[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po proprietary-surveillance.de....
From: |
GNUN |
Subject: |
www/proprietary/po proprietary-surveillance.de.... |
Date: |
Thu, 25 Jan 2018 13:30:42 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/01/25 13:30:42
Modified files:
proprietary/po : proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.264&r2=1.265
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.333&r2=1.334
Patches:
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary-surveillance.de.po 19 Jan 2018 14:05:19 -0000 1.197
+++ proprietary-surveillance.de.po 25 Jan 2018 18:30:40 -0000 1.198
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-01-17 13:56+0000\n"
+"POT-Creation-Date: 2018-01-25 18:26+0000\n"
"PO-Revision-Date: 2018-01-18 22:00+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-01-25 18:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -182,7 +183,10 @@
msgstr "<a href=\"#SpywareInChrome\">⦠in Chrome</a>"
#. type: Content of: <div><div><ul><li><ul><li>
-msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+# | <a href=\"#SpywareInFlash\">Spyware in {+JavaScript and+} Flash</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+msgid "<a href=\"#SpywareInFlash\">Spyware in JavaScript and Flash</a>"
msgstr "<a href=\"#SpywareInFlash\">⦠in Flash</a>"
#. type: Content of: <div><div><ul><li>
@@ -2944,57 +2948,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Some JavaScript malware <a href=\"https://www.theverge."
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\"> swipes usernames from browser-based password managers</a>."
-msgstr ""
-"Einige JavaScript-Schadprogramme <a href=\"https://www.theverge."
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\" title=\"Ad targeters are pulling data from your browserâs password "
-"manager, unter: https://www.theverge.com/2017/12/30/16829804/browser-"
-"password-manager-adthink-princeton-research The Verge 2017.\">greifen "
-"Benutzernamen von browserbasierten Passwort-Managern ab</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some websites send JavaScript code to collect all the user's input, <a href="
-"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-"
-"personal-data-by-session-replay-scripts/\">which can then be used to "
-"reproduce the whole session</a>."
-msgstr ""
-"Einige Präsenzen senden JavaScript-Code um alle Benutzereingaben zu sammeln.
"
-"<a href=\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-"
-"exfiltration-of-personal-data-by-session-replay-scripts/\" title=\"No "
-"boundaries: Exfiltration of personal data by session-replay scripts, unter: "
-"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-"
-"personal-data-by-session-replay-scripts/ 2017.\">die dann zum Reproduzieren "
-"der gesamten Sitzung verwendet werden können</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious JavaScript code."
-msgstr "Mit <b>LibreJS</b> wird dieses schädliche JavaScript blockiert."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-"
-"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
-"information that users have typed into a form but not sent</a>, in order to "
-"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/"
-"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
-"Allege\"> getting sued</a> for this."
-msgstr ""
-"Viele Internetpräsenzen schleusen JavaScript-Code ein um <a href=\"https://"
-"gizmodo.com/before-you-hit-submit-this-company-has-already-"
-"logge-1795906081\" title=\"Before You Hit âSubmitâ, This Company Has
Already "
-"Logged Your Personal Data, Gizmodoo 2017.\">vom Nutzer eingegebene "
-"Informationen in Formularen auszuspionieren, die noch nicht abgesendet sind</"
-"a>, um mehr über deren Identität zu erfahren. Einige wurden <a href="
-"\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-"
-"Illegally-Tracked-Consumers-New-Suits-Allege\" title=\"Sites Illegally "
-"Tracked Consumers New Suits Allege, Manatt 2017.\">nun verklagt</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"When a page uses Disqus for comments, <a href=\"https://blog.dantup."
"com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-"
"sends-the-url-to-facebook\">the proprietary Disqus software loads a Facebook "
@@ -3110,6 +3063,102 @@
"[9]</a>"
#. type: Content of: <div><h4>
+# | Spyware in {+JavaScript and+} Flash
+#, fuzzy
+#| msgid "Spyware in Flash"
+msgid "Spyware in JavaScript and Flash"
+msgstr "Spionageprogramme in Flash<ins>-Animationen</ins>"
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+msgstr " "
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a href=\"https://www.theverge."
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> swipes usernames from browser-based password managers</a>."
+msgstr ""
+"Einige JavaScript-Schadprogramme <a href=\"https://www.theverge."
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\" title=\"Ad targeters are pulling data from your browserâs password "
+"manager, unter: https://www.theverge.com/2017/12/30/16829804/browser-"
+"password-manager-adthink-princeton-research The Verge 2017.\">greifen "
+"Benutzernamen von browserbasierten Passwort-Managern ab</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some websites send JavaScript code to collect all the user's input, <a href="
+"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-"
+"personal-data-by-session-replay-scripts/\">which can then be used to "
+"reproduce the whole session</a>."
+msgstr ""
+"Einige Präsenzen senden JavaScript-Code um alle Benutzereingaben zu sammeln.
"
+"<a href=\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-"
+"exfiltration-of-personal-data-by-session-replay-scripts/\" title=\"No "
+"boundaries: Exfiltration of personal data by session-replay scripts, unter: "
+"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-"
+"personal-data-by-session-replay-scripts/ 2017.\">die dann zum Reproduzieren "
+"der gesamten Sitzung verwendet werden können</a>."
+
+#. type: Content of: <ul><li><p>
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
+msgstr "Mit <b>LibreJS</b> wird dieses schädliche JavaScript blockiert."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-"
+"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
+"information that users have typed into a form but not sent</a>, in order to "
+"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/"
+"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
+"Allege\"> getting sued</a> for this."
+msgstr ""
+"Viele Internetpräsenzen schleusen JavaScript-Code ein um <a href=\"https://"
+"gizmodo.com/before-you-hit-submit-this-company-has-already-"
+"logge-1795906081\" title=\"Before You Hit âSubmitâ, This Company Has
Already "
+"Logged Your Personal Data, Gizmodoo 2017.\">vom Nutzer eingegebene "
+"Informationen in Formularen auszuspionieren, die noch nicht abgesendet sind</"
+"a>, um mehr über deren Identität zu erfahren. Einige wurden <a href="
+"\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-"
+"Illegally-Tracked-Consumers-New-Suits-Allege\" title=\"Sites Illegally "
+"Tracked Consumers New Suits Allege, Manatt 2017.\">nun verklagt</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-"
+"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
+"a>."
+msgstr ""
+"Flash Player-Funktion hilft <a href=\"//www.imasuper.com/66/technology/flash-"
+"cookies-the-silent-privacy-killer/\" title=\"Flash Cookies: The Silent "
+"Privacy Killer, unter: imasuper.com 2008.\">Besucher von Internetpräsenzen "
+"mittels Flash-Cookie zu verfolgen</a>."
+
+#. type: Content of: <ul><li><p>
+# | Flash [-is-] {+and JavaScript are+} also used for <a
+# |
href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\">
+# | “fingerprinting” devices[- -]</a> to identify users.
+#, fuzzy
+#| msgid ""
+#| "Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/"
+#| "top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> "
+#| "“fingerprinting” devices </a> to identify users."
+msgid ""
+"Flash and JavaScript are also used for <a href=\"http://arstechnica.com/"
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> “fingerprinting” devices</a> to identify "
+"users."
+msgstr ""
+"Flash wird ebenso für <a
href=\"//arstechnica.com/security/2013/10/top-sites-"
+"and-maybe-the-nsa-track-users-with-device-fingerprinting/\" title=\"Top "
+"sites (and maybe the NSA) track users with âdevice fingerprintingâ,
unter: "
+"arstechnica.com 2013.\">âFingerabdruckâ-Geräte</a> zur Identifizierung
von "
+"Nutzern verwendet."
+
+#. type: Content of: <div><h4>
msgid "Spyware in Chrome"
msgstr "Spionageprogramme in Chrome"
@@ -3163,47 +3212,6 @@
"labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
"\">Browserverlauf total auszuschnüffeln</a>. Und viele tun dies auch."
-#. type: Content of: <div><h4>
-msgid "Spyware in Flash"
-msgstr "Spionageprogramme in Flash<ins>-Animationen</ins>"
-
-#. type: Content of: <div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-msgstr " "
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-"
-"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
-"a>."
-msgstr ""
-"Flash Player-Funktion hilft <a href=\"//www.imasuper.com/66/technology/flash-"
-"cookies-the-silent-privacy-killer/\" title=\"Flash Cookies: The Silent "
-"Privacy Killer, unter: imasuper.com 2008.\">Besucher von Internetpräsenzen "
-"mittels Flash-Cookie zu verfolgen</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/top-"
-"sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> “"
-"fingerprinting” devices </a> to identify users."
-msgstr ""
-"Flash wird ebenso für <a
href=\"//arstechnica.com/security/2013/10/top-sites-"
-"and-maybe-the-nsa-track-users-with-device-fingerprinting/\" title=\"Top "
-"sites (and maybe the NSA) track users with âdevice fingerprintingâ,
unter: "
-"arstechnica.com 2013.\">âFingerabdruckâ-Geräte</a> zur Identifizierung
von "
-"Nutzern verwendet."
-
-#. type: Content of: <p>
-msgid ""
-"<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is another "
-"method of “fingerprinting” devices."
-msgstr ""
-"<a href=\"/philosophy/javascript-trap\" title=\"Die JavaScript-Falle"
-"\">JavaScript</a>-Code ist ein weiteres Mittel bei
âFingerabdruckâ-Geräten."
-
#. type: Content of: <div><h3>
msgid "Spyware in Drones"
msgstr "Spionageprogramme in Drohnen"
@@ -3465,6 +3473,14 @@
msgid "Updated:"
msgstr "Letzte Ãnderung:"
+#~ msgid ""
+#~ "<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is "
+#~ "another method of “fingerprinting” devices."
+#~ msgstr ""
+#~ "<a href=\"/philosophy/javascript-trap\" title=\"Die JavaScript-Falle"
+#~ "\">JavaScript</a>-Code ist ein weiteres Mittel bei âFingerabdruckâ-"
+#~ "Geräten."
+
#~ msgid "If you use LibreJS, it will block that malicious Javascript code."
#~ msgstr "Mit LibreJS wird dieser schädliche JavaScript-Code blockiert."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.264
retrieving revision 1.265
diff -u -b -r1.264 -r1.265
--- proprietary-surveillance.fr.po 17 Jan 2018 16:00:16 -0000 1.264
+++ proprietary-surveillance.fr.po 25 Jan 2018 18:30:40 -0000 1.265
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-01-17 13:56+0000\n"
+"POT-Creation-Date: 2018-01-25 18:26+0000\n"
"PO-Revision-Date: 2018-01-17 16:51+0100\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-01-25 18:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -185,7 +186,10 @@
msgstr "<a href=\"#SpywareInChrome\">Chrome</a>"
#. type: Content of: <div><div><ul><li><ul><li>
-msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+# | <a href=\"#SpywareInFlash\">Spyware in {+JavaScript and+} Flash</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+msgid "<a href=\"#SpywareInFlash\">Spyware in JavaScript and Flash</a>"
msgstr "<a href=\"#SpywareInFlash\">Flash</a>"
#. type: Content of: <div><div><ul><li>
@@ -2808,50 +2812,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Some JavaScript malware <a href=\"https://www.theverge."
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\"> swipes usernames from browser-based password managers</a>."
-msgstr ""
-"Certains logiciels JavaScript malveillants raflent <a href=\"https://www."
-"theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-"
-"research\">les identifiants provenant des gestionnaires de mots de passe</a> "
-"associés aux navigateurs."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some websites send JavaScript code to collect all the user's input, <a href="
-"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-"
-"personal-data-by-session-replay-scripts/\">which can then be used to "
-"reproduce the whole session</a>."
-msgstr ""
-"Certains sites envoient du code JavaScript pour collecter tout ce qui est "
-"saisi par l'utilisateur, <a href=\"https://freedom-to-tinker.com/2017/11/15/"
-"no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/\">ce "
-"qui permet de reproduire l'ensemble de la session</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious JavaScript code."
-msgstr "Si vous utilisez LibreJS, il bloquera ce code JavaScript malveillant."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-"
-"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
-"information that users have typed into a form but not sent</a>, in order to "
-"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/"
-"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
-"Allege\"> getting sued</a> for this."
-msgstr ""
-"De nombreux sites web utilisent du code JavaScript <a href=\"http://gizmodo."
-"com/before-you-hit-submit-this-company-has-already-logge-1795906081\">pour "
-"récupérer l'information que les utilisateurs ont saisie dans un formulaire "
-"mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont
"
-"été <a href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/"
-"Sites-Illegally-Tracked-Consumers-New-Suits-Allege\">poursuivis</a> pour "
-"cela."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"When a page uses Disqus for comments, <a href=\"https://blog.dantup."
"com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-"
"sends-the-url-to-facebook\">the proprietary Disqus software loads a Facebook "
@@ -2955,6 +2915,95 @@
"d'examiner directement les données des utilisateurs</a>."
#. type: Content of: <div><h4>
+# | Spyware in {+JavaScript and+} Flash
+#, fuzzy
+#| msgid "Spyware in Flash"
+msgid "Spyware in JavaScript and Flash"
+msgstr "Flash"
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a href=\"https://www.theverge."
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> swipes usernames from browser-based password managers</a>."
+msgstr ""
+"Certains logiciels JavaScript malveillants raflent <a href=\"https://www."
+"theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-"
+"research\">les identifiants provenant des gestionnaires de mots de passe</a> "
+"associés aux navigateurs."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some websites send JavaScript code to collect all the user's input, <a href="
+"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-"
+"personal-data-by-session-replay-scripts/\">which can then be used to "
+"reproduce the whole session</a>."
+msgstr ""
+"Certains sites envoient du code JavaScript pour collecter tout ce qui est "
+"saisi par l'utilisateur, <a href=\"https://freedom-to-tinker.com/2017/11/15/"
+"no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/\">ce "
+"qui permet de reproduire l'ensemble de la session</a>."
+
+#. type: Content of: <ul><li><p>
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
+msgstr "Si vous utilisez LibreJS, il bloquera ce code JavaScript malveillant."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-"
+"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
+"information that users have typed into a form but not sent</a>, in order to "
+"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/"
+"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
+"Allege\"> getting sued</a> for this."
+msgstr ""
+"De nombreux sites web utilisent du code JavaScript <a href=\"http://gizmodo."
+"com/before-you-hit-submit-this-company-has-already-logge-1795906081\">pour "
+"récupérer l'information que les utilisateurs ont saisie dans un formulaire "
+"mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont
"
+"été <a href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/"
+"Sites-Illegally-Tracked-Consumers-New-Suits-Allege\">poursuivis</a> pour "
+"cela."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-"
+"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
+"a>."
+msgstr ""
+"<a href=\"http://www.imasuper.com/66/technology/flash-cookies-the-silent-"
+"privacy-killer/\">Un cookie du lecteur Flash aide les sites web à suivre "
+"les visiteurs à la trace</a>)."
+
+#. type: Content of: <ul><li><p>
+# | Flash [-is-] {+and JavaScript are+} also used for <a
+# |
href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\">
+# | “fingerprinting” devices[- -]</a> to identify users.
+#, fuzzy
+#| msgid ""
+#| "Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/"
+#| "top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> "
+#| "“fingerprinting” devices </a> to identify users."
+msgid ""
+"Flash and JavaScript are also used for <a href=\"http://arstechnica.com/"
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> “fingerprinting” devices</a> to identify "
+"users."
+msgstr ""
+"Flash est aussi employé dans <a href=\"http://arstechnica.com/"
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\">des dispositifs de « profilage »
<cite>[fingerprinting]</"
+"cite></a> destinés à identifier les utilisateurs."
+
+#. type: Content of: <div><h4>
msgid "Spyware in Chrome"
msgstr "Chrome"
@@ -3010,47 +3059,6 @@
"\">espionner en détail la navigation de l'utilisateur</a>, et beaucoup ne "
"s'en privent pas. "
-#. type: Content of: <div><h4>
-msgid "Spyware in Flash"
-msgstr "Flash"
-
-#. type: Content of: <div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-"
-"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
-"a>."
-msgstr ""
-"<a href=\"http://www.imasuper.com/66/technology/flash-cookies-the-silent-"
-"privacy-killer/\">Un cookie du lecteur Flash aide les sites web à suivre "
-"les visiteurs à la trace</a>)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/top-"
-"sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> “"
-"fingerprinting” devices </a> to identify users."
-msgstr ""
-"Flash est aussi employé dans <a href=\"http://arstechnica.com/"
-"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
-"fingerprinting/\">des dispositifs de « profilage »
<cite>[fingerprinting]</"
-"cite></a> destinés à identifier les utilisateurs."
-
-#. type: Content of: <p>
-msgid ""
-"<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is another "
-"method of “fingerprinting” devices."
-msgstr ""
-"Une autre méthode de profilage fait usage de <a href=\"/philosophy/"
-"javascript-trap.html\">code JavaScript</a>. "
-
#. type: Content of: <div><h3>
msgid "Spyware in Drones"
msgstr "Espions dans les drones"
@@ -3223,3 +3231,10 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is "
+#~ "another method of “fingerprinting” devices."
+#~ msgstr ""
+#~ "Une autre méthode de profilage fait usage de <a href=\"/philosophy/"
+#~ "javascript-trap.html\">code JavaScript</a>. "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary-surveillance.it-diff.html 17 Jan 2018 17:02:53 -0000
1.44
+++ proprietary-surveillance.it-diff.html 25 Jan 2018 18:30:40 -0000
1.45
@@ -112,7 +112,7 @@
<li><a href="#SpywareOnTheWeb">Spyware on the Web</a>
<ul>
<li><a href="#SpywareInChrome">Spyware in
Chrome</a></li>
- <li><a href="#SpywareInFlash">Spyware in
Flash</a></li>
+ <li><a href="#SpywareInFlash">Spyware in <span
class="inserted"><ins><em>JavaScript and</em></ins></span>
Flash</a></li>
</ul>
</li>
<li><a <span
class="inserted"><ins><em>href="#SpywareInDrones">Spyware in
Drones</a></li>
@@ -389,7 +389,7 @@
<p>Apps</strong></del></span> <span class="inserted"><ins><em>no
systematic way</em></ins></span> for <span class="removed"><del><strong>BART
<a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
<p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With</strong></del></span> <span class="inserted"><ins><em>Google,
or Android
+ <p>With proprietary apps, one</strong></del></span> <span
class="inserted"><ins><em>Google, or Android
users, to inspect executable proprietary apps to see what they
do.</p>
@@ -468,7 +468,7 @@
<p>Apps for BART
<a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
<p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With</em></ins></span> proprietary apps, one can only hope that
they don't.</p>
+ <p>With proprietary apps, one</em></ins></span> can only hope that
they don't.</p>
</li>
<li>
@@ -887,46 +887,44 @@
weakness of the reject-it-if-you-dislike-snooping
“solution” to surveillance: why should a flashlight
app send any information to anyone? A free software flashlight
- app would <span class="removed"><del><strong>not.</p>
+ app would not.</p>
</li>
</ul>
-
<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInGames">Spyware</strong></del></span>
<span
class="inserted"><ins><em>id="SpywareInToys">Spyware</em></ins></span> in
<span class="removed"><del><strong>Games</h4></strong></del></span> <span
class="inserted"><ins><em>Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
<ul>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about them to
- nVidia servers</a>.</p>
+ <span class="removed"><del><strong><li><p>nVidia's proprietary
GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about
them</strong></del></span>
+
+ <span class="inserted"><ins><em><li>
+ <p>A remote-control sex toy was found</em></ins></span> to
+ <span class="removed"><del><strong>nVidia servers</a>.</p>
</li>
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage to spy through it
too</a>.
+ <li><p>Angry Birds</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage to spy through it too</a>.
Here's information on
<a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>not.</p></em></ins></span>
+ More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
+
<div class="big-subsection">
<h4 id="SpywareInToys">Spyware in Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<ul>
+<ul></strong></del></span>
<li>
- <span class="inserted"><ins><em><p>A remote-control sex toy was
found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of the conversation between two users</a>.</p>
- </li>
-
- <li></em></ins></span>
<p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
a speech recognition company based in the U.S.</p>
@@ -1330,35 +1328,37 @@
<div style="clear: left;"></div>
<ul>
-<span class="removed"><del><strong><li><p>Users are suing Bose for
<a
+<span class="removed"><del><strong><li><p>Users are suing
Bose</strong></del></span>
+
+ <span class="inserted"><ins><em><li>
+ <p>The driver</em></ins></span> for <span
class="removed"><del><strong><a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing a spyware app for its headphones</a>.
+distributing</strong></del></span> a <span
class="removed"><del><strong>spyware app for its headphones</a>.
Specifically, the app would record the names of the audio files
-users listen to along with the headphone's unique serial number.
-</p></strong></del></span>
+users listen</strong></del></span> <span class="inserted"><ins><em>certain
gaming keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information</em></ins></span>
+ to <span class="removed"><del><strong>along with the headphone's
unique serial number.
+</p>
- <span class="inserted"><ins><em><li></em></ins></span>
- <p>The <span class="removed"><del><strong>suit accuses that this was
done without the users' consent.
-If the fine print of the app said that users gave
consent</strong></del></span> <span
class="inserted"><ins><em>driver</em></ins></span> for <span
class="removed"><del><strong>this,
-would that make it acceptable? No way! It should be flat
out</strong></del></span> <span class="inserted"><ins><em>a certain gaming
keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information
- to China</a>.</p>
+<p>The suit accuses that this was done without the users' consent.
+If the fine print of the app said that</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
</li>
- <li><p>nVidia's proprietary GeForce Experience</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span> <span
class="inserted"><ins><em>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about
them</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span>
- <span class="inserted"><ins><em>nVidia servers</a>.</p>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</em></ins></span>
+ users <span class="removed"><del><strong>gave
consent</strong></del></span> <span class="inserted"><ins><em>identify
themselves and then sends personal data about them to
+ nVidia servers</a>.</p>
</li>
<li><p>Angry Birds
<a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>NSA takes advantage</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>spy through
it too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ spies</em></ins></span> for <span class="removed"><del><strong>this,
+would that make</strong></del></span> <span
class="inserted"><ins><em>companies, and the NSA takes advantage to spy
through</em></ins></span> it <span class="removed"><del><strong>acceptable? No
way! It should be flat out</strong></del></span> <span
class="inserted"><ins><em>too</a>.
+ Here's information on</em></ins></span>
+ <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
+illegal to design the</strong></del></span> <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></em></ins></span>
+ More about NSA</em></ins></span> app <span
class="removed"><del><strong>to snoop at all</a>.
+</p></strong></del></span> <span
class="inserted"><ins><em>spying</a>.</p></em></ins></span>
</li>
<li><p>Many
@@ -1380,7 +1380,7 @@
companies.</p>
<p>They use this data to manipulate people to buy things, and hunt
- for “whales” who can be led to spend a lot of money. They
+ for “whales” who can be led to <span
class="removed"><del><strong>spend a lot</strong></del></span> <span
class="inserted"><ins><em>spend a lot of money. They
also use a back door to manipulate the game play for specific
players.</p>
<p>While the article describes gratis games, games that cost money
@@ -1388,7 +1388,7 @@
</li>
</ul>
-<!-- <span class="inserted"><ins><em>#SpywareAtRecreation -->
+<!-- #SpywareAtRecreation -->
<div class="big-section">
<h3 id="SpywareAtRecreation">Spyware at Recreation</h3>
<span class="anchor-reference-id">
@@ -1404,15 +1404,19 @@
users listen to along with the headphone's unique serial number.
</p>
<p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat out
+ If the fine print</em></ins></span> of <span
class="removed"><del><strong>money. They
+ also use a back door to manipulate</strong></del></span> the <span
class="removed"><del><strong>game play</strong></del></span> <span
class="inserted"><ins><em>app said that users gave consent</em></ins></span>
for <span class="removed"><del><strong>specific players.</p>
+
+ <p>While the article describes gratis games,
games</strong></del></span> <span class="inserted"><ins><em>this,
+ would</em></ins></span> that <span class="removed"><del><strong>cost
money
+ can use</strong></del></span> <span class="inserted"><ins><em>make it
acceptable? No way! It should be flat out
<a href="/philosophy/surveillance-vs-democracy.html">
- illegal to design the app to snoop at all</a>.
- </p>
+ illegal to design</em></ins></span> the <span
class="removed"><del><strong>same tactics.</p></strong></del></span>
<span class="inserted"><ins><em>app to snoop at all</a>.
+ </p></em></ins></span>
</li>
</ul>
-<!--</em></ins></span> #SpywareOnTheWeb -->
+<!-- #SpywareOnTheWeb -->
<div class="big-section">
<h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
@@ -1427,29 +1431,6 @@
but the surveillance is an abuse all the same.</p>
<ul>
- <span class="inserted"><ins><em><li>
- <p>Some JavaScript malware <a
-
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
- swipes usernames from browser-based password managers</a>.</p>
- </li>
-
- <li>
- <p>Some websites send JavaScript code to collect all the user's
- input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then
- be used to reproduce the whole session</a>.</p>
-
- <p>If you use LibreJS, it will block that malicious JavaScript
- code.</p>
- </li>
-
- <li><p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a form but not
- sent</a>, in order to learn their identity. Some are <a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p>
- </li></em></ins></span>
-
<li><p>When a page uses Disqus for
comments, <a
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the
proprietary Disqus software loads a Facebook software package into
@@ -1498,7 +1479,48 @@
<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-subsection">
- <h4 id="SpywareInChrome">Spyware in Chrome</h4>
+ <h4 <span class="inserted"><ins><em>id="SpywareInFlash">Spyware in
JavaScript and Flash</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Some JavaScript malware <a
+
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
+ swipes usernames from browser-based password managers</a>.</p>
+ </li>
+
+ <li>
+ <p>Some websites send JavaScript code to collect all the user's
+ input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then
+ be used to reproduce the whole session</a>.</p>
+
+ <p>If you use LibreJS, it will block that malicious JavaScript
+ code.</p>
+ </li>
+
+ <li><p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a form but not
+ sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+ </li>
+
+ <li><p>Flash Player's
+ <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps web sites track visitors</a>.</p>
+ </li>
+
+ <li><p>Flash and JavaScript are also used for
+ <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a> to identify
users.</p>
+ </li>
+</ul>
+
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<div class="big-subsection">
+ <h4</em></ins></span> id="SpywareInChrome">Spyware in Chrome</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
</div>
@@ -1526,43 +1548,33 @@
</ul>
-<div class="big-subsection">
- <h4 id="SpywareInFlash">Spyware in Flash</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+<span class="inserted"><ins><em><!-- #SpywareInDrones
--></em></ins></span>
+<div <span class="removed"><del><strong>class="big-subsection">
+ <h4 id="SpywareInFlash">Spyware</strong></del></span> <span
class="inserted"><ins><em>class="big-section">
+ <h3 id="SpywareInDrones">Spyware</em></ins></span> in <span
class="removed"><del><strong>Flash</h4></strong></del></span> <span
class="inserted"><ins><em>Drones</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInFlash">#SpywareInFlash</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
+<span class="inserted"><ins><em><div style="clear:
left;"></div></em></ins></span>
<ul>
- <li><p>Flash Player's
+ <span class="removed"><del><strong><li><p>Flash Player's
<a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
cookie feature helps web sites track visitors</a>.</p>
</li>
- <li><p>Flash is also used for
- <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices </a> to identify
users.</p>
+ <li><p>Flash</strong></del></span>
+ <span class="inserted"><ins><em><li>
+ <p>While you're using a DJI drone to snoop on other people,
DJI</em></ins></span> is <span class="removed"><del><strong>also used
for</strong></del></span> <span class="inserted"><ins><em>in many
+ cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices </a> to identify
users.</p></strong></del></span> <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p></em></ins></span>
</li>
</ul>
-<p><a <span
class="removed"><del><strong>href="/philosophy/javascript-trap.html">Javascript</strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/javascript-trap.html">JavaScript</em></ins></span>
code</a>
-is another method of “fingerprinting” devices.</p>
-
-
-<!-- <span class="inserted"><ins><em>#SpywareInDrones -->
-<div class="big-section">
- <h3 id="SpywareInDrones">Spyware in Drones</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li>
- <p>While you're using a DJI drone to snoop on other people, DJI is
in many
- cases <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
- </li>
-</ul>
+<span class="removed"><del><strong><p><a
href="/philosophy/javascript-trap.html">Javascript code</a>
+is another method of “fingerprinting”
devices.</p></strong></del></span>
-<!--</em></ins></span> #SpywareEverywhere -->
+<!-- #SpywareEverywhere -->
<div class="big-section">
<h3 id="SpywareEverywhere">Spyware Everywhere</h3>
<span class="anchor-reference-id">(<a
href="#SpywareEverywhere">#SpywareEverywhere</a>)</span>
@@ -1661,7 +1673,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/17 17:02:53 $
+$Date: 2018/01/25 18:30:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary-surveillance.it.po 17 Jan 2018 14:04:28 -0000 1.217
+++ proprietary-surveillance.it.po 25 Jan 2018 18:30:40 -0000 1.218
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-01-17 13:56+0000\n"
+"POT-Creation-Date: 2018-01-25 18:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -195,7 +195,10 @@
msgstr "<a href=\"#SpywareInChrome\">Spyware in Chrome</a>"
#. type: Content of: <div><div><ul><li><ul><li>
-msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+# | <a href=\"#SpywareInFlash\">Spyware in {+JavaScript and+} Flash</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+msgid "<a href=\"#SpywareInFlash\">Spyware in JavaScript and Flash</a>"
msgstr "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
#. type: Content of: <div><div><ul><li>
@@ -2735,35 +2738,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Some JavaScript malware <a href=\"https://www.theverge."
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\"> swipes usernames from browser-based password managers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some websites send JavaScript code to collect all the user's input, <a href="
-"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-"
-"personal-data-by-session-replay-scripts/\">which can then be used to "
-"reproduce the whole session</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious JavaScript code."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-"
-"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
-"information that users have typed into a form but not sent</a>, in order to "
-"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/"
-"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
-"Allege\"> getting sued</a> for this."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"When a page uses Disqus for comments, <a href=\"https://blog.dantup."
"com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-"
"sends-the-url-to-facebook\">the proprietary Disqus software loads a Facebook "
@@ -2865,6 +2839,80 @@
"direttamente i dati degli utenti</a>."
#. type: Content of: <div><h4>
+# | Spyware in {+JavaScript and+} Flash
+#, fuzzy
+#| msgid "Spyware in Flash"
+msgid "Spyware in JavaScript and Flash"
+msgstr "Spyware in Flash"
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a href=\"https://www.theverge."
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> swipes usernames from browser-based password managers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some websites send JavaScript code to collect all the user's input, <a href="
+"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-"
+"personal-data-by-session-replay-scripts/\">which can then be used to "
+"reproduce the whole session</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-"
+"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
+"information that users have typed into a form but not sent</a>, in order to "
+"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/"
+"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
+"Allege\"> getting sued</a> for this."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-"
+"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
+"a>."
+msgstr ""
+"<a href=\"http://www.imasuper.com/66/technology/flash-cookies-the-silent-"
+"privacy-killer/\">I cookie del Flash Player permettono ai siti web di "
+"tracciare i visitatori</a>."
+
+#. type: Content of: <ul><li><p>
+# | Flash [-is-] {+and JavaScript are+} also used for <a
+# |
href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\">
+# | “fingerprinting” devices[- -]</a> to identify users.
+#, fuzzy
+#| msgid ""
+#| "Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/"
+#| "top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> "
+#| "“fingerprinting” devices </a> to identify users."
+msgid ""
+"Flash and JavaScript are also used for <a href=\"http://arstechnica.com/"
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> “fingerprinting” devices</a> to identify "
+"users."
+msgstr ""
+"Flash viene anche usato per <a href=\"http://arstechnica.com/"
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\">il “fingerprinting” (la raccolta di impronte "
+"digitali virtuali) dei dispositivi</a> allo scopo di identificare gli utenti."
+
+#. type: Content of: <div><h4>
msgid "Spyware in Chrome"
msgstr "Spyware in Chrome"
@@ -2916,53 +2964,6 @@
"\">spionaggio completo sulle attività dell'utente</a>, e molte estensioni lo
"
"fanno."
-#. type: Content of: <div><h4>
-msgid "Spyware in Flash"
-msgstr "Spyware in Flash"
-
-#. type: Content of: <div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-"
-"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
-"a>."
-msgstr ""
-"<a href=\"http://www.imasuper.com/66/technology/flash-cookies-the-silent-"
-"privacy-killer/\">I cookie del Flash Player permettono ai siti web di "
-"tracciare i visitatori</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/top-"
-"sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> “"
-"fingerprinting” devices </a> to identify users."
-msgstr ""
-"Flash viene anche usato per <a href=\"http://arstechnica.com/"
-"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
-"fingerprinting/\">il “fingerprinting” (la raccolta di impronte "
-"digitali virtuali) dei dispositivi</a> allo scopo di identificare gli utenti."
-
-#. type: Content of: <p>
-# | <a href=\"/philosophy/javascript-trap.html\">Java[-s-]{+S+}cript code</a>
-# | is another method of “fingerprinting” devices.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"/philosophy/javascript-trap.html\">Javascript code</a> is "
-#| "another method of “fingerprinting” devices."
-msgid ""
-"<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is another "
-"method of “fingerprinting” devices."
-msgstr ""
-"Il <a href=\"/philosophy/javascript-trap.html\">codice Javascript</a> è un "
-"altro metodo usato per il “fingerprinting” dei dispositivi."
-
#. type: Content of: <div><h3>
# | Spyware in [-Chrome-] {+Drones+}
#, fuzzy
@@ -3141,6 +3142,17 @@
msgid "Updated:"
msgstr "Ultimo aggiornamento:"
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"/philosophy/javascript-trap.html\">Javascript code</a> is "
+#~| "another method of “fingerprinting” devices."
+#~ msgid ""
+#~ "<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is "
+#~ "another method of “fingerprinting” devices."
+#~ msgstr ""
+#~ "Il <a href=\"/philosophy/javascript-trap.html\">codice Javascript</a> è "
+#~ "un altro metodo usato per il “fingerprinting” dei dispositivi."
+
#~ msgid "Copyright © 2015, 2016, 2017 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2015, 2016, 2017 Free Software Foundation, Inc."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary-surveillance.ja-diff.html 17 Jan 2018 17:02:53 -0000
1.55
+++ proprietary-surveillance.ja-diff.html 25 Jan 2018 18:30:40 -0000
1.56
@@ -112,7 +112,7 @@
<li><a href="#SpywareOnTheWeb">Spyware on the Web</a>
<ul>
<li><a href="#SpywareInChrome">Spyware in
Chrome</a></li>
- <li><a href="#SpywareInFlash">Spyware in
Flash</a></li>
+ <li><a href="#SpywareInFlash">Spyware in <span
class="inserted"><ins><em>JavaScript and</em></ins></span>
Flash</a></li>
</ul>
</li>
<li><a <span
class="inserted"><ins><em>href="#SpywareInDrones">Spyware in
Drones</a></li>
@@ -388,9 +388,9 @@
<span class="removed"><del><strong>legitimate, but is that valid? Software
developers</strong></del></span> <span
class="inserted"><ins><em>malicious</a>.</p>
<p>Could Google</em></ins></span> have <span
class="inserted"><ins><em>done a better job of preventing apps from
- cheating? There is</em></ins></span> no <span
class="removed"><del><strong>right to
- analyze what users are doing</strong></del></span> <span
class="inserted"><ins><em>systematic way for Google, or Android
- users, to inspect executable proprietary apps to see what they
+ cheating? There is</em></ins></span> no <span
class="removed"><del><strong>right</strong></del></span> <span
class="inserted"><ins><em>systematic way for Google, or Android
+ users,</em></ins></span> to
+ <span class="removed"><del><strong>analyze what</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
<p>Google could demand the source code for these apps, and study the
@@ -530,7 +530,7 @@
<p>The article takes for granted that the usual analytics tools are
legitimate, but is that valid? Software developers have no right to
- analyze what users are doing</em></ins></span> or how.
“Analytics” tools that snoop are
+ analyze what</em></ins></span> users are doing or how.
“Analytics” tools that snoop are
just as wrong as any other snooping.</p>
</li>
<li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
@@ -734,7 +734,7 @@
remote command and users cannot stop them:
<a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
+ (The US says it <span class="removed"><del><strong>will eventually
require all new portable phones</strong></del></span> <span
class="inserted"><ins><em>will eventually require all new portable phones
to have GPS.)</p>
</li>
@@ -753,7 +753,7 @@
</div>
<ul>
- <span class="inserted"><ins><em><li><p>AI-powered driving apps
can
+ <li><p>AI-powered driving apps can
<a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
track your every move</a>.</p>
</li>
@@ -769,38 +769,52 @@
<li>
<p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
on what people are listening to or watching</a>. In addition, it may
- be analyzing people's conversations to serve them with targeted
- advertisements.</p>
+ be analyzing people's conversations</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>serve them with targeted
+ advertisements.</p></em></ins></span>
</li>
- <li>
- <p>Faceapp appears to do lots of surveillance, judging by
+ <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
+
+ <span class="inserted"><ins><em><li>
+ <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>restrict
+ the use</strong></del></span> <span class="inserted"><ins><em>do
lots</em></ins></span> of <span class="inserted"><ins><em>surveillance, judging
by
<a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.
+ how much access it demands to personal</em></ins></span> data
<span class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>in</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span
class="inserted"><ins><em>device</a>.
</p>
</li>
<li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some of its phones. The app will give Verizon the same
+ <p>Verizon</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that</em></ins></span> it
<span class="removed"><del><strong>tries to get</strong></del></span> <span
class="inserted"><ins><em>will</a>
+ pre-install on some of its phones. The app will give
Verizon</em></ins></span> the <span class="removed"><del><strong>user's
list</strong></del></span> <span class="inserted"><ins><em>same
information about the users' searches that Google normally gets when
they use its search engine.</p>
<p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
being pre-installed on only one phone</a>, and the
user must explicitly opt-in before the app takes effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p>
+ app remains spyware—an “optional”
piece</em></ins></span> of <span class="removed"><del><strong>other people's
phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>spyware is
+ still spyware.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware</strong></del></span>
- <li><p>The Meitu photo-editing
+ <span class="inserted"><ins><em><li><p>The Meitu photo-editing
app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
user data to a Chinese company</a>.</p></li>
<li><p>A pregnancy test controller application not only
can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in the phone, and in server accounts, it can
+ on many sorts of data</em></ins></span> in <span
class="removed"><del><strong>Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul></strong></del></span> <span class="inserted"><ins><em>the phone,
and in server accounts, it can
alter them too</a>.
</p></li></em></ins></span>
@@ -885,15 +899,14 @@
approve sending personal data to the app developer but did not
ask about sending it to other companies. This shows the
weakness of the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should <span
class="removed"><del><strong>a flashlight
+ “solution” to surveillance: why should a flashlight
app send any information to anyone? A free software flashlight
app would not.</p>
</li>
</ul>
-
<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
+ <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
@@ -910,14 +923,13 @@
<a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA</strong></del></span> <span class="inserted"><ins><em>a
flashlight</em></ins></span>
- app <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>send any information to anyone? A free
software flashlight
- app would not.</p></em></ins></span>
+ More about NSA app spying</a>.</p>
</li>
</ul>
+
<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <h4</strong></del></span> id="SpywareInToys">Spyware in Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
@@ -961,7 +973,7 @@
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about
their products, rather than free software which users <span
class="removed"><del><strong>can check</strong></del></span> <span
class="inserted"><ins><em>could have
- checked and changed.</p>
+ checked</em></ins></span> and <span
class="removed"><del><strong>change.</p></strong></del></span> <span
class="inserted"><ins><em>changed.</p>
<p>The company that made the vibrator
<a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
@@ -976,20 +988,20 @@
<p>Following this lawsuit,
<a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
the company has been ordered to pay a total of C$4m</a>
- to its customers.</p>
+ to its customers.</p></em></ins></span>
</li>
- <li><p> “CloudPets” toys with microphones
+ <span class="inserted"><ins><em><li><p> “CloudPets”
toys with microphones
<a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
collected by the manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
conversations
- was unacceptable by itself.</p></li>
+ was unacceptable by itself.</p></li></em></ins></span>
<li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and <span
class="removed"><del><strong>adults.</a>.</p></strong></del></span>
<span class="inserted"><ins><em>adults</a>.</p>
</li>
</ul>
@@ -1008,14 +1020,13 @@
<li>
<p>An LG “smart” watch is designed
<a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else</em></ins></span> and <span
class="removed"><del><strong>change.</p></strong></del></span> <span
class="inserted"><ins><em>to transmit
- conversations too</a>.</p></em></ins></span>
+ to report its location to someone else and to transmit
+ conversations too</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <span class="inserted"><ins><em><li>
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span>
- <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects</em></ins></span> to <span
class="removed"><del><strong>spy on children and
adults.</a>.</p></strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+ <li>
+ <p>A very cheap “smart watch” comes with an Android app
+ <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
<p>The article says this is a back door, but that could be a
misunderstanding. However, it is certainly surveillance, at
least.</p></em></ins></span>
@@ -1336,20 +1347,20 @@
<a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
<li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
<span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>record.</a></p>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p>
</li>
</ul>
-<!-- #SpywareInGames -->
+<!-- <span
class="removed"><del><strong>#SpywareAtPlay</strong></del></span> <span
class="inserted"><ins><em>#SpywareInGames</em></ins></span> -->
<div class="big-section">
- <h3 id="SpywareInGames">Spyware in Games</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareAtPlay">Spyware at
Play</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Spyware in
Games</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
<ul>
- <li>
+ <span class="inserted"><ins><em><li>
<p>The driver for a certain gaming keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information
to China</a>.</p>
</li>
@@ -1366,18 +1377,8 @@
<a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtPlay -->
-<div class="big-section">
- <h3 id="SpywareAtPlay">Spyware at Play</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul></strong></del></span>
+ More about NSA app spying</a>.</p>
+ </li></em></ins></span>
<li><p>Many
<a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
@@ -1401,12 +1402,12 @@
for “whales” who can be led to spend a lot of money. They
also use a back door to manipulate the game play for specific
players.</p>
- <p>While the article describes gratis games, games that cost money
+ <p>While the <span class="removed"><del><strong>article describes
gratis games, games</strong></del></span> <span
class="inserted"><ins><em>article describes gratis games, games that cost money
can use the same tactics.</p>
</li>
</ul>
-<!-- <span class="inserted"><ins><em>#SpywareAtRecreation -->
+<!-- #SpywareAtRecreation -->
<div class="big-section">
<h3 id="SpywareAtRecreation">Spyware at Recreation</h3>
<span class="anchor-reference-id">
@@ -1422,15 +1423,16 @@
users listen to along with the headphone's unique serial number.
</p>
<p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
+ If the fine print of the app said</em></ins></span> that <span
class="removed"><del><strong>cost money
+ can use</strong></del></span> <span class="inserted"><ins><em>users gave
consent for this,
would that make it acceptable? No way! It should be flat out
<a href="/philosophy/surveillance-vs-democracy.html">
- illegal to design the app to snoop at all</a>.
- </p>
+ illegal to design</em></ins></span> the <span
class="removed"><del><strong>same tactics.</p></strong></del></span>
<span class="inserted"><ins><em>app to snoop at all</a>.
+ </p></em></ins></span>
</li>
</ul>
-<!--</em></ins></span> #SpywareOnTheWeb -->
+<!-- #SpywareOnTheWeb -->
<div class="big-section">
<h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
@@ -1445,30 +1447,7 @@
but the surveillance is an abuse all the same.</p>
<ul>
- <span class="inserted"><ins><em><li>
- <p>Some JavaScript malware <a
-
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
- swipes usernames from browser-based password managers</a>.</p>
- </li>
-
- <li>
- <p>Some websites send JavaScript code to collect all the user's
- input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then
- be used to reproduce the whole session</a>.</p>
-
- <p>If you use LibreJS, it will block that malicious JavaScript
- code.</p>
- </li>
-
- <li><p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a form but not
- sent</a>, in order to learn their identity. Some are <a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p>
- </li>
-
- <li><p>When a page uses Disqus for
+ <span class="inserted"><ins><em><li><p>When a page uses Disqus
for
comments, <a
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the
proprietary Disqus software loads a Facebook software package into
the browser of every anonymous visitor to the page, and makes the
@@ -1516,7 +1495,48 @@
<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-subsection">
- <h4 id="SpywareInChrome">Spyware in Chrome</h4>
+ <h4 <span class="inserted"><ins><em>id="SpywareInFlash">Spyware in
JavaScript and Flash</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Some JavaScript malware <a
+
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
+ swipes usernames from browser-based password managers</a>.</p>
+ </li>
+
+ <li>
+ <p>Some websites send JavaScript code to collect all the user's
+ input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then
+ be used to reproduce the whole session</a>.</p>
+
+ <p>If you use LibreJS, it will block that malicious JavaScript
+ code.</p>
+ </li>
+
+ <li><p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a form but not
+ sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+ </li>
+
+ <li><p>Flash Player's
+ <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps web sites track visitors</a>.</p>
+ </li>
+
+ <li><p>Flash and JavaScript are also used for
+ <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a> to identify
users.</p>
+ </li>
+</ul>
+
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<div class="big-subsection">
+ <h4</em></ins></span> id="SpywareInChrome">Spyware in Chrome</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
</div>
@@ -1544,43 +1564,33 @@
</ul>
-<div class="big-subsection">
- <h4 id="SpywareInFlash">Spyware in Flash</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+<span class="inserted"><ins><em><!-- #SpywareInDrones
--></em></ins></span>
+<div <span class="removed"><del><strong>class="big-subsection">
+ <h4 id="SpywareInFlash">Spyware</strong></del></span> <span
class="inserted"><ins><em>class="big-section">
+ <h3 id="SpywareInDrones">Spyware</em></ins></span> in <span
class="removed"><del><strong>Flash</h4></strong></del></span> <span
class="inserted"><ins><em>Drones</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInFlash">#SpywareInFlash</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
+<span class="inserted"><ins><em><div style="clear:
left;"></div></em></ins></span>
<ul>
- <li><p>Flash Player's
+ <span class="removed"><del><strong><li><p>Flash Player's
<a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
cookie feature helps web sites track visitors</a>.</p>
</li>
- <li><p>Flash is also used for
- <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices </a> to identify
users.</p>
+ <li><p>Flash</strong></del></span>
+ <span class="inserted"><ins><em><li>
+ <p>While you're using a DJI drone to snoop on other people,
DJI</em></ins></span> is <span class="removed"><del><strong>also used
for</strong></del></span> <span class="inserted"><ins><em>in many
+ cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices </a> to identify
users.</p></strong></del></span> <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p></em></ins></span>
</li>
</ul>
-<p><a <span
class="removed"><del><strong>href="/philosophy/javascript-trap.html">Javascript</strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/javascript-trap.html">JavaScript</em></ins></span>
code</a>
-is another method of “fingerprinting” devices.</p>
-
-
-<!-- <span class="inserted"><ins><em>#SpywareInDrones -->
-<div class="big-section">
- <h3 id="SpywareInDrones">Spyware in Drones</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li>
- <p>While you're using a DJI drone to snoop on other people, DJI is
in many
- cases <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
- </li>
-</ul>
+<span class="removed"><del><strong><p><a
href="/philosophy/javascript-trap.html">Javascript code</a>
+is another method of “fingerprinting”
devices.</p></strong></del></span>
-<!--</em></ins></span> #SpywareEverywhere -->
+<!-- #SpywareEverywhere -->
<div class="big-section">
<h3 id="SpywareEverywhere">Spyware Everywhere</h3>
<span class="anchor-reference-id">(<a
href="#SpywareEverywhere">#SpywareEverywhere</a>)</span>
@@ -1679,7 +1689,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/17 17:02:53 $
+$Date: 2018/01/25 18:30:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary-surveillance.ja.po 17 Jan 2018 14:04:28 -0000 1.190
+++ proprietary-surveillance.ja.po 25 Jan 2018 18:30:40 -0000 1.191
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-01-17 13:56+0000\n"
+"POT-Creation-Date: 2018-01-25 18:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -185,7 +185,9 @@
msgstr "<a href=\"#SpywareInChrome\">Chromeã®ã¹ãã¤ã¦ã§ã¢</a>"
#. type: Content of: <div><div><ul><li><ul><li>
-msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+#, fuzzy
+#| msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+msgid "<a href=\"#SpywareInFlash\">Spyware in JavaScript and Flash</a>"
msgstr "<a href=\"#SpywareInFlash\">ãã©ãã·ã¥ã®ã¹ãã¤ã¦ã§ã¢</a>"
#. type: Content of: <div><div><ul><li>
@@ -2542,35 +2544,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Some JavaScript malware <a href=\"https://www.theverge."
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\"> swipes usernames from browser-based password managers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some websites send JavaScript code to collect all the user's input, <a href="
-"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-"
-"personal-data-by-session-replay-scripts/\">which can then be used to "
-"reproduce the whole session</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious JavaScript code."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-"
-"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
-"information that users have typed into a form but not sent</a>, in order to "
-"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/"
-"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
-"Allege\"> getting sued</a> for this."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"When a page uses Disqus for comments, <a href=\"https://blog.dantup."
"com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-"
"sends-the-url-to-facebook\">the proprietary Disqus software loads a Facebook "
@@ -2665,6 +2638,75 @@
"æ»ãããã¨ãèªãã¦ãã¾ãã</a>"
#. type: Content of: <div><h4>
+#, fuzzy
+#| msgid "Spyware in Flash"
+msgid "Spyware in JavaScript and Flash"
+msgstr "ãã©ãã·ã¥ã®ã¹ãã¤ã¦ã§ã¢"
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a href=\"https://www.theverge."
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> swipes usernames from browser-based password managers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some websites send JavaScript code to collect all the user's input, <a href="
+"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-"
+"personal-data-by-session-replay-scripts/\">which can then be used to "
+"reproduce the whole session</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-"
+"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
+"information that users have typed into a form but not sent</a>, in order to "
+"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/"
+"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
+"Allege\"> getting sued</a> for this."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-"
+"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
+"a>."
+msgstr ""
+"ãã©ãã·ã¥ã»ãã¬ã¤ã¤ã¼ã®<a
href=\"http://www.imasuper.com/66/technology/"
+"flash-cookies-the-silent-privacy-killer/\">ã¯ããã¼ã®æ©è½ã¯è¨ªåè
ãã¦ã§ããµã¤"
+"ãã追跡ããã®ãæå©ããã¾ã</a>ã"
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/"
+#| "top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> "
+#| "“fingerprinting” devices </a> to identify users."
+msgid ""
+"Flash and JavaScript are also used for <a href=\"http://arstechnica.com/"
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> “fingerprinting” devices</a> to identify "
+"users."
+msgstr ""
+"ãã©ãã·ã¥ã¯<a
href=\"http://arstechnica.com/security/2013/10/top-sites-and-"
+"maybe-the-nsa-track-users-with-device-fingerprinting/\">ããã¤ã¹ã®ãæç´ã</"
+"a>ã使ã£ã¦ã¦ã¼ã¶ãåå®ããã®ã«ã使ããã¾ãã"
+
+#. type: Content of: <div><h4>
msgid "Spyware in Chrome"
msgstr "Chromeã®ã¹ãã¤ã¦ã§ã¢"
@@ -2708,50 +2750,6 @@
"i-disabled-your-chrome-security-extensions/\">ã¦ã¼ã¶ã®ãã©ã¦ãºè¡çºãå®å
¨ã«è¦"
"ãè¦ãã</a>ãã¨ã容æã«ããå¤ãã®æ¡å¼µæ©è½ããããã¦ãã¾ãã"
-#. type: Content of: <div><h4>
-msgid "Spyware in Flash"
-msgstr "ãã©ãã·ã¥ã®ã¹ãã¤ã¦ã§ã¢"
-
-#. type: Content of: <div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-"
-"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
-"a>."
-msgstr ""
-"ãã©ãã·ã¥ã»ãã¬ã¤ã¤ã¼ã®<a
href=\"http://www.imasuper.com/66/technology/"
-"flash-cookies-the-silent-privacy-killer/\">ã¯ããã¼ã®æ©è½ã¯è¨ªåè
ãã¦ã§ããµã¤"
-"ãã追跡ããã®ãæå©ããã¾ã</a>ã"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/top-"
-"sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> “"
-"fingerprinting” devices </a> to identify users."
-msgstr ""
-"ãã©ãã·ã¥ã¯<a
href=\"http://arstechnica.com/security/2013/10/top-sites-and-"
-"maybe-the-nsa-track-users-with-device-fingerprinting/\">ããã¤ã¹ã®ãæç´ã</"
-"a>ã使ã£ã¦ã¦ã¼ã¶ãåå®ããã®ã«ã使ããã¾ãã"
-
-#. type: Content of: <p>
-#, fuzzy
-#| msgid ""
-#| "<a href=\"/philosophy/javascript-trap.html\">Javascript code</a> is "
-#| "another method of “fingerprinting” devices."
-msgid ""
-"<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is another "
-"method of “fingerprinting” devices."
-msgstr ""
-"<a
href=\"/philosophy/javascript-trap.html\">Javascriptã®ã³ã¼ã</a>ã¯ããã¤ã¹"
-"ã®ãæç´ãã®å¥ã®æ¹å¼ã§ãã"
-
#. type: Content of: <div><h3>
#, fuzzy
#| msgid "Spyware in Chrome"
@@ -2916,6 +2914,17 @@
msgid "Updated:"
msgstr "æçµæ´æ°:"
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"/philosophy/javascript-trap.html\">Javascript code</a> is "
+#~| "another method of “fingerprinting” devices."
+#~ msgid ""
+#~ "<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is "
+#~ "another method of “fingerprinting” devices."
+#~ msgstr ""
+#~ "<a
href=\"/philosophy/javascript-trap.html\">Javascriptã®ã³ã¼ã</a>ã¯ãã"
+#~ "ã¤ã¹ã®ãæç´ãã®å¥ã®æ¹å¼ã§ãã"
+
#~ msgid "Copyright © 2015, 2016, 2017 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2015, 2016, 2017 Free Software Foundation, Inc."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary-surveillance.pot 17 Jan 2018 14:04:28 -0000 1.139
+++ proprietary-surveillance.pot 25 Jan 2018 18:30:40 -0000 1.140
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-01-17 13:56+0000\n"
+"POT-Creation-Date: 2018-01-25 18:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -169,7 +169,7 @@
msgstr ""
#. type: Content of: <div><div><ul><li><ul><li>
-msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+msgid "<a href=\"#SpywareInFlash\">Spyware in JavaScript and Flash</a>"
msgstr ""
#. type: Content of: <div><div><ul><li>
@@ -1944,34 +1944,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Some JavaScript malware <a "
-"href=\"https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research\">
"
-"swipes usernames from browser-based password managers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some websites send JavaScript code to collect all the user's input, <a "
-"href=\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/\">which
"
-"can then be used to reproduce the whole session</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious JavaScript code."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many web sites use JavaScript code <a "
-"href=\"http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081\">
"
-"to snoop on information that users have typed into a form but not sent</a>, "
-"in order to learn their identity. Some are <a "
-"href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege\">
"
-"getting sued</a> for this."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"When a page uses Disqus for comments, <a "
"href=\"https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook\">the
"
"proprietary Disqus software loads a Facebook software package into the "
@@ -2035,71 +2007,93 @@
msgstr ""
#. type: Content of: <div><h4>
-msgid "Spyware in Chrome"
+msgid "Spyware in JavaScript and Flash"
msgstr ""
#. type: Content of: <div>
msgid ""
"<span class=\"anchor-reference-id\">(<a "
-"href=\"#SpywareInChrome\">#SpywareInChrome</a>)</span>"
+"href=\"#SpywareInFlash\">#SpywareInFlash</a>)</span>"
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Google Chrome <a "
-"href=\"https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/\"> spies "
-"on browser history, affiliations</a>, and other installed software."
+"Some JavaScript malware <a "
+"href=\"https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research\">
"
+"swipes usernames from browser-based password managers</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Google Chrome contains a key logger that <a "
-"href=\"http://www.favbrowser.com/google-chrome-spyware-confirmed/\"> sends "
-"Google every URL typed in</a>, one key at a time."
+"Some websites send JavaScript code to collect all the user's input, <a "
+"href=\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/\">which
"
+"can then be used to reproduce the whole session</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Google Chrome includes a module that <a "
-"href=\"https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/\">
"
-"activates microphones and transmits audio to its servers</a>."
+"Many web sites use JavaScript code <a "
+"href=\"http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081\">
"
+"to snoop on information that users have typed into a form but not sent</a>, "
+"in order to learn their identity. Some are <a "
+"href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege\">
"
+"getting sued</a> for this."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Google Chrome makes it easy for an extension to do <a "
-"href=\"https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/\">total
"
-"snooping on the user's browsing</a>, and many of them do so."
+"Flash Player's <a "
+"href=\"http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/\">
"
+"cookie feature helps web sites track visitors</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash and JavaScript are also used for <a "
+"href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\">
"
+"“fingerprinting” devices</a> to identify users."
msgstr ""
#. type: Content of: <div><h4>
-msgid "Spyware in Flash"
+msgid "Spyware in Chrome"
msgstr ""
#. type: Content of: <div>
msgid ""
"<span class=\"anchor-reference-id\">(<a "
-"href=\"#SpywareInFlash\">#SpywareInFlash</a>)</span>"
+"href=\"#SpywareInChrome\">#SpywareInChrome</a>)</span>"
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Flash Player's <a "
-"href=\"http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/\">
"
-"cookie feature helps web sites track visitors</a>."
+"Google Chrome <a "
+"href=\"https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/\"> spies "
+"on browser history, affiliations</a>, and other installed software."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Flash is also used for <a "
-"href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\">
"
-"“fingerprinting” devices </a> to identify users."
+"Google Chrome contains a key logger that <a "
+"href=\"http://www.favbrowser.com/google-chrome-spyware-confirmed/\"> sends "
+"Google every URL typed in</a>, one key at a time."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is another "
-"method of “fingerprinting” devices."
+"Google Chrome includes a module that <a "
+"href=\"https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/\">
"
+"activates microphones and transmits audio to its servers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Google Chrome makes it easy for an extension to do <a "
+"href=\"https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/\">total
"
+"snooping on the user's browsing</a>, and many of them do so."
msgstr ""
#. type: Content of: <div><h3>
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- proprietary-surveillance.ru.po 17 Jan 2018 17:02:53 -0000 1.333
+++ proprietary-surveillance.ru.po 25 Jan 2018 18:30:40 -0000 1.334
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-01-17 13:56+0000\n"
+"POT-Creation-Date: 2018-01-25 18:26+0000\n"
"PO-Revision-Date: 2018-01-17 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-01-25 18:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -185,7 +186,10 @@
msgstr "<a href=\"#SpywareInChrome\">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
Chrome</a>"
#. type: Content of: <div><div><ul><li><ul><li>
-msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+# | <a href=\"#SpywareInFlash\">Spyware in {+JavaScript and+} Flash</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
+msgid "<a href=\"#SpywareInFlash\">Spyware in JavaScript and Flash</a>"
msgstr "<a href=\"#SpywareInFlash\">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
Flash</a>"
#. type: Content of: <div><div><ul><li>
@@ -2773,51 +2777,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Some JavaScript malware <a href=\"https://www.theverge."
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\"> swipes usernames from browser-based password managers</a>."
-msgstr ""
-"ÐекоÑоÑÑе вÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript
<a href=\"https://www.theverge."
-"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
-"\"> ÑпиÑÑваÑÑ Ð¸Ð¼ÐµÐ½Ð° полÑзоваÑелей из
пÑогÑамм Ñ
ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð¿Ð°Ñолей на базе "
-"бÑаÑзеÑа</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some websites send JavaScript code to collect all the user's input, <a href="
-"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-"
-"personal-data-by-session-replay-scripts/\">which can then be used to "
-"reproduce the whole session</a>."
-msgstr ""
-"ÐекоÑоÑÑе ÑайÑÑ Ð¿Ð¾ÑÑлаÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript, ÑобиÑаÑÑие вÑе, ÑÑо Ð²Ð²Ð¾Ð´Ð¸Ñ "
-"полÑзоваÑелÑ, <a
href=\"https://freedom-to-tinker.com/2017/11/15/no-"
-"boundaries-exfiltration-of-personal-data-by-session-replay-scripts/\">а "
-"заÑем Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑÑого можно воÑпÑоизвеÑÑи
веÑÑ ÑÐµÐ°Ð½Ñ ÑабоÑÑ</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious JavaScript code."
-msgstr ""
-"ÐÑли полÑзоваÑÑÑÑ LibreJS, Ñо ÑÑи вÑедоноÑнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript "
-"блокиÑÑÑÑÑÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-"
-"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
-"information that users have typed into a form but not sent</a>, in order to "
-"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/"
-"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
-"Allege\"> getting sued</a> for this."
-msgstr ""
-"Ðногие ÑайÑÑ Ð¿Ð¾Ð»ÑзÑÑÑÑÑ Ð¿ÑогÑаммами на
JavaScript, ÑÑÐ¾Ð±Ñ <a href=\"http://"
-"gizmodo.com/before-you-hit-submit-this-company-has-already-"
-"logge-1795906081\">подглÑдÑваÑÑ, ÑÑо полÑзоваÑели
ввели в ÑоÑмÑ, но не "
-"оÑпÑавили</a>, ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделиÑÑ Ð¸Ñ
лиÑноÑÑÑ. Ðа некоÑоÑÑÑ
<a href=\"https://"
-"www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-"
-"Consumers-New-Suits-Allege\"> подали за ÑÑо в ÑÑд</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"When a page uses Disqus for comments, <a href=\"https://blog.dantup."
"com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-"
"sends-the-url-to-facebook\">the proprietary Disqus software loads a Facebook "
@@ -2919,6 +2878,96 @@
"пÑоÑмаÑÑиваÑÑ Ð´Ð°Ð½Ð½Ñе полÑзоваÑелÑ</a>."
#. type: Content of: <div><h4>
+# | Spyware in {+JavaScript and+} Flash
+#, fuzzy
+#| msgid "Spyware in Flash"
+msgid "Spyware in JavaScript and Flash"
+msgstr "ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² Flash"
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
+"\">#SpywareInFlash</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a href=\"https://www.theverge."
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> swipes usernames from browser-based password managers</a>."
+msgstr ""
+"ÐекоÑоÑÑе вÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript
<a href=\"https://www.theverge."
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> ÑпиÑÑваÑÑ Ð¸Ð¼ÐµÐ½Ð° полÑзоваÑелей из
пÑогÑамм Ñ
ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð¿Ð°Ñолей на базе "
+"бÑаÑзеÑа</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some websites send JavaScript code to collect all the user's input, <a href="
+"\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-"
+"personal-data-by-session-replay-scripts/\">which can then be used to "
+"reproduce the whole session</a>."
+msgstr ""
+"ÐекоÑоÑÑе ÑайÑÑ Ð¿Ð¾ÑÑлаÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript, ÑобиÑаÑÑие вÑе, ÑÑо Ð²Ð²Ð¾Ð´Ð¸Ñ "
+"полÑзоваÑелÑ, <a
href=\"https://freedom-to-tinker.com/2017/11/15/no-"
+"boundaries-exfiltration-of-personal-data-by-session-replay-scripts/\">а "
+"заÑем Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑÑого можно воÑпÑоизвеÑÑи
веÑÑ ÑÐµÐ°Ð½Ñ ÑабоÑÑ</a>."
+
+#. type: Content of: <ul><li><p>
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
+msgstr ""
+"ÐÑли полÑзоваÑÑÑÑ LibreJS, Ñо ÑÑи вÑедоноÑнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript "
+"блокиÑÑÑÑÑÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-"
+"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
+"information that users have typed into a form but not sent</a>, in order to "
+"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/"
+"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
+"Allege\"> getting sued</a> for this."
+msgstr ""
+"Ðногие ÑайÑÑ Ð¿Ð¾Ð»ÑзÑÑÑÑÑ Ð¿ÑогÑаммами на
JavaScript, ÑÑÐ¾Ð±Ñ <a href=\"http://"
+"gizmodo.com/before-you-hit-submit-this-company-has-already-"
+"logge-1795906081\">подглÑдÑваÑÑ, ÑÑо полÑзоваÑели
ввели в ÑоÑмÑ, но не "
+"оÑпÑавили</a>, ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделиÑÑ Ð¸Ñ
лиÑноÑÑÑ. Ðа некоÑоÑÑÑ
<a href=\"https://"
+"www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-"
+"Consumers-New-Suits-Allege\"> подали за ÑÑо в ÑÑд</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-"
+"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
+"a>."
+msgstr ""
+"ФÑнкÑÐ¸Ñ Ð¿ÑоигÑÑваÑÐµÐ»Ñ <a
href=\"http://www.imasuper.com/66/technology/flash-"
+"cookies-the-silent-privacy-killer/\"> Flash Ð¿Ð¾Ð¼Ð¾Ð³Ð°ÐµÑ ÑайÑам
оÑÑлеживаÑÑ "
+"поÑеÑиÑелей</a>."
+
+#. type: Content of: <ul><li><p>
+# | Flash [-is-] {+and JavaScript are+} also used for <a
+# |
href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\">
+# | “fingerprinting” devices[- -]</a> to identify users.
+#, fuzzy
+#| msgid ""
+#| "Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/"
+#| "top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> "
+#| "“fingerprinting” devices </a> to identify users."
+msgid ""
+"Flash and JavaScript are also used for <a href=\"http://arstechnica.com/"
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> “fingerprinting” devices</a> to identify "
+"users."
+msgstr ""
+"Flash Ñакже могÑÑ Ð¿ÑименÑÑÑ Ð´Ð»Ñ <a
href=\"http://arstechnica.com/"
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> ÑнÑÑÐ¸Ñ “оÑпеÑаÑков
палÑÑев” ÑÑÑÑойÑÑв </a> Ñ "
+"ÑелÑÑ Ð¸Ð´ÐµÐ½ÑиÑикаÑии полÑзоваÑелей."
+
+#. type: Content of: <div><h4>
msgid "Spyware in Chrome"
msgstr "ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² Chrome"
@@ -2972,48 +3021,6 @@
"detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
"\">полнÑÑ ÑÐ»ÐµÐ¶ÐºÑ Ð·Ð° полÑзованием
бÑаÑзеÑом</a>, и многие из ниÑ
Ñак и делаÑÑ."
-#. type: Content of: <div><h4>
-msgid "Spyware in Flash"
-msgstr "ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² Flash"
-
-#. type: Content of: <div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInFlash"
-"\">#SpywareInFlash</a>)</span>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-"
-"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
-"a>."
-msgstr ""
-"ФÑнкÑÐ¸Ñ Ð¿ÑоигÑÑваÑÐµÐ»Ñ <a
href=\"http://www.imasuper.com/66/technology/flash-"
-"cookies-the-silent-privacy-killer/\"> Flash Ð¿Ð¾Ð¼Ð¾Ð³Ð°ÐµÑ ÑайÑам
оÑÑлеживаÑÑ "
-"поÑеÑиÑелей</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/top-"
-"sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> “"
-"fingerprinting” devices </a> to identify users."
-msgstr ""
-"Flash Ñакже могÑÑ Ð¿ÑименÑÑÑ Ð´Ð»Ñ <a
href=\"http://arstechnica.com/"
-"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
-"fingerprinting/\"> ÑнÑÑÐ¸Ñ “оÑпеÑаÑков
палÑÑев” ÑÑÑÑойÑÑв </a> Ñ "
-"ÑелÑÑ Ð¸Ð´ÐµÐ½ÑиÑикаÑии полÑзоваÑелей."
-
-#. type: Content of: <p>
-msgid ""
-"<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is another "
-"method of “fingerprinting” devices."
-msgstr ""
-"<a href=\"/philosophy/javascript-trap.html\">ÐÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript</"
-"a> — дÑÑгой меÑод “ÑнÑÑиÑ
оÑпеÑаÑков палÑÑев” "
-"ÑÑÑÑойÑÑв."
-
#. type: Content of: <div><h3>
msgid "Spyware in Drones"
msgstr "ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² беÑпилоÑникаÑ
"
@@ -3186,6 +3193,14 @@
msgid "Updated:"
msgstr "Ðбновлено:"
+#~ msgid ""
+#~ "<a href=\"/philosophy/javascript-trap.html\">JavaScript code</a> is "
+#~ "another method of “fingerprinting” devices."
+#~ msgstr ""
+#~ "<a href=\"/philosophy/javascript-trap.html\">ÐÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript</"
+#~ "a> — дÑÑгой меÑод “ÑнÑÑиÑ
оÑпеÑаÑков палÑÑев” "
+#~ "ÑÑÑÑойÑÑв."
+
#~ msgid "Copyright © 2015, 2016, 2017 Free Software Foundation, Inc."
#~ msgstr ""
#~ "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."