></li>
   <li><a href="/proprietary/malware-mobiles.html">Вредоносные 
программы в
 мобильных устройствах</a></li>
   <li><a href="/proprietary/malware-games.html">Вредоносные 
программы в играх</a></li>
@@ -170,7 +168,8 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software
+Foundation, Inc.</p>
 
 <p>Это произведение доступно по <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.ru";>лицензии
@@ -190,7 +189,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2017/11/07 09:33:14 $
+$Date: 2018/01/17 17:02:53 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/po/malware-mobiles.ru-en.html   12 Sep 2017 09:04:57 -0000      
1.33
+++ proprietary/po/malware-mobiles.ru-en.html   17 Jan 2018 17:02:53 -0000      
1.34
@@ -1,5 +1,5 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
 <title>Malware in Mobile Devices
 - GNU Project - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
@@ -33,6 +33,49 @@
 </p>
 </div>
 
+<div class="highlight-para">
+<p>Nearly all mobile phones do two grievous wrongs to their users:
+tracking their movements, and listening to their conversations.  This
+is why we call them &ldquo;Stalin's dream&rdquo;.</p>
+</div>
+
+<ul>
+  <li><p>The phone network
+    <a href="https://ssd.eff.org/en/module/problem-mobile-phones";>
+      tracks the movements of each phone</a>.</p>
+    <p>This is inherent in the design of the phone network: as long as
+      the phone is in communication with the network, there is no way
+      to stop the network from recording its location.  Many countries
+      (including the US and the EU) require the network to store all
+      these location data for months or years.</p>
+  </li>
+  <li><p id="universal-back-door">Almost every phone's communication processor 
has
+      a universal back door which
+      is <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
+      often used to make a phone transmit all conversations it
+ hears</a>.</p>
+    <p>The back
+      door <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
+      may take the form of bugs that have gone 20 years unfixed</a>.
+      The choice to leave the security holes in place is morally
+      equivalent to writing a back door.</p>
+    <p>The back door is in the &ldquo;modem processor&rdquo;, whose
+      job is to communicate with the radio network.  In most phones,
+      the modem processor controls the microphone.  In most phones it
+      has the power to rewrite the software for the main processor
+      too.</p>
+    <p>A few phone models are specially designed so that the modem
+      processor does not control the microphone, and so that it can't
+      change the software in the main processor.  They still have the
+      back door, but at least it is unable to turn the phone unto a
+      listening device.</p>
+    <p>The universal back door is apparently also used to make phones
+      <a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
+      transmit even when they are turned off</a>.  This means their movements
+      are tracked, and may also make the listening feature work.</p>
+  </li>
+</ul>
+
 <p>Here are examples of malware in mobile devices.  See also
 the <a href="/proprietary/malware-apple.html">the Apple malware
 page</a> for malicious functionalities specific to the Apple iThings.</p>
@@ -60,14 +103,9 @@
 <h3 id="back-doors">Mobile Back Doors</h3>
 <ul>
   <li>
-    <p>The universal back door in portable phones
-      <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
-        is employed to listen through their microphones</a>.</p>
-    <p>Most mobile phones have this universal back door, which has been
-      used to
-      <a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
-       turn them malicious</a>.</p>
-    <p>More about <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>the
 nature of this problem</a>.</p>
+    <p>See above for the <a href="#universal-back-door">general universal back
+      door</a> in essentially all mobile phones, which permits converting
+      them into full-time listening devices.</p>
   </li>
 
   <li><p><a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
@@ -81,17 +119,20 @@
   </li>
 
   <li>
-  <p>In Android, <a
-  
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
-  Google has a back door to remotely delete apps</a> (it is in a program
-  called GTalkService).
+  <p>In Android,
+  <a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
+  Google has a back door to remotely delete apps.</a>  (It was in a
+  program called GTalkService, which seems since then to have been
+  merged into Google Play.)
   </p>
 
-<p>Google can also <a
-href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
-title="at the Wayback Machine (archived May 20, 2015)">forcibly and remotely
-install apps</a> through GTalkService (which seems, since that article, to have
-been merged into Google Play).  This adds up to a universal back door. </p>
+  <p>
+  Google can also
+  <a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>
+  forcibly and remotely install apps</a> through Google Play.
+  This is not equivalent to a universal back door, but permits various
+  dirty tricks.
+  </p>
 
   <p>
   Although Google's <em>exercise</em> of this power has not been
@@ -481,7 +522,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -491,7 +532,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/09/12 09:04:57 $
+$Date: 2018/01/17 17:02:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/proprietary-back-doors.fr-en.html    25 Dec 2017 20:29:15 
-0000      1.38
+++ proprietary/po/proprietary-back-doors.fr-en.html    17 Jan 2018 17:02:53 
-0000      1.39
@@ -1,5 +1,5 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
 <title>Proprietary Back Doors - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
 <!--#include virtual="/server/banner.html" -->
@@ -22,7 +22,7 @@
     <p>The Furby Connect has a <a
 
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
     universal back door</a>. If the product as shipped doesn't act as a
-    listening device, changing the code could surely convert it into one.</p>
+    listening device, remote changes to the code could surely convert it into 
one.</p>
   </li>
 
   <li>
@@ -108,15 +108,30 @@
         total control of the machine by repeatedly nagging the user
         for an admini password</a>.</p>
     </li>
-  <li>
-    <p>The universal back door in portable phones
-      <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
-        is employed to listen through their microphones</a>.</p>
-    <p>Most mobile phones have this universal back door, which has been
-      used to
+  <li><p id="universal-back-door">Almost every phone's communication processor 
has
+      a universal back door which
+      is <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
+      often used to make a phone transmit all conversations it
+ hears</a>.</p>
+    <p>The back
+      door <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
+      may take the form of bugs that have gone 20 years unfixed</a>.
+      The choice to leave the security holes in place is morally
+      equivalent to writing a back door.</p>
+    <p>The back door is in the &ldquo;modem processor&rdquo;, whose
+      job is to communicate with the radio network.  In most phones,
+      the modem processor controls the microphone.  In most phones it
+      has the power to rewrite the software for the main processor
+      too.</p>
+    <p>A few phone models are specially designed so that the modem
+      processor does not control the microphone, and so that it can't
+      change the software in the main processor.  They still have the
+      back door, but at least it is unable to turn the phone unto a
+      listening device.</p>
+    <p>The universal back door is apparently also used to make phones
       <a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
-       turn them malicious</a>.</p>
-    <p>More about <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>the
 nature of this problem</a>.</p>
+      transmit even when they are turned off</a>.  This means their movements
+      are tracked, and may also make the listening feature work.</p>
   </li>
 
   <li><p><a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
@@ -255,25 +270,20 @@
 But there is no excuse for <em>deleting</em> the programs, and you
 should have the right to decide who (if anyone) to trust in this way.
 </p>
-
-<p>
-As these pages show, if you do want to clean your computer of malware,
-the first software to delete is Windows or iOS.
-</p>
 </li>
 
 <li>
 <p>In Android,
 <a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
-Google has a back door to remotely delete apps.</a>  (It is in a program
-called GTalkService).
+Google has a back door to remotely delete apps.</a>  (It was in a
+program called GTalkService, which seems since then to have been
+merged into Google Play.)
 </p>
 
 <p>
 Google can also
 <a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>
-forcibly and remotely install apps</a> through GTalkService (which
-seems, since that article, to have been merged into Google Play).
+forcibly and remotely install apps</a> through GTalkService.
 This is not equivalent to a universal back door, but permits various
 dirty tricks.
 </p>
@@ -414,7 +424,7 @@
 of this article.</p>
 </div>
 
-<p>Copyright &copy; 2014-2017 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014-2018 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -424,7 +434,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/12/25 20:29:15 $
+$Date: 2018/01/17 17:02:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-back-doors.ru-en.html    25 Dec 2017 16:28:46 
-0000      1.39
+++ proprietary/po/proprietary-back-doors.ru-en.html    17 Jan 2018 17:02:53 
-0000      1.40
@@ -1,5 +1,5 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
 <title>Proprietary Back Doors - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
 <!--#include virtual="/server/banner.html" -->
@@ -22,7 +22,7 @@
     <p>The Furby Connect has a <a
 
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
     universal back door</a>. If the product as shipped doesn't act as a
-    listening device, changing the code could surely convert it into one.</p>
+    listening device, remote changes to the code could surely convert it into 
one.</p>
   </li>
 
   <li>
@@ -108,15 +108,30 @@
         total control of the machine by repeatedly nagging the user
         for an admini password</a>.</p>
     </li>
-  <li>
-    <p>The universal back door in portable phones
-      <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
-        is employed to listen through their microphones</a>.</p>
-    <p>Most mobile phones have this universal back door, which has been
-      used to
+  <li><p id="universal-back-door">Almost every phone's communication processor 
has
+      a universal back door which
+      is <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
+      often used to make a phone transmit all conversations it
+ hears</a>.</p>
+    <p>The back
+      door <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
+      may take the form of bugs that have gone 20 years unfixed</a>.
+      The choice to leave the security holes in place is morally
+      equivalent to writing a back door.</p>
+    <p>The back door is in the &ldquo;modem processor&rdquo;, whose
+      job is to communicate with the radio network.  In most phones,
+      the modem processor controls the microphone.  In most phones it
+      has the power to rewrite the software for the main processor
+      too.</p>
+    <p>A few phone models are specially designed so that the modem
+      processor does not control the microphone, and so that it can't
+      change the software in the main processor.  They still have the
+      back door, but at least it is unable to turn the phone unto a
+      listening device.</p>
+    <p>The universal back door is apparently also used to make phones
       <a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
-       turn them malicious</a>.</p>
-    <p>More about <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>the
 nature of this problem</a>.</p>
+      transmit even when they are turned off</a>.  This means their movements
+      are tracked, and may also make the listening feature work.</p>
   </li>
 
   <li><p><a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
@@ -255,25 +270,20 @@
 But there is no excuse for <em>deleting</em> the programs, and you
 should have the right to decide who (if anyone) to trust in this way.
 </p>
-
-<p>
-As these pages show, if you do want to clean your computer of malware,
-the first software to delete is Windows or iOS.
-</p>
 </li>
 
 <li>
 <p>In Android,
 <a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
-Google has a back door to remotely delete apps.</a>  (It is in a program
-called GTalkService).
+Google has a back door to remotely delete apps.</a>  (It was in a
+program called GTalkService, which seems since then to have been
+merged into Google Play.)
 </p>
 
 <p>
 Google can also
 <a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>
-forcibly and remotely install apps</a> through GTalkService (which
-seems, since that article, to have been merged into Google Play).
+forcibly and remotely install apps</a> through GTalkService.
 This is not equivalent to a universal back door, but permits various
 dirty tricks.
 </p>
@@ -414,7 +424,7 @@
 of this article.</p>
 </div>
 
-<p>Copyright &copy; 2014-2017 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014-2018 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -424,7 +434,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/12/25 16:28:46 $
+$Date: 2018/01/17 17:02:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary/po/proprietary-back-doors.ru.po 17 Jan 2018 15:08:57 -0000      
1.121
+++ proprietary/po/proprietary-back-doors.ru.po 17 Jan 2018 17:02:53 -0000      
1.122
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-01-12 02:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -55,16 +54,6 @@
 msgstr "Вот примеры подтвержденных лазеек в 
несвободных программах."
 
 #. type: Content of: <ul><li><p>
-# | The Furby Connect has a <a
-# | 
href=\"https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect\";>
-# | universal back door</a>. If the product as shipped doesn't act as a
-# | listening device, [-changing-] {+remote changes to+} the code could surely
-# | convert it into one.
-#| msgid ""
-#| "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-";
-#| "feed-them-after-midnight-reverse-engineering-the-furby-connect\"> "
-#| "universal back door</a>. If the product as shipped doesn't act as a "
-#| "listening device, changing the code could surely convert it into one."
 msgid ""
 "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-";
 "them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
@@ -74,8 +63,8 @@
 "В Furby Connect есть <a 
href=\"https://www.contextis.com/blog/dont-feed-them-";
 "after-midnight-reverse-engineering-the-furby-connect\"> 
универсальный черный "
 "ход</a>. Если продукт в том виде, в каком он 
поставляется, не действует как "
-"подслушивающее устройство, то изменение 
программы по сети наверняка может 
превратить "
-"его в такое устройство."
+"подслушивающее устройство, то изменение 
программы по сети наверняка может "
+"превратить его в такое устройство."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -252,38 +241,18 @@
 "системного администратора</a>."
 
 #. type: Content of: <ul><li><p>
-# | [-The-]{+Almost every phone's communication processor has a+} universal
-# | back door [-in portable phones-] {+which is+} <a
-# | 
href=\"https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html\";>
-# | [-is employed-] {+often used+} to [-listen through their
-# | microphones</a>.-] {+make a phone transmit all conversations it
-# | hears</a>.+}
-#| msgid ""
-#| "The universal back door in portable phones <a href=\"https://www.schneier.";
-#| "com/blog/archives/2006/12/remotely_eavesd_1.html\"> is employed to listen "
-#| "through their microphones</a>."
 msgid ""
 "Almost every phone's communication processor has a universal back door which "
 "is <a href=\"https://www.schneier.com/blog/archives/2006/12/";
 "remotely_eavesd_1.html\"> often used to make a phone transmit all "
 "conversations it hears</a>."
 msgstr ""
-"В коммуникационном процессоре почти 
любого телефона есть универсальный черный 
ход, который <a href=\"https://www.";
-"schneier.com/blog/archives/2006/12/remotely_eavesd_1.html\"> часто 
применяется, "
-"чтобы заставить телефон передавать все 
разговоры, которые он слышит</a>."
-
-#. type: Content of: <ul><li><p>
-# | [-More about-]{+The back door+} <a
-# | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>the
-# | nature-]
-# | 
{+href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
-# | may take the form+} of [-this problem</a>.-] {+bugs that have gone 20
-# | years unfixed</a>.  The choice to leave the security holes in place is
-# | morally equivalent to writing a back door.+}
-#| msgid ""
-#| "More about <a href=\"http://www.osnews.com/story/27416/";
-#| "The_second_operating_system_hiding_in_every_mobile_phone\">the nature of "
-#| "this problem</a>."
+"В коммуникационном процессоре почти 
любого телефона есть универсальный "
+"черный ход, который <a 
href=\"https://www.schneier.com/blog/archives/2006/12/";
+"remotely_eavesd_1.html\"> часто применяется, чтобы 
заставить телефон "
+"передавать все разговоры, которые он 
слышит</a>."
+
+#. type: Content of: <ul><li><p>
 msgid ""
 "The back door <a href=\"http://www.osnews.com/story/27416/";
 "The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
@@ -291,9 +260,10 @@
 "security holes in place is morally equivalent to writing a back door."
 msgstr ""
 "Лазейка <a href=\"http://www.osnews.com/story/27416/";
-"The_second_operating_system_hiding_in_every_mobile_phone\">может 
принимать форму "
-"ошибок, которые остаются неисправленными 
по 20 лет</a>. Решение оставить "
-"прорехи в защите незаделанными 
нравственно эквивалентно написанию 
лазейки."
+"The_second_operating_system_hiding_in_every_mobile_phone\">может 
принимать "
+"форму ошибок, которые остаются 
неисправленными по 20 лет</a>. Решение "
+"оставить прорехи в защите незаделанными 
нравственно эквивалентно написанию "
+"лазейки."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -304,8 +274,8 @@
 msgstr ""
 "Лазейка находится в &ldquo;модемном 
процессоре&rdquo;, который отвечает за "
 "связь с радиосетью. В большинстве 
телефонов модемный процессор контролирует 
"
-"работу микрофона. В большинстве телефонов 
но может переписывать программы "
-"и в главном процессоре."
+"работу микрофона. В большинстве телефонов 
но может переписывать программы и "
+"в главном процессоре."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -314,23 +284,12 @@
 "main processor.  They still have the back door, but at least it is unable to "
 "turn the phone unto a listening device."
 msgstr ""
-"Есть модели телефонов, специально 
спроектированные, чтобы микрофон не 
контролировался "
-"модемным процессором и чтобы он не мог 
изменять программы в главном "
-"процессоре. Лазейка в них есть, но по 
крайней мере с ее помощью невозможно "
-"превратить телефон в подслушивающее 
устройство."
-
-#. type: Content of: <ul><li><p>
-# | [-Most mobile phones have this-]{+The+} universal back [-door, which has
-# | been-] {+door is apparently also+} used to {+make phones+} <a
-# | 
href=\"http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\";>
-# | [-turn them malicious</a>.-] {+transmit even when they are turned off</a>.
-# |  This means their movements are tracked, and may also make the listening
-# | feature work.+}
-#| msgid ""
-#| "Most mobile phones have this universal back door, which has been used to "
-#| "<a href=\"http://www.slate.com/blogs/future_tense/2013/07/22/";
-#| "nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
-#| "turn them malicious</a>."
+"Есть модели телефонов, специально 
спроектированные, чтобы микрофон не "
+"контролировался модемным процессором и 
чтобы он не мог изменять программы в "
+"главном процессоре. Лазейка в них есть, но 
по крайней мере с ее помощью "
+"невозможно превратить телефон в 
подслушивающее устройство."
+
+#. type: Content of: <ul><li><p>
 msgid ""
 "The universal back door is apparently also used to make phones <a href="
 "\"http://www.slate.com/blogs/future_tense/2013/07/22/";
@@ -338,11 +297,11 @@
 "transmit even when they are turned off</a>.  This means their movements are "
 "tracked, and may also make the listening feature work."
 msgstr ""
-"Универсальный черный ход, очевидно, 
применяется также, чтобы заставлять 
телефоны "
-"<a href=\"http://www.slate.com/blogs/future_tense/2013/07/22/";
+"Универсальный черный ход, очевидно, 
применяется также, чтобы заставлять "
+"телефоны <a 
href=\"http://www.slate.com/blogs/future_tense/2013/07/22/";
 "nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
-"передавать, даже когда они выключены</a>. 
Это значит, что их перемещения 
отслеживаются, "
-"а возможно, включается и прослушивание."
+"передавать, даже когда они выключены</a>. 
Это значит, что их перемещения "
+"отслеживаются, а возможно, включается и 
прослушивание."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -627,16 +586,6 @@
 "вообще)."
 
 #. type: Content of: <ul><li><p>
-# | In Android, <a
-# | 
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
-# | Google has a back door to remotely delete apps.</a> (It [-is-] {+was+} in
-# | a program called [-GTalkService).-] {+GTalkService, which seems since then
-# | to have been merged into Google Play.)+}
-#| msgid ""
-#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
-#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
-#| "has a back door to remotely delete apps.</a> (It is in a program called "
-#| "GTalkService)."
 msgid ""
 "In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
 "google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
@@ -645,32 +594,20 @@
 msgstr ""
 "В Android <a href=\"http://www.computerworld.com/article/2506557/security0/";
 "google-throws--kill-switch--on-android-phones.html\"> у Google есть 
черный "
-"ход для удаления программ по сети</a>. 
(Программа называлась "
-"GTalkService, но кажется, ее объединили с Google Play.)"
+"ход для удаления программ по сети</a>. 
(Программа называлась GTalkService, "
+"но кажется, ее объединили с Google Play.)"
 
 #. type: Content of: <ul><li><p>
-# | Google can also <a
-# | 
href=\"https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/\";>
-# | forcibly and remotely install apps</a> through [-GTalkService (which
-# | seems, since that article, to have been merged into Google Play).-]
-# | {+GTalkService.+}  This is not equivalent to a universal back door, but
-# | permits various dirty tricks.
-#| msgid ""
-#| "Google can also <a href=\"https://jon.oberheide.org/blog/2010/06/25/";
-#| "remote-kill-and-install-on-google-android/\"> forcibly and remotely "
-#| "install apps</a> through GTalkService (which seems, since that article, "
-#| "to have been merged into Google Play).  This is not equivalent to a "
-#| "universal back door, but permits various dirty tricks."
 msgid ""
 "Google can also <a href=\"https://jon.oberheide.org/blog/2010/06/25/remote-";
 "kill-and-install-on-google-android/\"> forcibly and remotely install apps</"
 "a> through GTalkService.  This is not equivalent to a universal back door, "
 "but permits various dirty tricks."
 msgstr ""
-"Google может также <a 
href=\"https://jon.oberheide.org/blog/2010/06/25/remote-";
-"kill-and-install-on-google-android/\"> принудительно 
устанавливать приложения по сети</"
-"a> через Google Play. Это не эквивалентно 
универсальной лазейке, но позволяет "
-"проделывать различные грязные трюки."
+"Google может также <a 
href=\"https://jon.oberheide.org/blog/2010/06/25/";
+"remote-kill-and-install-on-google-android/\"> принудительно 
устанавливать "
+"приложения по сети</a> через Google Play. Это не 
эквивалентно универсальной "
+"лазейке, но позволяет проделывать 
различные грязные трюки."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -893,8 +830,6 @@
 
 # type: Content of: <div><p>
 #. type: Content of: <div><p>
-# | Copyright &copy; 2014-201[-7-]{+8+} Free Software Foundation, Inc.
-#| msgid "Copyright &copy; 2014-2017 Free Software Foundation, Inc."
 msgid "Copyright &copy; 2014-2018 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014-2018 Free Software Foundation, Inc."
 

Index: proprietary/po/proprietary-subscriptions.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-subscriptions.fr-en.html 1 Jan 2018 17:34:55 
-0000       1.5
+++ proprietary/po/proprietary-subscriptions.fr-en.html 17 Jan 2018 17:02:53 
-0000      1.6
@@ -23,7 +23,13 @@
 malicious functionality.</p>
 
 <ul>
+<li><p>Microsoft Office forces
+      users <a 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
+      subscribe to Office 360 to be able to create/edit
+      documents</a>.</p>
+</li>
 <li>
+
 <p>Sony has brought back its robotic pet Aibo, this time <a
 
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
 with a universal back door, and tethered to a server that requires a
@@ -104,7 +110,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/01/01 17:34:55 $
+$Date: 2018/01/17 17:02:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-subscriptions.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-subscriptions.ru-en.html 1 Jan 2018 10:42:50 
-0000       1.4
+++ proprietary/po/proprietary-subscriptions.ru-en.html 17 Jan 2018 17:02:53 
-0000      1.5
@@ -23,7 +23,13 @@
 malicious functionality.</p>
 
 <ul>
+<li><p>Microsoft Office forces
+      users <a 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
+      subscribe to Office 360 to be able to create/edit
+      documents</a>.</p>
+</li>
 <li>
+
 <p>Sony has brought back its robotic pet Aibo, this time <a
 
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
 with a universal back door, and tethered to a server that requires a
@@ -104,7 +110,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/01/01 10:42:50 $
+$Date: 2018/01/17 17:02:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-subscriptions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/proprietary-subscriptions.ru.po      12 Jan 2018 12:24:53 
-0000      1.12
+++ proprietary/po/proprietary-subscriptions.ru.po      17 Jan 2018 17:02:53 
-0000      1.13
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-01-12 02:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -71,10 +70,10 @@
 "subscription-on-pcs-larger-tablets.html\">to subscribe to Office 360 to be "
 "able to create/edit documents</a>."
 msgstr ""
-"Microsoft Office принуждает пользователей <a 
href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">подписываться на 
Office 360, чтобы "
-"получить возможность редактировать 
документы</a>."
+"Microsoft Office принуждает пользователей <a 
href=\"https://www.";
+"computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"
+"require-office-365-subscription-on-pcs-larger-tablets.html\">подписываться
 "
+"на Office 360, чтобы получить возможность 
редактировать документы</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: proprietary/po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary/po/proprietary-surveillance.fr-en.html  3 Jan 2018 19:01:24 
-0000       1.98
+++ proprietary/po/proprietary-surveillance.fr-en.html  17 Jan 2018 17:02:53 
-0000      1.99
@@ -339,6 +339,39 @@
 
 <ul>
 <li>
+  <p>20 dishonest Android apps
+      recorded <a 
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts";>phone
+      calls and sent them and text messages and emails to
+      snoopers</a>.</p>
+
+  <p>Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps
+    after discovering what they did. So we cannot blame Google
+    specifically for the snooping of these apps.</p>
+
+  <p>On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their
+    being nonfree. It also distributes its own nonfree apps, such as
+    Google
+    Play, <a href="/philosophy/free-software-even-more-important.html">which
+      are malicious</a>.</p>
+
+  <p>Could Google have done a better job of preventing apps from
+    cheating?  There is no systematic way for Google, or Android
+    users, to inspect executable proprietary apps to see what they
+    do.</p>
+
+  <p>Google could demand the source code for these apps, and study the
+    source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.</p>
+
+  <p>But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.</p>
+</li>
+<li>
   <p>A
     <a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
       research paper</a> that investigated the privacy and security
@@ -1562,7 +1595,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/01/03 19:01:24 $
+$Date: 2018/01/17 17:02:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/proprietary-surveillance.it-diff.html        3 Jan 2018 
18:01:51 -0000       1.43
+++ proprietary/po/proprietary-surveillance.it-diff.html        17 Jan 2018 
17:02:53 -0000      1.44
@@ -356,7 +356,55 @@
 
 &lt;ul&gt;
 &lt;li&gt;
-  <span class="inserted"><ins><em>&lt;p&gt;A
+  <span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
+  proprietary</strong></del></span>
+  <span class="inserted"><ins><em>&lt;p&gt;20 dishonest</em></ins></span> 
Android apps <span class="removed"><del><strong>contained recognizable tracking 
libraries. For</strong></del></span>
+      <span class="inserted"><ins><em>recorded &lt;a 
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+      calls and sent them and text messages and emails to
+      snoopers&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Google did not intend to make these apps spy; on</em></ins></span> 
the <span class="removed"><del><strong>paid proprietary 
apps,</strong></del></span> <span 
class="inserted"><ins><em>contrary,</em></ins></span> it <span 
class="removed"><del><strong>was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis</strong></del></span>
+    <span class="inserted"><ins><em>worked in various ways to prevent that, 
and deleted these</em></ins></span> apps <span class="removed"><del><strong>as 
&ldquo;free&rdquo;,
+  but most</strong></del></span>
+    <span class="inserted"><ins><em>after discovering what they did. So we 
cannot blame Google
+    specifically for the snooping</em></ins></span> of <span 
class="removed"><del><strong>them are not</strong></del></span> <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
+
+  &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares</em></ins></span> in <span 
class="removed"><del><strong>fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement</strong></del></span> <span 
class="inserted"><ins><em>responsibility</em></ins></span> for <span 
class="removed"><del><strong>that word</strong></del></span> <span 
class="inserted"><ins><em>the injustice of their
+    being nonfree. It also distributes its own nonfree apps, such as
+    Google
+    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+      are malicious&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating?  There</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apps</strong></del></span> <span class="inserted"><ins><em>no 
systematic way</em></ins></span> for <span class="removed"><del><strong>BART
+    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With</strong></del></span> <span class="inserted"><ins><em>Google, 
or Android
+    users, to inspect executable proprietary apps to see what they
+    do.&lt;/p&gt;
+
+  &lt;p&gt;Google could demand the source code for these apps, and study the
+    source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
+
+  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;A
     &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
       research paper&lt;/a&gt; that investigated the privacy and security
     of 283 Android VPN apps concluded that &ldquo;in spite of the
@@ -403,7 +451,7 @@
       JavaScript injection for tracking and display ads.&lt;/dd&gt;
   &lt;/dl&gt;
 &lt;/li&gt;
-&lt;li&gt;</em></ins></span>
+&lt;li&gt;
   &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
   proprietary Android apps contained recognizable tracking libraries. For 
   the paid proprietary apps, it was only 60%.&lt;/p&gt;
@@ -420,7 +468,7 @@
   &lt;p&gt;Apps for BART
     &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
   &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
+  &lt;p&gt;With</em></ins></span> proprietary apps, one can only hope that 
they don't.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -524,11 +572,9 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
proposes</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The DMCA and the EU 
Copyright Directive make it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</em></ins></span> to <span class="removed"><del><strong>use it 
without having your fingerprints</strong></del></span> <span 
class="inserted"><ins><em>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The DMCA and the EU 
Copyright Directive make it &lt;a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
       would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -538,11 +584,11 @@
       doesn't really turn them off&lt;/a&gt;.
       A more advanced way really does turn them off&mdash;only until 5am.
       That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;/li&gt;</em></ins></span>
   
   &lt;li&gt;&lt;p&gt;Apple proposes
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints</em></ins></span>
+      &mdash; which would mean no way to use it without having your 
fingerprints
       taken. Users would have no way to tell whether the phone is snooping on
       them.&lt;/p&gt;&lt;/li&gt;
 
@@ -841,44 +887,46 @@
       weakness of the reject-it-if-you-dislike-snooping
       &ldquo;solution&rdquo; to surveillance: why should a flashlight
       app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;
+      app would <span class="removed"><del><strong>not.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
+
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInGames"&gt;Spyware</strong></del></span>
 <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Spyware</em></ins></span> in 
<span class="removed"><del><strong>Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;nVidia's proprietary 
GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about 
them</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage to spy through it too&lt;/a&gt;.
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and the NSA takes advantage to spy through it 
too&lt;/a&gt;.
       Here's information on
       &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>not.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul&gt;</strong></del></span>
+&lt;ul&gt;
 
   &lt;li&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;A remote-control sex toy was 
found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</em></ins></span>
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
       &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
       a speech recognition company based in the U.S.&lt;/p&gt;
@@ -934,26 +982,18 @@
 &lt;/ul&gt;
 
 
-&lt;!-- <span 
class="removed"><del><strong>#SpywareAtLowLevel</strong></del></span> <span 
class="inserted"><ins><em>#SpywareOnSmartWatches</em></ins></span> --&gt;
+&lt;!-- <span class="inserted"><ins><em>#SpywareOnSmartWatches --&gt;
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 <span class="removed"><del><strong>id="SpywareAtLowLevel"&gt;Spyware 
at Low Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnSmartWatches"&gt;Spyware on 
&ldquo;Smart&rdquo; Watches&lt;/h3&gt;</em></ins></span>
-  &lt;span <span 
class="removed"><del><strong>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-
-<span class="removed"><del><strong>&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;</strong></del></span>
-
 &lt;ul&gt;
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;
+  &lt;li&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed
       &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
        to report its location to someone else and to transmit
@@ -969,7 +1009,7 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!--</em></ins></span> #SpywareAtLowLevel --&gt;
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
@@ -986,7 +1026,7 @@
 
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;</em></ins></span>
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
 Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
 Note that the specific sabotage method Lenovo used did not affect
 GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
@@ -1290,36 +1330,35 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users are suing 
Bose</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li&gt;
-    &lt;p&gt;The driver</em></ins></span> for <span 
class="removed"><del><strong>&lt;a
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users are suing Bose for 
&lt;a
 
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing</strong></del></span> a <span 
class="removed"><del><strong>spyware app for its headphones&lt;/a&gt;.
-Specifically, the app would record the names of the audio 
files</strong></del></span> <span class="inserted"><ins><em>certain gaming 
keyboard &lt;a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information
+distributing a spyware app for its headphones&lt;/a&gt;.
+Specifically, the app would record the names of the audio files
+users listen to along with the headphone's unique serial number.
+&lt;/p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>suit accuses that this was 
done without the users' consent.
+If the fine print of the app said that users gave 
consent</strong></del></span> <span 
class="inserted"><ins><em>driver</em></ins></span> for <span 
class="removed"><del><strong>this,
+would that make it acceptable? No way! It should be flat 
out</strong></del></span> <span class="inserted"><ins><em>a certain gaming 
keyboard &lt;a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information
         to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</em></ins></span>
-      users <span class="removed"><del><strong>listen</strong></del></span> 
<span class="inserted"><ins><em>identify themselves and then sends personal 
data about them</em></ins></span> to <span class="removed"><del><strong>along 
with</strong></del></span>
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about 
them</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span>
       <span class="inserted"><ins><em>nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Angry Birds
       &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and</em></ins></span> the <span 
class="removed"><del><strong>headphone's unique serial number.
-&lt;/p&gt;
-
-&lt;p&gt;The suit accuses that this was done without the users' consent.
-If the fine print of the app said that users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>NSA 
takes advantage to spy through</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It should be flat 
out</strong></del></span> <span class="inserted"><ins><em>too&lt;/a&gt;.
-      Here's information on</em></ins></span>
-      &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal to design the</strong></del></span> <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      spies for companies, and</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>NSA takes advantage</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spy through 
it too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA</em></ins></span> app <span 
class="removed"><del><strong>to snoop at all&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Many 
@@ -1622,7 +1661,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/01/03 18:01:51 $
+$Date: 2018/01/17 17:02:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/proprietary-surveillance.ja-diff.html        3 Jan 2018 
18:01:51 -0000       1.54
+++ proprietary/po/proprietary-surveillance.ja-diff.html        17 Jan 2018 
17:02:53 -0000      1.55
@@ -355,38 +355,72 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% 
of</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular</strong></del></span>
 <span class="inserted"><ins><em>&lt;li&gt;
-  &lt;p&gt;A
-    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated</em></ins></span> the <span 
class="removed"><del><strong>most popular</strong></del></span> <span 
class="inserted"><ins><em>privacy and security
-    of 283</em></ins></span> Android <span 
class="inserted"><ins><em>VPN</em></ins></span> apps
-  <span class="removed"><del><strong>&lt;a 
href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral</strong></del></span> <span class="inserted"><ins><em>concluded 
that &ldquo;in spite of the
-    promises for privacy, security,</em></ins></span> and <span 
class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>anonymity given by the
-    majority of VPN apps&mdash;millions</em></ins></span> of <span 
class="removed"><del><strong>their</strong></del></span> users <span 
class="removed"><del><strong>with third parties.&lt;/p&gt;
+  &lt;p&gt;20 dishonest</em></ins></span> Android apps
+      <span class="inserted"><ins><em>recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span> <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+      calls</em></ins></span> and <span class="removed"><del><strong>location 
information&lt;/a&gt; of their users with third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>may be 
unawarely subject</em></ins></span>
-    to <span class="inserted"><ins><em>poor security guarantees and abusive 
practices inflicted by
-    VPN apps.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Following is a non-exhaustive list of proprietary VPN apps 
from</em></ins></span>
-    the <span class="removed"><del><strong>app's functionality,
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>sent them and 
text messages and emails</em></ins></span> to <span 
class="removed"><del><strong>the app's functionality,
   was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in</strong></del></span> <span class="inserted"><ins><em>research 
paper that tracks and infringes</em></ins></span> the <span 
class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
+  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should</strong></del></span>
+      <span class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Google did</em></ins></span> not <span 
class="removed"><del><strong>have described</strong></del></span> <span 
class="inserted"><ins><em>intend to make</em></ins></span> these apps <span 
class="removed"><del><strong>as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>spy; on the contrary, 
it
+    worked in various ways</em></ins></span> to <span 
class="removed"><del><strong>say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;The article should not have described these 
apps</strong></del></span> <span class="inserted"><ins><em>privacy of
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>prevent that, and deleted these apps
+    after discovering what they did. So we cannot blame Google
+    specifically</em></ins></span> for <span 
class="removed"><del><strong>granted that</strong></del></span> the <span 
class="removed"><del><strong>usual analytics tools</strong></del></span> <span 
class="inserted"><ins><em>snooping of these apps.&lt;/p&gt;
+
+  &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their
+    being nonfree. It also distributes its own nonfree apps, such as
+    Google
+    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</em></ins></span>
+      are
+  <span class="removed"><del><strong>legitimate, but is that valid?  Software 
developers</strong></del></span> <span 
class="inserted"><ins><em>malicious&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Could Google</em></ins></span> have <span 
class="inserted"><ins><em>done a better job of preventing apps from
+    cheating?  There is</em></ins></span> no <span 
class="removed"><del><strong>right to
+  analyze what users are doing</strong></del></span> <span 
class="inserted"><ins><em>systematic way for Google, or Android
+    users, to inspect executable proprietary apps to see what they
+    do.&lt;/p&gt;
+
+  &lt;p&gt;Google could demand the source code for these apps, and study the
+    source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
+
+  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;A
+    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated the privacy and security
+    of 283 Android VPN apps concluded that &ldquo;in spite of the
+    promises for privacy, security, and anonymity given by the
+    majority of VPN apps&mdash;millions of users may be unawarely subject
+    to poor security guarantees and abusive practices inflicted by
+    VPN apps.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Following is a non-exhaustive list of proprietary VPN apps from
+    the research paper that tracks and infringes the privacy of
     users:&lt;/p&gt;
 
   &lt;dl&gt;
     &lt;dt&gt;SurfEasy&lt;/dt&gt;
-    &lt;dd&gt;Includes tracking libraries such</em></ins></span> as
-  <span class="removed"><del><strong>&ldquo;free&rdquo;&mdash;they are not 
free software.  The clear way</strong></del></span> <span 
class="inserted"><ins><em>NativeX and Appflood,
-      meant</em></ins></span> to <span class="removed"><del><strong>say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes for granted that</strong></del></span> <span 
class="inserted"><ins><em>track users and show them targeted ads.&lt;/dd&gt;
+    &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.&lt;/dd&gt;
 
     &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
     &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
@@ -394,14 +428,12 @@
       users' text messages.&lt;/dd&gt;
 
     &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
-  legitimate, but is that valid?  Software</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to read 
logs
-      for other apps and also core system logs. TigerVPN</em></ins></span> 
developers
-      have <span class="removed"><del><strong>no right</strong></del></span> 
<span class="inserted"><ins><em>confirmed this.&lt;/dd&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps and also core system logs. TigerVPN developers
+      have confirmed this.&lt;/dd&gt;
 
     &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic</em></ins></span> to
-  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that</strong></del></span> <span 
class="inserted"><ins><em>LinkedIn. Also, it stores detailed logs
+    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
       and may turn them over to the UK government if
       requested.&lt;/dd&gt;
 
@@ -498,7 +530,7 @@
 
   &lt;p&gt;The article takes for granted that the usual analytics tools are
   legitimate, but is that valid?  Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools 
that</em></ins></span> snoop are
+  analyze what users are doing</em></ins></span> or how.  
&ldquo;Analytics&rdquo; tools that snoop are
   just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
@@ -1647,7 +1679,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/01/03 18:01:51 $
+$Date: 2018/01/17 17:02:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/proprietary-surveillance.ru-en.html  3 Jan 2018 19:01:24 
-0000       1.103
+++ proprietary/po/proprietary-surveillance.ru-en.html  17 Jan 2018 17:02:53 
-0000      1.104
@@ -339,6 +339,39 @@
 
 <ul>
 <li>
+  <p>20 dishonest Android apps
+      recorded <a 
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts";>phone
+      calls and sent them and text messages and emails to
+      snoopers</a>.</p>
+
+  <p>Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps
+    after discovering what they did. So we cannot blame Google
+    specifically for the snooping of these apps.</p>
+
+  <p>On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their
+    being nonfree. It also distributes its own nonfree apps, such as
+    Google
+    Play, <a href="/philosophy/free-software-even-more-important.html">which
+      are malicious</a>.</p>
+
+  <p>Could Google have done a better job of preventing apps from
+    cheating?  There is no systematic way for Google, or Android
+    users, to inspect executable proprietary apps to see what they
+    do.</p>
+
+  <p>Google could demand the source code for these apps, and study the
+    source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.</p>
+
+  <p>But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.</p>
+</li>
+<li>
   <p>A
     <a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
       research paper</a> that investigated the privacy and security
@@ -1562,7 +1595,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/01/03 19:01:24 $
+$Date: 2018/01/17 17:02:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- proprietary/po/proprietary-surveillance.ru.po       17 Jan 2018 15:04:14 
-0000      1.332
+++ proprietary/po/proprietary-surveillance.ru.po       17 Jan 2018 17:02:53 
-0000      1.333
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-01-17 13:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -691,8 +690,9 @@
 msgstr ""
 "20 нечестных приложений Android <a 
href=\"https://arstechnica.com/";
 "information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-"
-"stole-e-mails-and-texts\">записывали телефонные 
звонки и отправляли их в виде "
-"текстовых сообщений и электронной почты 
тем, кто следит за пользователями</a>."
+"stole-e-mails-and-texts\">записывали телефонные 
звонки и отправляли их в "
+"виде текстовых сообщений и электронной 
почты тем, кто следит за "
+"пользователями</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -702,9 +702,9 @@
 "apps."
 msgstr ""
 "Компания Google не нарочно сделала, чтобы эти 
приложения шпионили; напротив, "
-"она принимала различные меры, чтобы 
предотвратить это, и удалила эти 
приложения, "
-"когда выяснилось, что они делают. Так что 
мы не можем обвинять Google в том, "
-"что эти приложения шпионили."
+"она принимала различные меры, чтобы 
предотвратить это, и удалила эти "
+"приложения, когда выяснилось, что они 
делают. Так что мы не можем обвинять "
+"Google в том, что эти приложения шпионили."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -714,10 +714,10 @@
 "philosophy/free-software-even-more-important.html\">which are malicious</a>."
 msgstr ""
 "С другой стороны, Google перераспространяет 
несвободные приложения Android, "
-"а стало быть, разделяет ответственность 
за несправедливость, состоящую в том, "
-"что они несвободны. Компания 
распространяет также свои собственные 
несвободные "
-"приложения, такие как Google Play, <a href=\"/"
-"philosophy/free-software-even-more-important.html\">которые 
злонамеренны</a>."
+"а стало быть, разделяет ответственность 
за несправедливость, состоящую в "
+"том, что они несвободны. Компания 
распространяет также свои собственные "
+"несвободные приложения, такие как Google Play, 
<a href=\"/philosophy/free-"
+"software-even-more-important.html\">которые 
злонамеренны</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -725,10 +725,10 @@
 "is no systematic way for Google, or Android users, to inspect executable "
 "proprietary apps to see what they do."
 msgstr ""
-"Могла ли компания Google предотвращать 
жульничество со стороны приложений более "
-"тщательно? Ни для Google, ни для 
пользователей Android не существует "
-"систематического способа инспектировать 
исполняемые файлы несвободных приложений, "
-"чтобы понять, что они делают."
+"Могла ли компания Google предотвращать 
жульничество со стороны приложений "
+"более тщательно? Ни для Google, ни для 
пользователей Android не существует "
+"систематического способа инспектировать 
исполняемые файлы несвободных "
+"приложений, чтобы понять, что они делают."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -737,8 +737,8 @@
 "did a good job of this, it could more or less prevent such snooping, except "
 "when the app developers are clever enough to outsmart the checking."
 msgstr ""
-"В Google могли бы требовать исходный текст 
этих приложений и изучать "
-"каким-то образом исходный текст, чтобы 
определять, не делают ли они пользователям "
+"В Google могли бы требовать исходный текст 
этих приложений и изучать каким-"
+"то образом исходный текст, чтобы 
определять, не делают ли они пользователям "
 "что-то плохое. Если бы компания делала это 
хорошо, она могла бы более или "
 "менее предотвращать такое подглядывание, 
кроме случаев, когда разработчики "
 "приложения достаточно умны, чтобы перех
итрить проверку."

Index: proprietary/po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary.es-en.html       5 Nov 2017 11:59:12 -0000       
1.17
+++ proprietary/po/proprietary.es-en.html       17 Jan 2018 17:02:53 -0000      
1.18
@@ -56,7 +56,6 @@
   <li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
   <li><a href="/proprietary/malware-amazon.html">Amazon Malware</a></li>
   <li><a href="/proprietary/malware-webpages.html">Malware in webpages</a></li>
-  <li><a href="/proprietary/malware-phones.html">Malware in phones</a></li>
   <li><a href="/proprietary/malware-mobiles.html">Malware in mobile 
devices</a></li>
   <li><a href="/proprietary/malware-games.html">Malware in games</a></li>
   <li><a href="/proprietary/malware-appliances.html">Malware in 
appliances</a></li>
@@ -145,7 +144,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software 
Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -155,7 +154,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/11/05 11:59:12 $
+$Date: 2018/01/17 17:02:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary/po/proprietary.es.po    14 Jan 2018 10:46:03 -0000      1.46
+++ proprietary/po/proprietary.es.po    17 Jan 2018 17:02:53 -0000      1.47
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-01-13 15:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -316,12 +315,7 @@
 "información sobre la coordinación y el envío de traducciones de las 
páginas "
 "de este sitio web."
 
-# | Copyright &copy; 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018+} Free
-# | Software Foundation, Inc.
 #. type: Content of: <div><p>
-#| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
-#| "Inc."
 msgid ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 "Foundation, Inc."

Index: proprietary/po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary.fr-en.html       5 Nov 2017 10:59:17 -0000       
1.23
+++ proprietary/po/proprietary.fr-en.html       17 Jan 2018 17:02:53 -0000      
1.24
@@ -56,7 +56,6 @@
   <li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
   <li><a href="/proprietary/malware-amazon.html">Amazon Malware</a></li>
   <li><a href="/proprietary/malware-webpages.html">Malware in webpages</a></li>
-  <li><a href="/proprietary/malware-phones.html">Malware in phones</a></li>
   <li><a href="/proprietary/malware-mobiles.html">Malware in mobile 
devices</a></li>
   <li><a href="/proprietary/malware-games.html">Malware in games</a></li>
   <li><a href="/proprietary/malware-appliances.html">Malware in 
appliances</a></li>
@@ -145,7 +144,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software 
Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -155,7 +154,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/11/05 10:59:17 $
+$Date: 2018/01/17 17:02:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary.ja-diff.html     4 Nov 2017 14:29:13 -0000       
1.8
+++ proprietary/po/proprietary.ja-diff.html     17 Jan 2018 17:02:53 -0000      
1.9
@@ -74,7 +74,6 @@
   &lt;li&gt;&lt;a</em></ins></span> 
href="/proprietary/malware-adobe.html"&gt;Adobe Malware&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="/proprietary/malware-webpages.html"&gt;Malware in 
webpages&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-phones.html"&gt;Malware in 
phones&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a</em></ins></span> 
href="/proprietary/malware-mobiles.html"&gt;Malware in mobile 
devices&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html"&gt;Malware
 in the Amazon
       Swindle&lt;/a&gt;&lt;/li&gt;
@@ -166,7 +165,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -176,7 +175,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/11/04 14:29:13 $
+$Date: 2018/01/17 17:02:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary.pl-diff.html     4 Nov 2017 14:29:13 -0000       
1.24
+++ proprietary/po/proprietary.pl-diff.html     17 Jan 2018 17:02:53 -0000      
1.25
@@ -71,13 +71,12 @@
   &lt;li&gt;&lt;strong&gt;Company</strong></del></span>
 <span class="inserted"><ins><em>&lt;h3&gt;Company</em></ins></span> or type of 
<span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>product&lt;/h3&gt;
 &lt;ul&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft 
Malware&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/malware-apple.html"&gt;Apple</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google</em></ins></span>
 Malware&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/malware-microsoft.html"&gt;Microsoft</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe</em></ins></span>
 Malware&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/malware-mobiles.html"&gt;Malware</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/malware-apple.html"&gt;Apple</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft</em></ins></span>
 Malware&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/malware-microsoft.html"&gt;Microsoft</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google</em></ins></span>
 Malware&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/malware-mobiles.html"&gt;Malware</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="/proprietary/malware-webpages.html"&gt;Malware in 
webpages&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-phones.html"&gt;Malware in 
phones&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Malware</em></ins></span> in mobile 
devices&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/malware-kindle-swindle.html"&gt;Malware</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Malware</em></ins></span>
 in <span class="removed"><del><strong>the Amazon
   Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>games&lt;/a&gt;&lt;/li&gt;
@@ -168,7 +167,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2016, 2017</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2014, <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2016, 2017, 2018</em></ins></span> Free 
Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -178,7 +177,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/11/04 14:29:13 $
+$Date: 2018/01/17 17:02:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary.ru-en.html       7 Nov 2017 09:33:15 -0000       
1.22
+++ proprietary/po/proprietary.ru-en.html       17 Jan 2018 17:02:53 -0000      
1.23
@@ -56,7 +56,6 @@
   <li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
   <li><a href="/proprietary/malware-amazon.html">Amazon Malware</a></li>
   <li><a href="/proprietary/malware-webpages.html">Malware in webpages</a></li>
-  <li><a href="/proprietary/malware-phones.html">Malware in phones</a></li>
   <li><a href="/proprietary/malware-mobiles.html">Malware in mobile 
devices</a></li>
   <li><a href="/proprietary/malware-games.html">Malware in games</a></li>
   <li><a href="/proprietary/malware-appliances.html">Malware in 
appliances</a></li>
@@ -145,7 +144,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software 
Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -155,7 +154,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/11/07 09:33:15 $
+$Date: 2018/01/17 17:02:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/po/proprietary.ru.po    13 Jan 2018 16:20:09 -0000      1.63
+++ proprietary/po/proprietary.ru.po    17 Jan 2018 17:02:53 -0000      1.64
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-01-13 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -310,16 +309,12 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018+} Free
-# | Software Foundation, Inc.
-#| msgid ""
-#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
-#| "Inc."
 msgid ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 "Foundation, Inc."
 msgstr ""
-"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc."
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""

Index: server/sitemap.ar.html
===================================================================
RCS file: /web/www/www/server/sitemap.ar.html,v
retrieving revision 1.247
retrieving revision 1.248
diff -u -b -r1.247 -r1.248
--- server/sitemap.ar.html      10 Jan 2018 18:02:40 -0000      1.247
+++ server/sitemap.ar.html      17 Jan 2018 17:02:53 -0000      1.248
@@ -1752,8 +1752,6 @@
   <dd>Microsoft's Software is Malware</dd>
   <dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
   <dd>Malware in Mobile Devices</dd>
-  <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
-  <dd>Mobile Phones Trash Users' Freedom</dd>
   <dt><a 
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
   <dd>Malware in Webpages</dd>
   <dt><a 
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2108,7 +2106,7 @@
 <p class="unprintable"><!-- timestamp start -->
 حُدثت:
 
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
 
 <!-- timestamp end -->
 </p>

Index: server/sitemap.de.html
===================================================================
RCS file: /web/www/www/server/sitemap.de.html,v
retrieving revision 1.327
retrieving revision 1.328
diff -u -b -r1.327 -r1.328
--- server/sitemap.de.html      10 Jan 2018 18:02:40 -0000      1.327
+++ server/sitemap.de.html      17 Jan 2018 17:02:53 -0000      1.328
@@ -1768,8 +1768,6 @@
   <dd>Microsofts Software ist Schadsoftware</dd>
   <dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
   <dd>Schadprogramme auf mobilen Geräten</dd>
-  <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
-  <dd>Mobiltelefone zerstören die Freiheit</dd>
   <dt><a 
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
   <dd>Schadsoftware in Internetpräsenzen</dd>
   <dt><a 
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2124,7 +2122,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
 
 <!-- timestamp end -->
 </p>

Index: server/sitemap.es.html
===================================================================
RCS file: /web/www/www/server/sitemap.es.html,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- server/sitemap.es.html      10 Jan 2018 18:02:40 -0000      1.190
+++ server/sitemap.es.html      17 Jan 2018 17:02:53 -0000      1.191
@@ -1760,8 +1760,6 @@
   <dd>El software de Microsoft es <cite>malware</cite></dd>
   <dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
   <dd><cite>Malware</cite> en los dispositivos móbiles</dd>
-  <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
-  <dd>Mobile Phones Trash Users' Freedom</dd>
   <dt><a 
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
   <dd><cite>Malware</cite> en las páginas web</dd>
   <dt><a 
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2114,7 +2112,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
 
 <!-- timestamp end -->
 </p>

Index: server/sitemap.fr.html
===================================================================
RCS file: /web/www/www/server/sitemap.fr.html,v
retrieving revision 1.373
retrieving revision 1.374
diff -u -b -r1.373 -r1.374
--- server/sitemap.fr.html      10 Jan 2018 18:02:40 -0000      1.373
+++ server/sitemap.fr.html      17 Jan 2018 17:02:53 -0000      1.374
@@ -1781,8 +1781,6 @@
   <dd>Malveillance des logiciels Microsoft</dd>
   <dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
   <dd>Malveillance des appareils mobiles</dd>
-  <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
-  <dd>Les téléphones mobiles piétinent les libertés des utilisateurs</dd>
   <dt><a 
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
   <dd>Malveillance des pages web</dd>
   <dt><a 
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2140,7 +2138,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
 
 <!-- timestamp end -->
 </p>

Index: server/sitemap.it.html
===================================================================
RCS file: /web/www/www/server/sitemap.it.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- server/sitemap.it.html      10 Jan 2018 18:02:40 -0000      1.106
+++ server/sitemap.it.html      17 Jan 2018 17:02:53 -0000      1.107
@@ -1758,8 +1758,6 @@
   <dd>Microsoft's Software is Malware</dd>
   <dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
   <dd>Malware in Mobile Devices</dd>
-  <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
-  <dd>Mobile Phones Trash Users' Freedom</dd>
   <dt><a 
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
   <dd>Malware in Webpages</dd>
   <dt><a 
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2112,7 +2110,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
 
 <!-- timestamp end -->
 </p>

Index: server/sitemap.ja.html
===================================================================
RCS file: /web/www/www/server/sitemap.ja.html,v
retrieving revision 1.323
retrieving revision 1.324
diff -u -b -r1.323 -r1.324
--- server/sitemap.ja.html      10 Jan 2018 18:02:40 -0000      1.323
+++ server/sitemap.ja.html      17 Jan 2018 17:02:53 -0000      1.324
@@ -1725,8 +1725,6 @@
   <dd>マイクロソフトのソフトウェアはマルウェアだ</dd>
   <dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
   <dd>モバイル・デバイスのマルウェア</dd>
-  <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
-  <dd>Mobile Phones Trash Users' Freedom</dd>
   <dt><a 
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
   <dd>Malware in Webpages</dd>
   <dt><a 
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2071,7 +2069,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
 
 <!-- timestamp end -->
 </p>

Index: server/sitemap.nl.html
===================================================================
RCS file: /web/www/www/server/sitemap.nl.html,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- server/sitemap.nl.html      10 Jan 2018 18:02:40 -0000      1.248
+++ server/sitemap.nl.html      17 Jan 2018 17:02:53 -0000      1.249
@@ -1756,8 +1756,6 @@
   <dd>Microsoft's Software is Malware</dd>
   <dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
   <dd>Malware in Mobile Devices</dd>
-  <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
-  <dd>Mobile Phones Trash Users' Freedom</dd>
   <dt><a 
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
   <dd>Malware in Webpages</dd>
   <dt><a 
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2106,7 +2104,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Bijgewerkt:
 
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
 
 <!-- timestamp end -->
 </p>

Index: server/sitemap.ro.html
===================================================================
RCS file: /web/www/www/server/sitemap.ro.html,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- server/sitemap.ro.html      10 Jan 2018 18:02:40 -0000      1.229
+++ server/sitemap.ro.html      17 Jan 2018 17:02:53 -0000      1.230
@@ -1756,8 +1756,6 @@
   <dd>Microsoft's Software is Malware</dd>
   <dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
   <dd>Malware in Mobile Devices</dd>
-  <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
-  <dd>Mobile Phones Trash Users' Freedom</dd>
   <dt><a 
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
   <dd>Malware in Webpages</dd>
   <dt><a 
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2108,7 +2106,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Actualizată:
 
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
 
 <!-- timestamp end -->
 </p>

Index: server/sitemap.ru.html
===================================================================
RCS file: /web/www/www/server/sitemap.ru.html,v
retrieving revision 1.318
retrieving revision 1.319
diff -u -b -r1.318 -r1.319
--- server/sitemap.ru.html      11 Jan 2018 09:33:00 -0000      1.318
+++ server/sitemap.ru.html      17 Jan 2018 17:02:53 -0000      1.319
@@ -1773,8 +1773,6 @@
   <dd>Программы Microsoft вредоносны</dd>
   <dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
   <dd>Вредоносные программы в мобильных 
устройствах</dd>
-  <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
-  <dd>Мобильные телефоны плюют на свободу 
пользователелей</dd>
   <dt><a 
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
   <dd>Вредоносные программы на страницах 
сайтов</dd>
   <dt><a 
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2129,7 +2127,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/01/11 09:33:00 $
+$Date: 2018/01/17 17:02:53 $
 
 <!-- timestamp end -->
 </p>

Index: server/sitemap.sq.html
===================================================================
RCS file: /web/www/www/server/sitemap.sq.html,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- server/sitemap.sq.html      10 Jan 2018 18:02:40 -0000      1.237
+++ server/sitemap.sq.html      17 Jan 2018 17:02:54 -0000      1.238
@@ -1768,8 +1768,6 @@
   <dd>Software Microsoft  është Malware</dd>
   <dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
   <dd>Malware në Pajisje Celulare</dd>
-  <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
-  <dd>Mobile Phones Trash Users' Freedom</dd>
   <dt><a 
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
   <dd>Malware in Webpages</dd>
   <dt><a 
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2120,7 +2118,7 @@
 <p class="unprintable"><!-- timestamp start -->
 U përditësua më:
 
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:54 $
 
 <!-- timestamp end -->
 </p>

Index: server/sitemap.uk.html
===================================================================
RCS file: /web/www/www/server/sitemap.uk.html,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- server/sitemap.uk.html      10 Jan 2018 18:02:40 -0000      1.277
+++ server/sitemap.uk.html      17 Jan 2018 17:02:54 -0000      1.278
@@ -1767,8 +1767,6 @@
   <dd>Програми Microsoft шкідливі</dd>
   <dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
   <dd>Шкідливі програми в мобільних 
пристроях</dd>
-  <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
-  <dd>Mobile Phones Trash Users' Freedom</dd>
   <dt><a 
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
   <dd>Malware in Webpages</dd>
   <dt><a 
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2118,7 +2116,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Оновлено:
 
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:54 $
 
 <!-- timestamp end -->
 </p>

Index: server/po/sitemap.fr-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.fr-en.html,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- server/po/sitemap.fr-en.html        11 Jan 2018 11:32:10 -0000      1.229
+++ server/po/sitemap.fr-en.html        17 Jan 2018 17:02:54 -0000      1.230
@@ -1652,8 +1652,6 @@
   <dd>Microsoft's Software is Malware</dd>
   <dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
   <dd>Malware in Mobile Devices</dd>
-  <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
-  <dd>Mobile Phones Trash Users' Freedom</dd>
   <dt><a 
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
   <dd>Malware in Webpages</dd>
   <dt><a 
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -1979,7 +1977,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/01/11 11:32:10 $
+$Date: 2018/01/17 17:02:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/po/sitemap.ja.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.ja.po,v
retrieving revision 1.334
retrieving revision 1.335
diff -u -b -r1.334 -r1.335
--- server/po/sitemap.ja.po     13 Jan 2018 18:01:10 -0000      1.334
+++ server/po/sitemap.ja.po     17 Jan 2018 17:02:54 -0000      1.335
@@ -6616,11 +6616,6 @@
 #~ msgstr ""
 #~ "<a href=\"/proprietary/malware-phones.html\">malware-phones.html</a>"
 
-#, fuzzy
-#~| msgid "Android and Users' Freedom"
-#~ msgid "Mobile Phones Trash Users' Freedom"
-#~ msgstr "アンドロイドと利用者の自由"
-
 #~ msgid ""
 #~ "<a href=\"/graphics/skwid-gnu-flat-design.html\">skwid-gnu-flat-design."
 #~ "html</a>"

Index: server/po/sitemap.ru-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.ru-en.html,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- server/po/sitemap.ru-en.html        11 Jan 2018 09:33:00 -0000      1.191
+++ server/po/sitemap.ru-en.html        17 Jan 2018 17:02:54 -0000      1.192
@@ -1652,8 +1652,6 @@
   <dd>Microsoft's Software is Malware</dd>
   <dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
   <dd>Malware in Mobile Devices</dd>
-  <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
-  <dd>Mobile Phones Trash Users' Freedom</dd>
   <dt><a 
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
   <dd>Malware in Webpages</dd>
   <dt><a 
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -1979,7 +1977,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/01/11 09:33:00 $
+$Date: 2018/01/17 17:02:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/po/sitemap.sq.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.sq.po,v
retrieving revision 1.269
retrieving revision 1.270
diff -u -b -r1.269 -r1.270
--- server/po/sitemap.sq.po     13 Jan 2018 18:01:10 -0000      1.269
+++ server/po/sitemap.sq.po     17 Jan 2018 17:02:54 -0000      1.270
@@ -6714,12 +6714,6 @@
 #~ msgstr ""
 #~ "<a href=\"/proprietary/malware-phones.html\">malware-phones.html</a>"
 
-# type: Content of: <ul><li><ul><li>
-#, fuzzy
-#~| msgid "Android and Users' Freedom"
-#~ msgid "Mobile Phones Trash Users' Freedom"
-#~ msgstr "Android-i dhe Liria e Përdoruesit"
-
 #~ msgid ""
 #~ "<a href=\"/graphics/skwid-gnu-flat-design.html\">skwid-gnu-flat-design."
 #~ "html</a>"

Index: server/po/sitemap.uk.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.uk.po,v
retrieving revision 1.317
retrieving revision 1.318
diff -u -b -r1.317 -r1.318
--- server/po/sitemap.uk.po     13 Jan 2018 18:01:10 -0000      1.317
+++ server/po/sitemap.uk.po     17 Jan 2018 17:02:54 -0000      1.318
@@ -6699,11 +6699,6 @@
 #~ msgstr ""
 #~ "<a href=\"/proprietary/malware-phones.html\">malware-phones.html</a>"
 
-#, fuzzy
-#~| msgid "Android and Users' Freedom"
-#~ msgid "Mobile Phones Trash Users' Freedom"
-#~ msgstr "Андроїд і свобода користувачів"
-
 #~ msgid ""
 #~ "<a href=\"/graphics/skwid-gnu-flat-design.html\">skwid-gnu-flat-design."
 #~ "html</a>"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]