[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-appliances.de.po mal...
From: |
GNUN |
Subject: |
www/proprietary/po malware-appliances.de.po mal... |
Date: |
Thu, 25 Jan 2018 14:30:47 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/01/25 14:30:47
Modified files:
proprietary/po : malware-appliances.de.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po malware-mobiles.de.po
malware-mobiles.es.po malware-mobiles.fr.po
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.103&r2=1.104
Patches:
Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- malware-appliances.de.po 19 Jan 2018 14:05:19 -0000 1.40
+++ malware-appliances.de.po 25 Jan 2018 19:30:47 -0000 1.41
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-11-19 08:26+0000\n"
+"POT-Creation-Date: 2018-01-25 19:26+0000\n"
"PO-Revision-Date: 2017-12-05 22:00 02:15+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-01-25 19:26+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -440,12 +441,29 @@
"der Hintertür</a>."
#. type: Content of: <ul><li><p>
+# | HP “storage appliances” that use the proprietary “Left
+# | Hand” operating system have back doors that give HP <a
+# |
[-href=\"http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/\">-]
+# |
{+href=\"https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/\">+}
+# | remote login access</a> to them. HP claims that this does not give HP
+# | access to the customer's data, but if the back door allows installation of
+# | software changes, a change could be installed that would give access to
+# | the customer's data.
+#, fuzzy
+#| msgid ""
+#| "HP “storage appliances” that use the proprietary “Left "
+#| "Hand” operating system have back doors that give HP <a href="
+#| "\"http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-"
+#| "enterprise-storage/\"> remote login access</a> to them. HP claims that "
+#| "this does not give HP access to the customer's data, but if the back door "
+#| "allows installation of software changes, a change could be installed that "
+#| "would give access to the customer's data."
msgid ""
"HP “storage appliances” that use the proprietary “Left "
-"Hand” operating system have back doors that give HP <a href=\"http://"
-"news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-"
-"storage/\"> remote login access</a> to them. HP claims that this does not "
-"give HP access to the customer's data, but if the back door allows "
+"Hand” operating system have back doors that give HP <a href=\"https://"
+"insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-"
+"enterprise-storage/\"> remote login access</a> to them. HP claims that this "
+"does not give HP access to the customer's data, but if the back door allows "
"installation of software changes, a change could be installed that would "
"give access to the customer's data."
msgstr ""
@@ -1118,8 +1136,12 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2016, 2017 Free Software Foundation, Inc."
-msgstr "Copyright © 2016, 2017 Free Software Foundation, Inc."
+# | Copyright © [-2014, 2015, 2016-] {+2016, 2017, 2018+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014, 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright © 2016, 2017, 2018 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2016 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -1143,6 +1165,9 @@
msgid "Updated:"
msgstr "Letzte Ãnderung:"
+#~ msgid "Copyright © 2016, 2017 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2016, 2017 Free Software Foundation, Inc."
+
#~ msgid ""
#~ "Tesla used a universal backdoor in its software to limit customers to "
#~ "using just <a href=\"https://techcrunch.com/2017/09/09/tesla-flips-a-"
Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- malware-appliances.fr.po 19 Nov 2017 11:22:45 -0000 1.62
+++ malware-appliances.fr.po 25 Jan 2018 19:30:47 -0000 1.63
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2017-11-19 08:26+0000\n"
+"POT-Creation-Date: 2018-01-25 19:26+0000\n"
"PO-Revision-Date: 2017-11-19 12:19+0100\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-01-25 19:26+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -391,12 +392,29 @@
"dérobée</a>."
#. type: Content of: <ul><li><p>
+# | HP “storage appliances” that use the proprietary “Left
+# | Hand” operating system have back doors that give HP <a
+# |
[-href=\"http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/\">-]
+# |
{+href=\"https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/\">+}
+# | remote login access</a> to them. HP claims that this does not give HP
+# | access to the customer's data, but if the back door allows installation of
+# | software changes, a change could be installed that would give access to
+# | the customer's data.
+#, fuzzy
+#| msgid ""
+#| "HP “storage appliances” that use the proprietary “Left "
+#| "Hand” operating system have back doors that give HP <a href="
+#| "\"http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-"
+#| "enterprise-storage/\"> remote login access</a> to them. HP claims that "
+#| "this does not give HP access to the customer's data, but if the back door "
+#| "allows installation of software changes, a change could be installed that "
+#| "would give access to the customer's data."
msgid ""
"HP “storage appliances” that use the proprietary “Left "
-"Hand” operating system have back doors that give HP <a href=\"http://"
-"news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-"
-"storage/\"> remote login access</a> to them. HP claims that this does not "
-"give HP access to the customer's data, but if the back door allows "
+"Hand” operating system have back doors that give HP <a href=\"https://"
+"insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-"
+"enterprise-storage/\"> remote login access</a> to them. HP claims that this "
+"does not give HP access to the customer's data, but if the back door allows "
"installation of software changes, a change could be installed that would "
"give access to the customer's data."
msgstr ""
@@ -990,8 +1008,12 @@
"README.translations.html\">guide de traduction</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2016, 2017 Free Software Foundation, Inc."
-msgstr "Copyright © 2016, 2017 Free Software Foundation, Inc."
+# | Copyright © [-2014, 2015, 2016-] {+2016, 2017, 2018+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014, 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright © 2016, 2017, 2018 Free Software Foundation, Inc."
+msgstr "Copyright © 2014, 2015, 2016 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -1015,6 +1037,9 @@
msgid "Updated:"
msgstr "Dernière mise à jour :"
+#~ msgid "Copyright © 2016, 2017 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2016, 2017 Free Software Foundation, Inc."
+
#~ msgid ""
#~ "Tesla used a universal backdoor in its software to limit customers to "
#~ "using just <a href=\"https://techcrunch.com/2017/09/09/tesla-flips-a-"
Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- malware-appliances.pot 19 Nov 2017 08:31:41 -0000 1.32
+++ malware-appliances.pot 25 Jan 2018 19:30:47 -0000 1.33
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2017-11-19 08:26+0000\n"
+"POT-Creation-Date: 2018-01-25 19:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -272,7 +272,7 @@
msgid ""
"HP “storage appliances” that use the proprietary “Left "
"Hand” operating system have back doors that give HP <a "
-"href=\"http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/\">
"
+"href=\"https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/\">
"
"remote login access</a> to them. HP claims that this does not give HP "
"access to the customer's data, but if the back door allows installation of "
"software changes, a change could be installed that would give access to the "
@@ -669,7 +669,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2016, 2017 Free Software Foundation, Inc."
+msgid "Copyright © 2016, 2017, 2018 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <div><p>
Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- malware-appliances.ru.po 20 Nov 2017 07:59:44 -0000 1.85
+++ malware-appliances.ru.po 25 Jan 2018 19:30:47 -0000 1.86
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2017-11-19 08:26+0000\n"
+"POT-Creation-Date: 2018-01-25 19:26+0000\n"
"PO-Revision-Date: 2017-11-20 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-01-25 19:26+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -381,12 +382,29 @@
"arris-cable-modem-has-backdoor-in.html?m=1\"> ÑеÑнÑй Ñ
од в
ÑеÑном Ñ
оде</a>."
#. type: Content of: <ul><li><p>
+# | HP “storage appliances” that use the proprietary “Left
+# | Hand” operating system have back doors that give HP <a
+# |
[-href=\"http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/\">-]
+# |
{+href=\"https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/\">+}
+# | remote login access</a> to them. HP claims that this does not give HP
+# | access to the customer's data, but if the back door allows installation of
+# | software changes, a change could be installed that would give access to
+# | the customer's data.
+#, fuzzy
+#| msgid ""
+#| "HP “storage appliances” that use the proprietary “Left "
+#| "Hand” operating system have back doors that give HP <a href="
+#| "\"http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-"
+#| "enterprise-storage/\"> remote login access</a> to them. HP claims that "
+#| "this does not give HP access to the customer's data, but if the back door "
+#| "allows installation of software changes, a change could be installed that "
+#| "would give access to the customer's data."
msgid ""
"HP “storage appliances” that use the proprietary “Left "
-"Hand” operating system have back doors that give HP <a href=\"http://"
-"news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-"
-"storage/\"> remote login access</a> to them. HP claims that this does not "
-"give HP access to the customer's data, but if the back door allows "
+"Hand” operating system have back doors that give HP <a href=\"https://"
+"insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-"
+"enterprise-storage/\"> remote login access</a> to them. HP claims that this "
+"does not give HP access to the customer's data, but if the back door allows "
"installation of software changes, a change could be installed that would "
"give access to the customer's data."
msgstr ""
@@ -966,10 +984,13 @@
"пÑедложениÑм пеÑеводов наÑиÑ
ÑÑаÑей Ñм. в
<a href=\"/server/standards/README."
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
-# type: Content of: <div><p>
#. type: Content of: <div><p>
-msgid "Copyright © 2016, 2017 Free Software Foundation, Inc."
-msgstr "Copyright © 2016, 2017 Free Software Foundation, Inc."
+# | Copyright © [-2014, 2015, 2016-] {+2016, 2017, 2018+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014, 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright © 2016, 2017, 2018 Free Software Foundation, Inc."
+msgstr "Copyright © 2014, 2015, 2016 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -997,6 +1018,10 @@
msgid "Updated:"
msgstr "Ðбновлено:"
+# type: Content of: <div><p>
+#~ msgid "Copyright © 2016, 2017 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2016, 2017 Free Software Foundation, Inc."
+
#~ msgid ""
#~ "Tesla used a universal backdoor in its software to limit customers to "
#~ "using just <a href=\"https://techcrunch.com/2017/09/09/tesla-flips-a-"
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- malware-mobiles.de.po 19 Jan 2018 14:05:19 -0000 1.70
+++ malware-mobiles.de.po 25 Jan 2018 19:30:47 -0000 1.71
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-01-12 11:56+0000\n"
+"POT-Creation-Date: 2018-01-25 19:26+0000\n"
"PO-Revision-Date: 2017-10-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -412,14 +412,32 @@
"philosophy/surveillance-vs-democracy\">Bezahlverfahren nicht anonym</a> ist."
#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">
+# | The NSA can tap data in smart phones, including iPhones, Android, and
+# | BlackBerry</a>. While there is not much detail here, it seems that this
+# | does not operate via the universal back door that we know nearly all
+# | portable phones have. It may involve exploiting various bugs. There are <a
+# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
+# | {+href=\"#universal-back-door\">+} lots of bugs in the phones' radio
+# | software</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#| "smart phones, including iPhones, Android, and BlackBerry</a>. While there "
+#| "is not much detail here, it seems that this does not operate via the "
+#| "universal back door that we know nearly all portable phones have. It may "
+#| "involve exploiting various bugs. There are <a href=\"http://www.osnews."
+#| "com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
+#| "\"> lots of bugs in the phones' radio software</a>."
msgid ""
"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
"phones, including iPhones, Android, and BlackBerry</a>. While there is not "
"much detail here, it seems that this does not operate via the universal back "
"door that we know nearly all portable phones have. It may involve exploiting "
-"various bugs. There are <a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
+"various bugs. There are <a href=\"#universal-back-door\"> lots of bugs in "
"the phones' radio software</a>."
msgstr ""
"US-Geheimdienst <a href=\"//www.spiegel.de/international/world/privacy-"
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-mobiles.es.po 14 Jan 2018 10:45:44 -0000 1.65
+++ malware-mobiles.es.po 25 Jan 2018 19:30:47 -0000 1.66
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-01-12 11:56+0000\n"
+"POT-Creation-Date: 2018-01-25 19:26+0000\n"
"PO-Revision-Date: 2018-01-14 11:41+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-01-25 19:26+0000\n"
"X-Generator: Poedit 1.8.11\n"
#. type: Content of: <title>
@@ -357,14 +358,32 @@
"surveillance-vs-democracy.html\">el pago no es anónimo</a>."
#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">
+# | The NSA can tap data in smart phones, including iPhones, Android, and
+# | BlackBerry</a>. While there is not much detail here, it seems that this
+# | does not operate via the universal back door that we know nearly all
+# | portable phones have. It may involve exploiting various bugs. There are <a
+# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
+# | {+href=\"#universal-back-door\">+} lots of bugs in the phones' radio
+# | software</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#| "smart phones, including iPhones, Android, and BlackBerry</a>. While there "
+#| "is not much detail here, it seems that this does not operate via the "
+#| "universal back door that we know nearly all portable phones have. It may "
+#| "involve exploiting various bugs. There are <a href=\"http://www.osnews."
+#| "com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
+#| "\"> lots of bugs in the phones' radio software</a>."
msgid ""
"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
"phones, including iPhones, Android, and BlackBerry</a>. While there is not "
"much detail here, it seems that this does not operate via the universal back "
"door that we know nearly all portable phones have. It may involve exploiting "
-"various bugs. There are <a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
+"various bugs. There are <a href=\"#universal-back-door\"> lots of bugs in "
"the phones' radio software</a>."
msgstr ""
"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- malware-mobiles.fr.po 14 Jan 2018 11:57:29 -0000 1.77
+++ malware-mobiles.fr.po 25 Jan 2018 19:30:47 -0000 1.78
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-01-12 11:56+0000\n"
+"POT-Creation-Date: 2018-01-25 19:26+0000\n"
"PO-Revision-Date: 2018-01-14 12:56+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-01-25 19:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -358,14 +359,32 @@
"surveillance-vs-democracy.html\">le paiement n'est pas anonyme</a>."
#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">
+# | The NSA can tap data in smart phones, including iPhones, Android, and
+# | BlackBerry</a>. While there is not much detail here, it seems that this
+# | does not operate via the universal back door that we know nearly all
+# | portable phones have. It may involve exploiting various bugs. There are <a
+# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
+# | {+href=\"#universal-back-door\">+} lots of bugs in the phones' radio
+# | software</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#| "smart phones, including iPhones, Android, and BlackBerry</a>. While there "
+#| "is not much detail here, it seems that this does not operate via the "
+#| "universal back door that we know nearly all portable phones have. It may "
+#| "involve exploiting various bugs. There are <a href=\"http://www.osnews."
+#| "com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
+#| "\"> lots of bugs in the phones' radio software</a>."
msgid ""
"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
"phones, including iPhones, Android, and BlackBerry</a>. While there is not "
"much detail here, it seems that this does not operate via the universal back "
"door that we know nearly all portable phones have. It may involve exploiting "
-"various bugs. There are <a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
+"various bugs. There are <a href=\"#universal-back-door\"> lots of bugs in "
"the phones' radio software</a>."
msgstr ""
"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-mobiles.it.po 12 Jan 2018 12:02:54 -0000 1.76
+++ malware-mobiles.it.po 25 Jan 2018 19:30:47 -0000 1.77
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-01-12 11:56+0000\n"
+"POT-Creation-Date: 2018-01-25 19:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -389,14 +389,32 @@
"philosophy/surveillance-vs-democracy.html\">i pagamenti non sono anonimi</a>."
#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">
+# | The NSA can tap data in smart phones, including iPhones, Android, and
+# | BlackBerry</a>. While there is not much detail here, it seems that this
+# | does not operate via the universal back door that we know nearly all
+# | portable phones have. It may involve exploiting various bugs. There are <a
+# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
+# | {+href=\"#universal-back-door\">+} lots of bugs in the phones' radio
+# | software</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#| "smart phones, including iPhones, Android, and BlackBerry</a>. While there "
+#| "is not much detail here, it seems that this does not operate via the "
+#| "universal back door that we know nearly all portable phones have. It may "
+#| "involve exploiting various bugs. There are <a href=\"http://www.osnews."
+#| "com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
+#| "\"> lots of bugs in the phones' radio software</a>."
msgid ""
"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
"phones, including iPhones, Android, and BlackBerry</a>. While there is not "
"much detail here, it seems that this does not operate via the universal back "
"door that we know nearly all portable phones have. It may involve exploiting "
-"various bugs. There are <a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
+"various bugs. There are <a href=\"#universal-back-door\"> lots of bugs in "
"the phones' radio software</a>."
msgstr ""
"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- malware-mobiles.ja-diff.html 12 Jan 2018 12:02:54 -0000 1.25
+++ malware-mobiles.ja-diff.html 25 Jan 2018 19:30:47 -0000 1.26
@@ -48,15 +48,13 @@
the developer's awareness that the users would be powerless to fix any
malicious functionalities tempts the developer to impose some.
</p>
-</div>
-<span class="inserted"><ins><em><div class="highlight-para">
-<p>Nearly all mobile phones do two grievous wrongs to their users:
+<span class="inserted"><ins><em><p>Nearly all mobile phones do two
grievous wrongs to their users:
tracking their movements, and listening to their conversations. This
-is why we call them “Stalin's dream”.</p>
+is why we call them “Stalin's dream”.</p></em></ins></span>
</div>
-<ul>
+<span class="inserted"><ins><em><ul>
<li><p>The phone network
<a href="https://ssd.eff.org/en/module/problem-mobile-phones">
tracks the movements of each phone</a>.</p>
@@ -163,8 +161,8 @@
<span
class="removed"><del><strong>href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
title="at the Wayback Machine (archived May 20,
2015)">forcibly</strong></del></span> <span
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
forcibly</em></ins></span> and remotely install apps</a> through <span
class="removed"><del><strong>GTalkService (which seems, since that article, to
have
-been merged into Google Play). This adds up</strong></del></span> <span
class="inserted"><ins><em>Google Play.
- This is not equivalent</em></ins></span> to a universal back <span
class="removed"><del><strong>door.</strong></del></span> <span
class="inserted"><ins><em>door, but permits various
+been merged into</strong></del></span> Google <span
class="removed"><del><strong>Play).</strong></del></span> <span
class="inserted"><ins><em>Play.</em></ins></span>
+ This <span class="removed"><del><strong>adds up</strong></del></span> <span
class="inserted"><ins><em>is not equivalent</em></ins></span> to a universal
back <span class="removed"><del><strong>door.</strong></del></span> <span
class="inserted"><ins><em>door, but permits various
dirty tricks.</em></ins></span>
</p>
@@ -222,7 +220,7 @@
BlackBerry</a>. While there is not much detail here, it seems that this
does not operate via the universal back door that we know nearly all
portable phones have. It may involve exploiting various bugs. There are
- <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ <a href="#universal-back-door">
lots of bugs in the phones' radio software</a>.</p>
</li>
</ul>
@@ -586,7 +584,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/12 12:02:54 $
+$Date: 2018/01/25 19:30:47 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- malware-mobiles.ja.po 12 Jan 2018 12:02:54 -0000 1.64
+++ malware-mobiles.ja.po 25 Jan 2018 19:30:47 -0000 1.65
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-01-12 11:56+0000\n"
+"POT-Creation-Date: 2018-01-25 19:26+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -332,14 +332,23 @@
"\">æ¯æããå¿åã§ã¯ãªã</a>ãã¨ã§ãã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#| "smart phones, including iPhones, Android, and BlackBerry</a>. While there "
+#| "is not much detail here, it seems that this does not operate via the "
+#| "universal back door that we know nearly all portable phones have. It may "
+#| "involve exploiting various bugs. There are <a href=\"http://www.osnews."
+#| "com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
+#| "\"> lots of bugs in the phones' radio software</a>."
msgid ""
"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
"phones, including iPhones, Android, and BlackBerry</a>. While there is not "
"much detail here, it seems that this does not operate via the universal back "
"door that we know nearly all portable phones have. It may involve exploiting "
-"various bugs. There are <a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
+"various bugs. There are <a href=\"#universal-back-door\"> lots of bugs in "
"the phones' radio software</a>."
msgstr ""
"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-mobiles.pot 12 Jan 2018 12:02:54 -0000 1.43
+++ malware-mobiles.pot 25 Jan 2018 19:30:47 -0000 1.44
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-01-12 11:56+0000\n"
+"POT-Creation-Date: 2018-01-25 19:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -257,8 +257,8 @@
"BlackBerry</a>. While there is not much detail here, it seems that this does "
"not operate via the universal back door that we know nearly all portable "
"phones have. It may involve exploiting various bugs. There are <a "
-"href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
"
-"lots of bugs in the phones' radio software</a>."
+"href=\"#universal-back-door\"> lots of bugs in the phones' radio "
+"software</a>."
msgstr ""
#. type: Content of: <h3>
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-mobiles.ru.po 17 Jan 2018 16:32:15 -0000 1.103
+++ malware-mobiles.ru.po 25 Jan 2018 19:30:47 -0000 1.104
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-01-12 11:56+0000\n"
+"POT-Creation-Date: 2018-01-25 19:26+0000\n"
"PO-Revision-Date: 2018-01-12 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-01-25 19:26+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -351,14 +352,32 @@
"democracy.html\">плаÑежи не анонимнÑ</a>."
#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">
+# | The NSA can tap data in smart phones, including iPhones, Android, and
+# | BlackBerry</a>. While there is not much detail here, it seems that this
+# | does not operate via the universal back door that we know nearly all
+# | portable phones have. It may involve exploiting various bugs. There are <a
+# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
+# | {+href=\"#universal-back-door\">+} lots of bugs in the phones' radio
+# | software</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#| "smart phones, including iPhones, Android, and BlackBerry</a>. While there "
+#| "is not much detail here, it seems that this does not operate via the "
+#| "universal back door that we know nearly all portable phones have. It may "
+#| "involve exploiting various bugs. There are <a href=\"http://www.osnews."
+#| "com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
+#| "\"> lots of bugs in the phones' radio software</a>."
msgid ""
"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
"phones, including iPhones, Android, and BlackBerry</a>. While there is not "
"much detail here, it seems that this does not operate via the universal back "
"door that we know nearly all portable phones have. It may involve exploiting "
-"various bugs. There are <a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
+"various bugs. There are <a href=\"#universal-back-door\"> lots of bugs in "
"the phones' radio software</a>."
msgstr ""
"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary/po malware-appliances.de.po mal...,
GNUN <=