[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-appliances.ru.html malw...
From: |
GNUN |
Subject: |
www/proprietary malware-appliances.ru.html malw... |
Date: |
Fri, 26 Jan 2018 04:01:26 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/01/26 04:01:26
Modified files:
proprietary : malware-appliances.ru.html
malware-mobiles.ru.html
proprietary-surveillance.ru.html
proprietary/po : malware-appliances.ru-en.html
malware-appliances.ru.po
malware-mobiles.ru-en.html
malware-mobiles.ru.po
proprietary-surveillance.ru-en.html
proprietary-surveillance.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.ru.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru-en.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.335&r2=1.336
Patches:
Index: malware-appliances.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.ru.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- malware-appliances.ru.html 20 Nov 2017 07:59:44 -0000 1.31
+++ malware-appliances.ru.html 26 Jan 2018 09:01:25 -0000 1.32
@@ -203,7 +203,7 @@
<p>Ð “пÑиложениÑÑ
Ð´Ð»Ñ Ñ
ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð´Ð°Ð½Ð½ÑÑ
” Hewlett-Packard, в коÑоÑÑÑ
пÑименÑеÑÑÑ Ð½ÐµÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑионнаÑ
ÑиÑÑема “Left Hand”, еÑÑÑ
ÑеÑнÑе Ñ
одÑ, коÑоÑÑе даÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸ <a
-href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
ÑÑеÑнÑÑ Ð·Ð°Ð¿Ð¸ÑÑ Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа по ÑеÑи</a>.
ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑÑвеÑждаеÑ, ÑÑо ÑÑо не даеÑ
ей доÑÑÑпа к даннÑм клиенÑа, но Ñаз ÑеÑнÑй Ñ
од позволÑÐµÑ Ð¸Ð·Ð¼ÐµÐ½ÑÑÑ
ÑÑÑановленнÑе пÑогÑаммÑ, Ñо иÑ
можно
измениÑÑ Ñак, ÑÑÐ¾Ð±Ñ Ð¿ÑогÑаммÑ
@@ -570,7 +570,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright © 2016, 2017, 2018 Free Software Foundation, Inc.</p>
<p>ÐÑо пÑоизведение доÑÑÑпно по <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.ru">лиÑензии
@@ -590,7 +590,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2017/11/20 07:59:44 $
+$Date: 2018/01/26 09:01:25 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- malware-mobiles.ru.html 17 Jan 2018 17:02:52 -0000 1.36
+++ malware-mobiles.ru.html 26 Jan 2018 09:01:25 -0000 1.37
@@ -38,9 +38,7 @@
Ñого, ÑÑо полÑзоваÑели бÑдÑÑ Ð±ÐµÑÑилÑнÑ
иÑпÑавиÑÑ Ð»ÑбÑе вÑедоноÑнÑе ÑÑнкÑии,
ÑоблазнÑÐµÑ ÑазÑабоÑÑика вноÑиÑÑ Ñакие
ÑÑнкÑии.
</p>
-</div>
-<div class="highlight-para">
<p>ÐоÑÑи вÑе мобилÑнÑе ÑелеÑÐ¾Ð½Ñ Ð¿ÑиÑинÑÑÑ
две ÑеÑÑезнÑÑ
неÑпÑаведливоÑÑи Ñвоим
полÑзоваÑелÑм: оÑÑлеживаÑÑ Ð¸Ñ
пеÑемеÑениÑ
и пÑоÑлÑÑиваÑÑ Ð¸Ñ
пеÑеговоÑÑ. ÐоÑ
поÑÐµÐ¼Ñ Ð¼Ñ Ð½Ð°Ð·Ñваем иÑ
“меÑÑой
СÑалина”.</p>
@@ -200,9 +198,8 @@
и BlackBerry</a>. ХоÑÑ Ð¿Ð¾Ð´ÑобноÑÑи здеÑÑ Ð½Ðµ
пÑиводÑÑÑÑ, поÑ
оже, ÑÑо ÑабоÑаеÑ
не как ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, коÑоÑÑй,
как Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ Ð¿Ð¾ÑÑи во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
. ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ
ÑвÑзано Ñ ÑкÑплÑаÑаÑией ÑазлиÑнÑÑ
-оÑибок. <a
-href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
-РпÑогÑаммаÑ
ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов
еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво оÑибок</a>.</p>
+оÑибок. <a href="#universal-back-door"> РпÑогÑаммаÑ
ÑадиоаппаÑаÑÑÑÑ
+ÑелеÑонов еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво оÑибок</a>.</p>
</li>
</ul>
@@ -583,7 +580,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/01/17 17:02:52 $
+$Date: 2018/01/26 09:01:25 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary-surveillance.ru.html 17 Jan 2018 17:02:52 -0000 1.111
+++ proprietary-surveillance.ru.html 26 Jan 2018 09:01:25 -0000 1.112
@@ -105,7 +105,7 @@
<li><a href="#SpywareOnTheWeb">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
ÐнÑеÑнеÑе</a>
<ul>
<li><a href="#SpywareInChrome">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
Chrome</a></li>
- <li><a href="#SpywareInFlash">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
Flash</a></li>
+ <li><a href="#SpywareInFlash">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
JavaScript и Flash</a></li>
</ul>
</li>
<li><a href="#SpywareInDrones">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
беÑпилоÑникаÑ
</a></li>
@@ -1420,31 +1420,6 @@
ÑмÑÑла</a>, но вÑе Ñавно Ñлежка ÑвлÑеÑÑÑ
злоÑпоÑÑеблением.</p>
<ul>
- <li>
- <p>ÐекоÑоÑÑе вÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript <a
-href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
-ÑпиÑÑваÑÑ Ð¸Ð¼ÐµÐ½Ð° полÑзоваÑелей из пÑогÑамм
Ñ
ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð¿Ð°Ñолей на базе
-бÑаÑзеÑа</a>.</p>
- </li>
-
- <li>
- <p>ÐекоÑоÑÑе ÑайÑÑ Ð¿Ð¾ÑÑлаÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript, ÑобиÑаÑÑие вÑе, ÑÑо вводиÑ
-полÑзоваÑелÑ, <a
-href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">а
-заÑем Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑÑого можно воÑпÑоизвеÑÑи
веÑÑ ÑÐµÐ°Ð½Ñ ÑабоÑÑ</a>.</p>
-
- <p>ÐÑли полÑзоваÑÑÑÑ LibreJS, Ñо ÑÑи
вÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript
-блокиÑÑÑÑÑÑ.</p>
- </li>
-
- <li><p>Ðногие ÑайÑÑ Ð¿Ð¾Ð»ÑзÑÑÑÑÑ Ð¿ÑогÑаммами
на JavaScript, ÑÑÐ¾Ð±Ñ <a
-href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">подглÑдÑваÑÑ,
-ÑÑо полÑзоваÑели ввели в ÑоÑмÑ, но не
оÑпÑавили</a>, ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделиÑÑ Ð¸Ñ
-лиÑноÑÑÑ. Ðа некоÑоÑÑÑ
<a
-href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
-подали за ÑÑо в ÑÑд</a>.</p>
- </li>
-
<li><p>Ðогда Ð´Ð»Ñ ÐºÐ¾Ð¼Ð¼ÐµÐ½ÑаÑиев на ÑÑÑаниÑе
пÑименÑеÑÑÑ Disqus, <a
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">неÑвободнаÑ
пÑогÑамма Disqus загÑÑÐ¶Ð°ÐµÑ Ð¿Ð°ÐºÐµÑ Ð¿ÑогÑамм из
Facebook в бÑаÑÐ·ÐµÑ ÐºÐ°Ð¶Ð´Ð¾Ð¼Ñ
@@ -1499,6 +1474,51 @@
<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-subsection">
+ <h4 id="SpywareInFlash">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² JavaScript и
Flash</h4>
+ <span class="anchor-reference-id">(<a
+href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>ÐекоÑоÑÑе вÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript <a
+href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
+ÑпиÑÑваÑÑ Ð¸Ð¼ÐµÐ½Ð° полÑзоваÑелей из пÑогÑамм
Ñ
ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð¿Ð°Ñолей на базе
+бÑаÑзеÑа</a>.</p>
+ </li>
+
+ <li>
+ <p>ÐекоÑоÑÑе ÑайÑÑ Ð¿Ð¾ÑÑлаÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript, ÑобиÑаÑÑие вÑе, ÑÑо вводиÑ
+полÑзоваÑелÑ, <a
+href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">а
+заÑем Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑÑого можно воÑпÑоизвеÑÑи
веÑÑ ÑÐµÐ°Ð½Ñ ÑабоÑÑ</a>.</p>
+
+ <p>ÐÑли полÑзоваÑÑÑÑ LibreJS, Ñо ÑÑи
вÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript
+блокиÑÑÑÑÑÑ.</p>
+ </li>
+
+ <li><p>Ðногие ÑайÑÑ Ð¿Ð¾Ð»ÑзÑÑÑÑÑ Ð¿ÑогÑаммами
на JavaScript, ÑÑÐ¾Ð±Ñ <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">подглÑдÑваÑÑ,
+ÑÑо полÑзоваÑели ввели в ÑоÑмÑ, но не
оÑпÑавили</a>, ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделиÑÑ Ð¸Ñ
+лиÑноÑÑÑ. Ðа некоÑоÑÑÑ
<a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+подали за ÑÑо в ÑÑд</a>.</p>
+ </li>
+
+ <li><p>ФÑнкÑÐ¸Ñ Ð¿ÑоигÑÑваÑÐµÐ»Ñ <a
+href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+Flash Ð¿Ð¾Ð¼Ð¾Ð³Ð°ÐµÑ ÑайÑам оÑÑлеживаÑÑ
поÑеÑиÑелей</a>.</p>
+ </li>
+
+ <li><p>Flash и JavaScript Ñакже могÑÑ Ð¿ÑименÑÑÑ Ð´Ð»Ñ <a
+href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ÑнÑÑÐ¸Ñ “оÑпеÑаÑков палÑÑев”
ÑÑÑÑойÑÑв</a> Ñ ÑелÑÑ Ð¸Ð´ÐµÐ½ÑиÑикаÑии
+полÑзоваÑелей.</p>
+ </li>
+</ul>
+
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+<div class="big-subsection">
<h4 id="SpywareInChrome">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² Chrome</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
@@ -1527,30 +1547,6 @@
</li>
</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInFlash">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² Flash</h4>
- <span class="anchor-reference-id">(<a
-href="#SpywareInFlash">#SpywareInFlash</a>)</span>
-</div>
-
-<ul>
- <li><p>ФÑнкÑÐ¸Ñ Ð¿ÑоигÑÑваÑÐµÐ»Ñ <a
-href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
-Flash Ð¿Ð¾Ð¼Ð¾Ð³Ð°ÐµÑ ÑайÑам оÑÑлеживаÑÑ
поÑеÑиÑелей</a>.</p>
- </li>
-
- <li><p>Flash Ñакже могÑÑ Ð¿ÑименÑÑÑ Ð´Ð»Ñ <a
-href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
-ÑнÑÑÐ¸Ñ “оÑпеÑаÑков палÑÑев”
ÑÑÑÑойÑÑв </a> Ñ ÑелÑÑ Ð¸Ð´ÐµÐ½ÑиÑикаÑии
-полÑзоваÑелей.</p>
- </li>
-</ul>
-
-<p><a href="/philosophy/javascript-trap.html">ÐÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
-JavaScript</a> — дÑÑгой меÑод “ÑнÑÑиÑ
оÑпеÑаÑков
-палÑÑев” ÑÑÑÑойÑÑв.</p>
-
<!-- #SpywareInDrones -->
<div class="big-section">
<h3 id="SpywareInDrones">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
беÑпилоÑникаÑ
</h3>
@@ -1691,7 +1687,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/01/17 17:02:52 $
+$Date: 2018/01/26 09:01:25 $
<!-- timestamp end -->
</p>
Index: po/malware-appliances.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru-en.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- po/malware-appliances.ru-en.html 20 Nov 2017 07:59:44 -0000 1.32
+++ po/malware-appliances.ru-en.html 26 Jan 2018 09:01:26 -0000 1.33
@@ -187,7 +187,7 @@
<p>HP “storage appliances” that use the proprietary
“Left Hand” operating system have back doors that give HP
<a
-href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
remote login access</a> to them. HP claims that this does not give HP
access to the customer's data, but if the back door allows
installation of software changes, a change could be installed that
@@ -533,7 +533,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright © 2016, 2017, 2018 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -543,7 +543,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/11/20 07:59:44 $
+$Date: 2018/01/26 09:01:26 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- po/malware-appliances.ru.po 26 Jan 2018 08:37:11 -0000 1.87
+++ po/malware-appliances.ru.po 26 Jan 2018 09:01:26 -0000 1.88
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-01-25 19:26+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -382,22 +381,6 @@
"arris-cable-modem-has-backdoor-in.html?m=1\"> ÑеÑнÑй Ñ
од в
ÑеÑном Ñ
оде</a>."
#. type: Content of: <ul><li><p>
-# | HP “storage appliances” that use the proprietary “Left
-# | Hand” operating system have back doors that give HP <a
-# |
[-href=\"http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/\">-]
-# |
{+href=\"https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/\">+}
-# | remote login access</a> to them. HP claims that this does not give HP
-# | access to the customer's data, but if the back door allows installation of
-# | software changes, a change could be installed that would give access to
-# | the customer's data.
-#| msgid ""
-#| "HP “storage appliances” that use the proprietary “Left "
-#| "Hand” operating system have back doors that give HP <a href="
-#| "\"http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-"
-#| "enterprise-storage/\"> remote login access</a> to them. HP claims that "
-#| "this does not give HP access to the customer's data, but if the back door "
-#| "allows installation of software changes, a change could be installed that "
-#| "would give access to the customer's data."
msgid ""
"HP “storage appliances” that use the proprietary “Left "
"Hand” operating system have back doors that give HP <a href=\"https://"
@@ -409,13 +392,12 @@
msgstr ""
"Ð “пÑиложениÑÑ
Ð´Ð»Ñ Ñ
ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð´Ð°Ð½Ð½ÑÑ
”
Hewlett-Packard, в коÑоÑÑÑ
"
"пÑименÑеÑÑÑ Ð½ÐµÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑионнаÑ
ÑиÑÑема “Left Hand”, еÑÑÑ "
-"ÑеÑнÑе Ñ
одÑ, коÑоÑÑе даÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸ <a
href=\"https://"
-"insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-"
-"enterprise-storage/\"> ÑÑеÑнÑÑ "
-"запиÑÑ Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа по ÑеÑи</a>. ÐомпаниÑ
ÑÑвеÑждаеÑ, ÑÑо ÑÑо не Ð´Ð°ÐµÑ ÐµÐ¹ "
-"доÑÑÑпа к даннÑм клиенÑа, но Ñаз ÑеÑнÑй Ñ
од позволÑÐµÑ Ð¸Ð·Ð¼ÐµÐ½ÑÑÑ ÑÑÑановленнÑе "
-"пÑогÑаммÑ, Ñо иÑ
можно измениÑÑ Ñак, ÑÑобÑ
пÑогÑÐ°Ð¼Ð¼Ñ Ð¿ÑедоÑÑавлÑли доÑÑÑп к "
-"даннÑм клиенÑа."
+"ÑеÑнÑе Ñ
одÑ, коÑоÑÑе даÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸ <a
href=\"https://insights.dice."
+"com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"
+"\"> ÑÑеÑнÑÑ Ð·Ð°Ð¿Ð¸ÑÑ Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа по ÑеÑи</a>.
ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑÑвеÑждаеÑ, ÑÑо ÑÑо не "
+"Ð´Ð°ÐµÑ ÐµÐ¹ доÑÑÑпа к даннÑм клиенÑа, но Ñаз
ÑеÑнÑй Ñ
од позволÑÐµÑ Ð¸Ð·Ð¼ÐµÐ½ÑÑÑ "
+"ÑÑÑановленнÑе пÑогÑаммÑ, Ñо иÑ
можно
измениÑÑ Ñак, ÑÑÐ¾Ð±Ñ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ "
+"пÑедоÑÑавлÑли доÑÑÑп к даннÑм клиенÑа."
#. type: Content of: <ul><li><p>
msgid ""
@@ -985,9 +967,6 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2014, 2015, 2016-] {+2016, 2017, 2018+} Free Software
-# | Foundation, Inc.
-#| msgid "Copyright © 2014, 2015, 2016 Free Software Foundation, Inc."
msgid "Copyright © 2016, 2017, 2018 Free Software Foundation, Inc."
msgstr "Copyright © 2016, 2017, 2018 Free Software Foundation, Inc."
Index: po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- po/malware-mobiles.ru-en.html 17 Jan 2018 17:02:53 -0000 1.34
+++ po/malware-mobiles.ru-en.html 26 Jan 2018 09:01:26 -0000 1.35
@@ -31,9 +31,7 @@
the developer's awareness that the users would be powerless to fix any
malicious functionalities tempts the developer to impose some.
</p>
-</div>
-<div class="highlight-para">
<p>Nearly all mobile phones do two grievous wrongs to their users:
tracking their movements, and listening to their conversations. This
is why we call them “Stalin's dream”.</p>
@@ -188,7 +186,7 @@
BlackBerry</a>. While there is not much detail here, it seems that this
does not operate via the universal back door that we know nearly all
portable phones have. It may involve exploiting various bugs. There are
- <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ <a href="#universal-back-door">
lots of bugs in the phones' radio software</a>.</p>
</li>
</ul>
@@ -532,7 +530,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/17 17:02:53 $
+$Date: 2018/01/26 09:01:26 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- po/malware-mobiles.ru.po 26 Jan 2018 08:37:11 -0000 1.105
+++ po/malware-mobiles.ru.po 26 Jan 2018 09:01:26 -0000 1.106
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-01-25 19:26+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -352,24 +351,6 @@
"democracy.html\">плаÑежи не анонимнÑ</a>."
#. type: Content of: <ul><li><p>
-# | <a
-# |
href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">
-# | The NSA can tap data in smart phones, including iPhones, Android, and
-# | BlackBerry</a>. While there is not much detail here, it seems that this
-# | does not operate via the universal back door that we know nearly all
-# | portable phones have. It may involve exploiting various bugs. There are <a
-# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
-# | {+href=\"#universal-back-door\">+} lots of bugs in the phones' radio
-# | software</a>.
-#| msgid ""
-#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
-#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
-#| "smart phones, including iPhones, Android, and BlackBerry</a>. While there "
-#| "is not much detail here, it seems that this does not operate via the "
-#| "universal back door that we know nearly all portable phones have. It may "
-#| "involve exploiting various bugs. There are <a href=\"http://www.osnews."
-#| "com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
-#| "\"> lots of bugs in the phones' radio software</a>."
msgid ""
"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
@@ -384,8 +365,9 @@
"ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone, Android и
BlackBerry</a>. ХоÑÑ "
"подÑобноÑÑи здеÑÑ Ð½Ðµ пÑиводÑÑÑÑ, поÑ
оже,
ÑÑо ÑабоÑÐ°ÐµÑ Ð½Ðµ как ÑнивеÑÑалÑнÑй "
"ÑеÑнÑй Ñ
од, коÑоÑÑй, как Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ
поÑÑи во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
. "
-"ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑвÑзано Ñ ÑкÑплÑаÑаÑией
ÑазлиÑнÑÑ
оÑибок. <a href=\"#universal-back-door\"> Ð
пÑогÑаммаÑ
"
-"ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво
оÑибок</a>."
+"ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑвÑзано Ñ ÑкÑплÑаÑаÑией
ÑазлиÑнÑÑ
оÑибок. <a href="
+"\"#universal-back-door\"> РпÑогÑаммаÑ
ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ "
+"множеÑÑво оÑибок</a>."
#. type: Content of: <h3>
msgid "Mobile Surveillance"
Index: po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- po/proprietary-surveillance.ru-en.html 17 Jan 2018 17:02:53 -0000
1.104
+++ po/proprietary-surveillance.ru-en.html 26 Jan 2018 09:01:26 -0000
1.105
@@ -98,7 +98,7 @@
<li><a href="#SpywareOnTheWeb">Spyware on the Web</a>
<ul>
<li><a href="#SpywareInChrome">Spyware in Chrome</a></li>
- <li><a href="#SpywareInFlash">Spyware in Flash</a></li>
+ <li><a href="#SpywareInFlash">Spyware in JavaScript and Flash</a></li>
</ul>
</li>
<li><a href="#SpywareInDrones">Spyware in Drones</a></li>
@@ -1361,29 +1361,6 @@
but the surveillance is an abuse all the same.</p>
<ul>
- <li>
- <p>Some JavaScript malware <a
-
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
- swipes usernames from browser-based password managers</a>.</p>
- </li>
-
- <li>
- <p>Some websites send JavaScript code to collect all the user's
- input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then
- be used to reproduce the whole session</a>.</p>
-
- <p>If you use LibreJS, it will block that malicious JavaScript
- code.</p>
- </li>
-
- <li><p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a form but not
- sent</a>, in order to learn their identity. Some are <a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p>
- </li>
-
<li><p>When a page uses Disqus for
comments, <a
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the
proprietary Disqus software loads a Facebook software package into
@@ -1432,6 +1409,47 @@
<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-subsection">
+ <h4 id="SpywareInFlash">Spyware in JavaScript and Flash</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Some JavaScript malware <a
+
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
+ swipes usernames from browser-based password managers</a>.</p>
+ </li>
+
+ <li>
+ <p>Some websites send JavaScript code to collect all the user's
+ input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then
+ be used to reproduce the whole session</a>.</p>
+
+ <p>If you use LibreJS, it will block that malicious JavaScript
+ code.</p>
+ </li>
+
+ <li><p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a form but not
+ sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+ </li>
+
+ <li><p>Flash Player's
+ <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps web sites track visitors</a>.</p>
+ </li>
+
+ <li><p>Flash and JavaScript are also used for
+ <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a> to identify users.</p>
+ </li>
+</ul>
+
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+<div class="big-subsection">
<h4 id="SpywareInChrome">Spyware in Chrome</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
</div>
@@ -1460,27 +1478,6 @@
</ul>
-<div class="big-subsection">
- <h4 id="SpywareInFlash">Spyware in Flash</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
-</div>
-
-<ul>
- <li><p>Flash Player's
- <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track visitors</a>.</p>
- </li>
-
- <li><p>Flash is also used for
- <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices </a> to identify users.</p>
- </li>
-</ul>
-
-<p><a href="/philosophy/javascript-trap.html">JavaScript code</a>
-is another method of “fingerprinting” devices.</p>
-
-
<!-- #SpywareInDrones -->
<div class="big-section">
<h3 id="SpywareInDrones">Spyware in Drones</h3>
@@ -1595,7 +1592,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/17 17:02:53 $
+$Date: 2018/01/26 09:01:26 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.335
retrieving revision 1.336
diff -u -b -r1.335 -r1.336
--- po/proprietary-surveillance.ru.po 26 Jan 2018 08:37:11 -0000 1.335
+++ po/proprietary-surveillance.ru.po 26 Jan 2018 09:01:26 -0000 1.336
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-01-25 18:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -186,8 +185,6 @@
msgstr "<a href=\"#SpywareInChrome\">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
Chrome</a>"
#. type: Content of: <div><div><ul><li><ul><li>
-# | <a href=\"#SpywareInFlash\">Spyware in {+JavaScript and+} Flash</a>
-#| msgid "<a href=\"#SpywareInFlash\">Spyware in Flash</a>"
msgid "<a href=\"#SpywareInFlash\">Spyware in JavaScript and Flash</a>"
msgstr "<a href=\"#SpywareInFlash\">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
JavaScript и Flash</a>"
@@ -2877,8 +2874,6 @@
"пÑоÑмаÑÑиваÑÑ Ð´Ð°Ð½Ð½Ñе полÑзоваÑелÑ</a>."
#. type: Content of: <div><h4>
-# | Spyware in {+JavaScript and+} Flash
-#| msgid "Spyware in Flash"
msgid "Spyware in JavaScript and Flash"
msgstr "ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² JavaScript и Flash"
@@ -2946,21 +2941,14 @@
"поÑеÑиÑелей</a>."
#. type: Content of: <ul><li><p>
-# | Flash [-is-] {+and JavaScript are+} also used for <a
-# |
href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\">
-# | “fingerprinting” devices[- -]</a> to identify users.
-#| msgid ""
-#| "Flash is also used for <a href=\"http://arstechnica.com/security/2013/10/"
-#| "top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\"> "
-#| "“fingerprinting” devices </a> to identify users."
msgid ""
"Flash and JavaScript are also used for <a href=\"http://arstechnica.com/"
"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
"fingerprinting/\"> “fingerprinting” devices</a> to identify "
"users."
msgstr ""
-"Flash и JavaScript Ñакже могÑÑ Ð¿ÑименÑÑÑ Ð´Ð»Ñ <a
href=\"http://arstechnica.com/"
-"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"Flash и JavaScript Ñакже могÑÑ Ð¿ÑименÑÑÑ Ð´Ð»Ñ <a
href=\"http://arstechnica."
+"com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
"fingerprinting/\"> ÑнÑÑÐ¸Ñ “оÑпеÑаÑков
палÑÑев” ÑÑÑÑойÑÑв</a> Ñ "
"ÑелÑÑ Ð¸Ð´ÐµÐ½ÑиÑикаÑии полÑзоваÑелей."
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-appliances.ru.html malw...,
GNUN <=