[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-google.de.html malware-...
From: |
GNUN |
Subject: |
www/proprietary malware-google.de.html malware-... |
Date: |
Mon, 9 Apr 2018 19:59:25 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/04/09 19:59:24
Modified files:
proprietary : malware-google.de.html malware-google.fr.html
malware-google.ru.html
proprietary/po : malware-google.de-en.html
malware-google.fr-en.html
malware-google.ru-en.html
proprietary-back-doors.de.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.de.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.fr.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.ru.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.342&r2=1.343
Patches:
Index: malware-google.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.de.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- malware-google.de.html 18 Mar 2018 02:59:37 -0000 1.7
+++ malware-google.de.html 9 Apr 2018 23:59:23 -0000 1.8
@@ -275,7 +275,7 @@
<h3 id="drm">DRM</h3>
<ul>
-<li><p>Die Netflix Android App <a
+<li id="netflix-app-geolocation-drm"><p>Die Netflix Android App <a
href="//torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">erzwingt
die Verwendung von Google DNS</a>. Dies ist eine der Methoden, mit denen
Netflix die von den Filmstudios vorgegebene Ortungsbeschränkungen
@@ -406,7 +406,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2018/03/18 02:59:37 $
+$Date: 2018/04/09 23:59:23 $
<!-- timestamp end -->
</p>
Index: malware-google.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.fr.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-google.fr.html 26 Feb 2018 13:00:13 -0000 1.17
+++ malware-google.fr.html 9 Apr 2018 23:59:23 -0000 1.18
@@ -247,7 +247,7 @@
<h3 id="drm">DRM</h3>
<ul>
-<li><p>L'appli Netflix pour Android <a
+<li id="netflix-app-geolocation-drm"><p>L'appli Netflix pour Android <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">force
la connexion à utiliser les DNS de Google</a>. C'est l'une des méthodes
employées par Netflix pour faire appliquer les restrictions géographiques
@@ -371,7 +371,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/02/26 13:00:13 $
+$Date: 2018/04/09 23:59:23 $
<!-- timestamp end -->
</p>
Index: malware-google.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.ru.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-google.ru.html 26 Feb 2018 16:00:19 -0000 1.17
+++ malware-google.ru.html 9 Apr 2018 23:59:23 -0000 1.18
@@ -235,7 +235,7 @@
<h3 id="drm">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</h3>
<ul>
-<li><p>ÐÑиложение Android Netflix <a
+<li id="netflix-app-geolocation-drm"><p>ÐÑиложение Android Netflix <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
пÑинÑдиÑелÑно иÑполÑзÑÐµÑ Google DNS</a>. ÐÑо
один из меÑодов, пÑименÑемÑÑ
Netflix, ÑÑÐ¾Ð±Ñ Ð¾ÑÑÑеÑÑвлÑÑÑ Ð¾Ð³ÑаниÑÐµÐ½Ð¸Ñ Ð¿Ð¾
меÑÑонаÑ
Ð¾Ð¶Ð´ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелÑ,
@@ -361,7 +361,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/02/26 16:00:19 $
+$Date: 2018/04/09 23:59:23 $
<!-- timestamp end -->
</p>
Index: po/malware-google.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/malware-google.de-en.html 18 Mar 2018 02:59:37 -0000 1.5
+++ po/malware-google.de-en.html 9 Apr 2018 23:59:24 -0000 1.6
@@ -219,7 +219,7 @@
<h3 id="drm">Google DRM</h3>
<ul>
-<li><p>The Netflix Android app <a
+<li id="netflix-app-geolocation-drm"><p>The Netflix Android app <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
forces the use of Google DNS</a>. This is one of the methods that Netflix
uses to enforce the geolocation restrictions dictated by the movie
@@ -316,7 +316,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/03/18 02:59:37 $
+$Date: 2018/04/09 23:59:24 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-google.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/malware-google.fr-en.html 26 Feb 2018 13:00:13 -0000 1.16
+++ po/malware-google.fr-en.html 9 Apr 2018 23:59:24 -0000 1.17
@@ -219,7 +219,7 @@
<h3 id="drm">Google DRM</h3>
<ul>
-<li><p>The Netflix Android app <a
+<li id="netflix-app-geolocation-drm"><p>The Netflix Android app <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
forces the use of Google DNS</a>. This is one of the methods that Netflix
uses to enforce the geolocation restrictions dictated by the movie
@@ -316,7 +316,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/02/26 13:00:13 $
+$Date: 2018/04/09 23:59:24 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-google.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/malware-google.ru-en.html 26 Feb 2018 16:00:19 -0000 1.17
+++ po/malware-google.ru-en.html 9 Apr 2018 23:59:24 -0000 1.18
@@ -219,7 +219,7 @@
<h3 id="drm">Google DRM</h3>
<ul>
-<li><p>The Netflix Android app <a
+<li id="netflix-app-geolocation-drm"><p>The Netflix Android app <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
forces the use of Google DNS</a>. This is one of the methods that Netflix
uses to enforce the geolocation restrictions dictated by the movie
@@ -316,7 +316,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/02/26 16:00:19 $
+$Date: 2018/04/09 23:59:24 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- po/proprietary-back-doors.de.po 18 Mar 2018 02:59:38 -0000 1.100
+++ po/proprietary-back-doors.de.po 9 Apr 2018 23:59:24 -0000 1.101
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-02-24 13:29+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
"PO-Revision-Date: 2018-03-10 22:00+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-04-09 23:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -408,6 +409,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some “Smart” TVs automatically <a href=\"https://news."
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Baidu's proprietary Android library, Moplus, has a back door that <a href="
"\"https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-"
"remote-hijacking-baidu-wrote-code-google-made\"> can “upload "
Index: po/proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- po/proprietary-back-doors.fr.po 24 Feb 2018 14:02:21 -0000 1.89
+++ po/proprietary-back-doors.fr.po 9 Apr 2018 23:59:24 -0000 1.90
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-02-24 13:29+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
"PO-Revision-Date: 2018-02-24 15:01+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-04-09 23:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -382,6 +383,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some “Smart” TVs automatically <a href=\"https://news."
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Baidu's proprietary Android library, Moplus, has a back door that <a href="
"\"https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-"
"remote-hijacking-baidu-wrote-code-google-made\"> can “upload "
Index: po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/proprietary-back-doors.it-diff.html 24 Feb 2018 13:34:19 -0000
1.18
+++ po/proprietary-back-doors.it-diff.html 9 Apr 2018 23:59:24 -0000
1.19
@@ -313,25 +313,33 @@
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
enabling it without <span class="removed"><del><strong>understanding.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>understanding.</p></em></ins></span>
+ </li>
-<li>
- <p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.
+<span class="removed"><del><strong><li>
+ <p>Apple can, and regularly does,</strong></del></span>
+<span class="inserted"><ins><em></ul>
+
+<h3 id="install-delete">Installing or deleting programs</h3>
+
+<ul>
+ <li><p>Some “Smart” TVs
+ automatically</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones</strong></del></span> <span
class="inserted"><ins><em>href="https://news.ycombinator.com/item?id=16727319">load
+ downgrades that install a surveillance app</a>.</p>
+
+ <p>We link to the article</em></ins></span> for the <span
class="removed"><del><strong>state</a>.
</p>
<p>This may have improved with
<a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but
- <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>understanding.</p></em></ins></span>
+ iOS 8 security improvements</a>; but</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It is too bad
+ that the article finishes by advocating the moral weakness of
+ surrendering to Netflix. The Netflix
+ app</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p></em></ins></span>
</li>
-<span class="inserted"><ins><em></ul>
-
-<h3 id="install-delete">Installing or deleting programs</h3>
-<ul></em></ins></span>
<li>
<span class="removed"><del><strong><p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
Windows 8 also</strong></del></span>
@@ -526,9 +534,9 @@
processor</em></ins></span> does not <span
class="removed"><del><strong>give HP
access</strong></del></span> <span class="inserted"><ins><em>control the
microphone, and so that it can't
change the software in the main processor. They still have the
- back door, but at least it is unable to turn the phone unto a
+ back door, but at least it is unable</em></ins></span> to <span
class="inserted"><ins><em>turn the phone unto a
listening device.</p>
- <p>The universal back door is apparently also used</em></ins></span>
to <span class="inserted"><ins><em>make phones <a
+ <p>The universal back door is apparently also used to make phones
<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
transmit even when they are turned off</a>. This means their
movements are tracked, and may also make</em></ins></span> the <span
class="removed"><del><strong>customer's data, but if</strong></del></span>
<span class="inserted"><ins><em>listening feature
@@ -685,7 +693,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/02/24 13:34:19 $
+$Date: 2018/04/09 23:59:24 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- po/proprietary-back-doors.it.po 24 Feb 2018 13:34:19 -0000 1.98
+++ po/proprietary-back-doors.it.po 9 Apr 2018 23:59:24 -0000 1.99
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-02-24 13:29+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -455,6 +455,21 @@
msgstr ""
#. type: Content of: <ul><li><p>
+msgid ""
+"Some “Smart” TVs automatically <a href=\"https://news."
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
# | Baidu's proprietary Android library, Moplus, has a back door that <a
# |
href=\"https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made\">{+
# | +}can “upload files” as well as forcibly install apps</a>.
Index: po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-back-doors.ja-diff.html 24 Feb 2018 13:34:19 -0000
1.16
+++ po/proprietary-back-doors.ja-diff.html 9 Apr 2018 23:59:24 -0000
1.17
@@ -246,18 +246,29 @@
<li>
<span class="removed"><del><strong><p>Most mobile phones
have</strong></del></span>
- <span class="inserted"><ins><em><p>The iPhone has</em></ins></span>
a <span class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door, which has been used to</strong></del></span>
<span class="inserted"><ins><em>door for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-turn them malicious</a>.
-</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+ <span class="inserted"><ins><em><p>The iPhone has</em></ins></span>
a <span class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door, which has been used</strong></del></span>
<span class="inserted"><ins><em>door for <a
+
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
- enabling it without understanding.</p></em></ins></span>
+ enabling it without understanding.</p>
</li>
-<span class="inserted"><ins><em></ul>
+</ul>
<h3 id="install-delete">Installing or deleting programs</h3>
-<ul></em></ins></span>
+<ul>
+ <li><p>Some “Smart” TVs
+ automatically <a
href="https://news.ycombinator.com/item?id=16727319">load
+ downgrades that install a surveillance app</a>.</p>
+
+ <p>We link to the article for the facts it presents. It is too bad
+ that the article finishes by advocating the moral weakness of
+ surrendering</em></ins></span> to <span
class="inserted"><ins><em>Netflix. The Netflix
+ app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+turn them malicious</a>.
+</p></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p></em></ins></span>
+ </li>
+
<li>
<span class="removed"><del><strong><p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
A Chinese version of</strong></del></span>
@@ -281,12 +292,13 @@
merged into Google Play.)</p>
<p>Google</em></ins></span> can <span
class="removed"><del><strong>be imposed on the users</a>.
</p>
-<p>More information on when</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+<p>More information on when
+<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
this was used</a>.
</p>
<p>In Windows 10, the universal back door is no longer hidden; all
“upgrades” will
-be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
+be</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
<span
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
forcibly</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
</p>
@@ -362,9 +374,14 @@
Google</strong></del></span>
<span class="inserted"><ins><em><p>The iPhone</em></ins></span> has
a back door <span class="inserted"><ins><em><a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
- that allows Apple</em></ins></span> to remotely delete <span
class="removed"><del><strong>apps.</a> (It is in</strong></del></span>
<span class="inserted"><ins><em>apps</a> which Apple considers
+ that allows Apple</em></ins></span> to remotely delete <span
class="removed"><del><strong>apps.</a> (It is in a program
+called GTalkService).
+</p>
+
+<p>
+Google</strong></del></span> <span class="inserted"><ins><em>apps</a>
which Apple considers
“inappropriate”. Jobs said it's OK for Apple to have this
- power because of course we can trust Apple.</p>
+ power because of course we</em></ins></span> can <span
class="removed"><del><strong>also</strong></del></span> <span
class="inserted"><ins><em>trust Apple.</p>
</li>
</ul>
@@ -373,11 +390,7 @@
<ul>
<li>
- <p>ChromeOS has</em></ins></span> a <span
class="removed"><del><strong>program
-called GTalkService).
-</p>
-
-<p></strong></del></span> <span class="inserted"><ins><em>universal back
door. At least,</em></ins></span> Google <span class="removed"><del><strong>can
also</strong></del></span> <span class="inserted"><ins><em>says
+ <p>ChromeOS has a universal back door. At least, Google says
it does—in</em></ins></span> <a <span
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
forcibly</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.google.com/intl/en/chromebook/termsofservice.html">
@@ -408,7 +421,7 @@
<p>While remotely allowing car “owners” to use the whole
battery capacity did</em></ins></span> not <span
class="removed"><del><strong>equivalent</strong></del></span> <span
class="inserted"><ins><em>do them any harm, the same back door would
permit Tesla (perhaps under the command of some government) to
- remotely order the car to use none of its battery. Or
perhaps</em></ins></span> to <span class="inserted"><ins><em>drive
+ remotely order the car to use none of its battery. Or perhaps to drive
its passenger to a torture prison.</p>
</li>
@@ -419,7 +432,7 @@
</li>
<li>
- <p>The Amazon Echo appears to have</em></ins></span> a universal
back door, <span class="removed"><del><strong>but permits various
+ <p>The Amazon Echo appears</em></ins></span> to <span
class="inserted"><ins><em>have</em></ins></span> a universal back door, <span
class="removed"><del><strong>but permits various
dirty tricks.
</p>
@@ -670,7 +683,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/02/24 13:34:19 $
+$Date: 2018/04/09 23:59:24 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- po/proprietary-back-doors.ja.po 24 Feb 2018 13:34:19 -0000 1.78
+++ po/proprietary-back-doors.ja.po 9 Apr 2018 23:59:24 -0000 1.79
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-02-24 13:29+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -367,6 +367,21 @@
msgstr ""
#. type: Content of: <ul><li><p>
+msgid ""
+"Some “Smart” TVs automatically <a href=\"https://news."
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
#, fuzzy
#| msgid ""
#| "Baidu's proprietary Android library, Moplus, has a back door that <a href="
Index: po/proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- po/proprietary-back-doors.pot 24 Feb 2018 13:34:19 -0000 1.49
+++ po/proprietary-back-doors.pot 9 Apr 2018 23:59:24 -0000 1.50
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-02-24 13:29+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -269,6 +269,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some “Smart” TVs automatically <a "
+"href=\"https://news.ycombinator.com/item?id=16727319\">load downgrades that "
+"install a surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a "
+"href=\"/proprietary/malware-google.html#netflix-app-geolocation-drm\">is "
+"malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Baidu's proprietary Android library, Moplus, has a back door that <a "
"href=\"https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made\">
"
"can “upload files” as well as forcibly install apps</a>."
Index: po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- po/proprietary-back-doors.ru.po 25 Feb 2018 09:32:13 -0000 1.131
+++ po/proprietary-back-doors.ru.po 9 Apr 2018 23:59:24 -0000 1.132
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-02-24 13:29+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
"PO-Revision-Date: 2018-02-25 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-04-09 23:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -373,6 +374,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some “Smart” TVs automatically <a href=\"https://news."
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Baidu's proprietary Android library, Moplus, has a back door that <a href="
"\"https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-"
"remote-hijacking-baidu-wrote-code-google-made\"> can “upload "
Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- po/proprietary-surveillance.de.po 5 Apr 2018 10:00:15 -0000 1.202
+++ po/proprietary-surveillance.de.po 9 Apr 2018 23:59:24 -0000 1.203
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-04-05 09:56+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
"PO-Revision-Date: 2018-03-10 22:00+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -2547,6 +2547,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some “Smart” TVs automatically <a href=\"https://news."
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio “smart” <a href=\"https://www.ftc.gov/news-events/blogs/"
"business-blog/2017/02/what-vizio-was-doing-behind-tv-screen\">TVs report "
"everything that is viewed on them, and not just broadcasts and cable</a>. "
Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- po/proprietary-surveillance.fr.po 5 Apr 2018 13:26:33 -0000 1.271
+++ po/proprietary-surveillance.fr.po 9 Apr 2018 23:59:24 -0000 1.272
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-04-05 09:56+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
"PO-Revision-Date: 2018-04-05 15:25+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-04-09 23:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -2442,6 +2443,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some “Smart” TVs automatically <a href=\"https://news."
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio “smart” <a href=\"https://www.ftc.gov/news-events/blogs/"
"business-blog/2017/02/what-vizio-was-doing-behind-tv-screen\">TVs report "
"everything that is viewed on them, and not just broadcasts and cable</a>. "
Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- po/proprietary-surveillance.it-diff.html 5 Apr 2018 10:00:15 -0000
1.47
+++ po/proprietary-surveillance.it-diff.html 9 Apr 2018 23:59:24 -0000
1.48
@@ -739,9 +739,9 @@
</li>
<li><p>The nonfree Snapchat app's principal purpose is to
restrict
- the <span class="removed"><del><strong>use of data
on</strong></del></span> <span class="inserted"><ins><em>use of data on the
user's computer, but it does surveillance
+ the use of data on the user's computer, but it does surveillance
too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
+ it <span class="removed"><del><strong>tries to get the user's list of
other</strong></del></span> <span class="inserted"><ins><em>tries to get the
user's list of other people's phone
numbers.</a></p>
</li>
</ul>
@@ -786,10 +786,8 @@
</li>
<li>
- <p>Facebook's app listens all</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too:</strong></del></span> <span
class="inserted"><ins><em>time,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span> <span
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other</strong></del></span>
<span class="inserted"><ins><em>or watching</a>. In addition, it may
+ <p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what people are listening to or watching</a>. In addition, it may
be analyzing</em></ins></span> people's <span
class="removed"><del><strong>phone
numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>conversations to serve them with targeted
advertisements.</p></em></ins></span>
@@ -1259,6 +1257,17 @@
before Amazon “smart” TVs.</p>
<ul>
+ <span class="inserted"><ins><em><li><p>Some “Smart”
TVs
+ automatically <a
href="https://news.ycombinator.com/item?id=16727319">load
+ downgrades that install a surveillance app</a>.</p>
+
+ <p>We link to the article for the facts it presents. It is too bad
+ that the article finishes by advocating the moral weakness of
+ surrendering to Netflix. The Netflix
+ app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
+ </li></em></ins></span>
+
<li>
<p>Vizio
“smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
@@ -1704,7 +1713,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/04/05 10:00:15 $
+$Date: 2018/04/09 23:59:24 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- po/proprietary-surveillance.it.po 5 Apr 2018 10:00:16 -0000 1.220
+++ po/proprietary-surveillance.it.po 9 Apr 2018 23:59:24 -0000 1.221
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-04-05 09:56+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -2350,6 +2350,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some “Smart” TVs automatically <a href=\"https://news."
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio “smart” <a href=\"https://www.ftc.gov/news-events/blogs/"
"business-blog/2017/02/what-vizio-was-doing-behind-tv-screen\">TVs report "
"everything that is viewed on them, and not just broadcasts and cable</a>. "
Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- po/proprietary-surveillance.ja-diff.html 5 Apr 2018 10:00:16 -0000
1.58
+++ po/proprietary-surveillance.ja-diff.html 9 Apr 2018 23:59:24 -0000
1.59
@@ -557,10 +557,7 @@
<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to <span class="removed"><del><strong>place new
items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
@@ -575,7 +572,7 @@
</div>
<ul>
- <li><p>The DMCA and the EU Copyright Directive make it <a
+ <span class="inserted"><ins><em><li><p>The DMCA and the EU
Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
illegal to study how iOS cr...apps spy on users</a>, because this
would require circumventing the iOS DRM.</p>
@@ -592,19 +589,8 @@
<li><p>Apple proposes
<a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
— which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether the phone is
snooping</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
-
-<ul></strong></del></span>
- <span
class="inserted"><ins><em>them.</p></li></em></ins></span>
+ taken. Users would have no way to tell whether the phone is snooping on
+ them.</p></li></em></ins></span>
<li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
lots of personal data to Apple's servers</a>. Big Brother can
@@ -686,7 +672,18 @@
<li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist for no
possible purpose other than surveillance</a>. Here is the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul></strong></del></span> <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
</ul>
@@ -698,7 +695,7 @@
</div>
<ul>
- <span class="inserted"><ins><em><li><p>Tracking software in
popular Android apps is pervasive and
+ <li><p>Tracking software in popular Android apps is pervasive and
sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
@@ -748,14 +745,21 @@
remote command and users cannot stop them:
<a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it <span class="removed"><del><strong>will eventually
require all new portable phones</strong></del></span> <span
class="inserted"><ins><em>will eventually require all new portable phones
+ (The US says it will eventually require all new portable phones
to have GPS.)</p>
</li>
<li><p>The nonfree Snapchat app's principal purpose is to
restrict
the use of data on the user's computer, but it does surveillance
too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
+ it tries to get the user's list of <span
class="removed"><del><strong>other people's phone
+ numbers.</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware</strong></del></span> <span
class="inserted"><ins><em>other people's phone
numbers.</a></p>
</li>
</ul>
@@ -802,42 +806,32 @@
<li>
<p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
on what people are listening to or watching</a>. In addition, it may
- be analyzing people's conversations</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>serve them with targeted
- advertisements.</p></em></ins></span>
+ be analyzing people's conversations to serve them with targeted
+ advertisements.</p>
</li>
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
-
- <span class="inserted"><ins><em><li>
- <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>restrict
- the use</strong></del></span> <span class="inserted"><ins><em>do
lots</em></ins></span> of <span class="inserted"><ins><em>surveillance, judging
by
+ <li>
+ <p>Faceapp appears to do lots of surveillance, judging by
<a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal</em></ins></span> data
<span class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>in</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too:</strong></del></span> <span
class="inserted"><ins><em>device</a>.
+ how much access it demands to personal data in the
device</a>.
</p>
</li>
<li>
- <p>Verizon</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that</em></ins></span> it
<span class="removed"><del><strong>tries to get</strong></del></span> <span
class="inserted"><ins><em>will</a>
- pre-install on some of its phones. The app will give
Verizon</em></ins></span> the <span class="removed"><del><strong>user's
list</strong></del></span> <span class="inserted"><ins><em>same
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
information about the users' searches that Google normally gets when
they use its search engine.</p>
<p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
being pre-installed on only one phone</a>, and the
user must explicitly opt-in before the app takes effect. However, the
- app remains spyware—an “optional”
piece</em></ins></span> of <span class="removed"><del><strong>other people's
phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>spyware is
- still spyware.</p></em></ins></span>
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware</strong></del></span>
- <span class="inserted"><ins><em><li><p>The Meitu photo-editing
+ <li><p>The Meitu photo-editing
app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
user data to a Chinese company</a>.</p></li>
@@ -939,98 +933,103 @@
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInGames">Spyware</strong></del></span>
<span
class="inserted"><ins><em>id="SpywareInToys">Spyware</em></ins></span> in
<span class="removed"><del><strong>Games</h4></strong></del></span> <span
class="inserted"><ins><em>Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
<ul>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about them to
- nVidia servers</a>.</p>
+ <span class="removed"><del><strong><li><p>nVidia's proprietary
GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about
them</strong></del></span>
+
+ <span class="inserted"><ins><em><li>
+ <p>A remote-control sex toy was found</em></ins></span> to
+ <span class="removed"><del><strong>nVidia servers</a>.</p>
</li>
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage to spy through it
too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <li><p>Angry Birds</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of the conversation between two users</a>.</p>
+ </li>
+
+ <li>
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="inserted"><ins><em>i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would
+ enable crackers</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
+ Here's information</strong></del></span> <span
class="inserted"><ins><em>listen in</em></ins></span> on <span
class="inserted"><ins><em>a child's speech, and even speak
+ into the toys themselves.</p>
+ </li>
+
+ <li>
+ <p>A computerized vibrator</em></ins></span>
+ <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ More about NSA</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
+
+ <p>The</em></ins></span> app <span
class="removed"><del><strong>spying</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4</strong></del></span> id="SpywareInToys">Spyware in Toys</h4>
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<ul>
- <span class="removed"><del><strong><li><p>A company that makes
internet-controlled vibrators</strong></del></span>
+ <li><p>A</strong></del></span> <span
class="inserted"><ins><em>was reporting the temperature of the vibrator minute
by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
- <span class="inserted"><ins><em><li>
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</em></ins></span>
- of <span class="removed"><del><strong>personal information about how
- people use it</a>.</p>
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users could have
+ checked and changed.</p>
- <p>The company's statement that it anonymizes the data may be
- true, but it doesn't really matter. If it sells</strong></del></span>
the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
- </li>
+ <p>The</em></ins></span> company that <span
class="removed"><del><strong>makes internet-controlled
vibrators</strong></del></span> <span class="inserted"><ins><em>made the
vibrator</em></ins></span>
+ <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was</em></ins></span> sued for collecting lots of personal information
about how
+ people <span class="removed"><del><strong>use</strong></del></span>
<span class="inserted"><ins><em>used</em></ins></span> it</a>.</p>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance
Communications</a>,</em></ins></span>
- a
- <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>speech recognition company based
in</em></ins></span> the <span class="removed"><del><strong>data
broker</strong></del></span> <span class="inserted"><ins><em>U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can <span class="removed"><del><strong>figure out
who</strong></del></span> <span class="inserted"><ins><em>remotely
control</em></ins></span> the <span class="removed"><del><strong>user
is.</p></strong></del></span> <span class="inserted"><ins><em>toys with a
mobile phone. This would
- enable crackers to listen in on a child's speech, and even speak
- into the toys themselves.</p></em></ins></span>
+ <p>The company's statement that it <span
class="removed"><del><strong>anonymizes</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the data may be
+ true, but it doesn't really matter. If it <span
class="removed"><del><strong>sells</strong></del></span> <span
class="inserted"><ins><em>had sold</em></ins></span> the data to a
+ data broker, the data broker <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>would have been able to</em></ins></span> figure out
+ who the user <span class="removed"><del><strong>is.</p>
</li>
- <span class="removed"><del><strong><li><p>A</strong></del></span>
+ <li><p>A computerized
+ vibrator</strong></del></span> <span
class="inserted"><ins><em>was.</p>
- <span class="inserted"><ins><em><li>
- <p>A</em></ins></span> computerized vibrator
- <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</em></ins></span> on its users through the proprietary
control app</a>.</p>
-
- <p>The app <span
class="removed"><del><strong>reports</strong></del></span> <span
class="inserted"><ins><em>was reporting</em></ins></span> the temperature of
the vibrator minute by
- minute (thus, indirectly, whether it <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was</em></ins></span> surrounded by a person's
- body), <span class="removed"><del><strong>and</strong></del></span>
<span class="inserted"><ins><em>as well as</em></ins></span> the vibration
frequency.</p>
-
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users <span
class="removed"><del><strong>can check</strong></del></span> <span
class="inserted"><ins><em>could have
- checked</em></ins></span> and <span
class="removed"><del><strong>change.</p></strong></del></span> <span
class="inserted"><ins><em>changed.</p>
+ <p>Following this lawsuit,</em></ins></span>
+ <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
+ on its users through the proprietary control app</a>.</p>
- <p>The company that made the vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a
- data broker, the data broker would have been able to figure out
- who the user was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a>
- to its customers.</p></em></ins></span>
+ <p>The app reports</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>company has been ordered to pay a
total</em></ins></span> of <span class="inserted"><ins><em>C$4m</a>
+ to its customers.</p>
</li>
- <span class="inserted"><ins><em><li><p> “CloudPets”
toys with microphones
+ <li><p> “CloudPets” toys with microphones
<a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
- collected by the manufacturer's snooping.</p>
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether it is surrounded</strong></del></span>
<span class="inserted"><ins><em>data</a>
+ collected</em></ins></span> by <span class="removed"><del><strong>a
person's
+ body), and</strong></del></span> the <span
class="removed"><del><strong>vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen to these
conversations
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users can
check</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and <span
class="removed"><del><strong>change.</p>
+ </li></strong></del></span> <span class="inserted"><ins><em>the FBI
could listen to these conversations
was unacceptable by itself.</p></li></em></ins></span>
<li><p>Barbie
@@ -1246,7 +1245,20 @@
store this information, but if the state orders it to get the data
and hand it over, the state can store it.</p>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul></strong></del></span>
+<span class="inserted"><ins><em></ul>
<!-- #SpywareAtHome -->
@@ -1259,7 +1271,7 @@
<div style="clear: left;"></div>
<ul>
- <span class="inserted"><ins><em><li><p>Lots of
“smart” products are
+ <li><p>Lots of “smart” products are
designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
listen to everyone in the house, all the time</a>.</p>
@@ -1291,7 +1303,18 @@
before Amazon “smart” TVs.</p>
<ul>
- <span class="inserted"><ins><em><li>
+ <span class="inserted"><ins><em><li><p>Some “Smart”
TVs
+ automatically <a
href="https://news.ycombinator.com/item?id=16727319">load
+ downgrades that install a surveillance app</a>.</p>
+
+ <p>We link to the article for the facts it presents. It is too bad
+ that the article finishes by advocating the moral weakness of
+ surrendering to Netflix. The Netflix
+ app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
+ </li>
+
+ <li>
<p>Vizio
“smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything that is viewed on them, and not just broadcasts
@@ -1722,7 +1745,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/04/05 10:00:16 $
+$Date: 2018/04/09 23:59:24 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- po/proprietary-surveillance.ja.po 5 Apr 2018 10:00:16 -0000 1.193
+++ po/proprietary-surveillance.ja.po 9 Apr 2018 23:59:24 -0000 1.194
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-04-05 09:56+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -2188,6 +2188,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some “Smart” TVs automatically <a href=\"https://news."
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio “smart” <a href=\"https://www.ftc.gov/news-events/blogs/"
"business-blog/2017/02/what-vizio-was-doing-behind-tv-screen\">TVs report "
"everything that is viewed on them, and not just broadcasts and cable</a>. "
Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- po/proprietary-surveillance.pot 5 Apr 2018 10:00:16 -0000 1.142
+++ po/proprietary-surveillance.pot 9 Apr 2018 23:59:24 -0000 1.143
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-04-05 09:56+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1696,6 +1696,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some “Smart” TVs automatically <a "
+"href=\"https://news.ycombinator.com/item?id=16727319\">load downgrades that "
+"install a surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a "
+"href=\"/proprietary/malware-google.html#netflix-app-geolocation-drm\">is "
+"malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio “smart” <a "
"href=\"https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen\">TVs
"
"report everything that is viewed on them, and not just broadcasts and "
Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- po/proprietary-surveillance.ru.po 5 Apr 2018 16:29:16 -0000 1.342
+++ po/proprietary-surveillance.ru.po 9 Apr 2018 23:59:24 -0000 1.343
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-04-05 09:56+0000\n"
+"POT-Creation-Date: 2018-04-09 23:56+0000\n"
"PO-Revision-Date: 2018-04-05 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-04-09 23:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -2413,6 +2414,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some “Smart” TVs automatically <a href=\"https://news."
+"ycombinator.com/item?id=16727319\">load downgrades that install a "
+"surveillance app</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"We link to the article for the facts it presents. It is too bad that the "
+"article finishes by advocating the moral weakness of surrendering to "
+"Netflix. The Netflix app <a href=\"/proprietary/malware-google.html#netflix-"
+"app-geolocation-drm\">is malware too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio “smart” <a href=\"https://www.ftc.gov/news-events/blogs/"
"business-blog/2017/02/what-vizio-was-doing-behind-tv-screen\">TVs report "
"everything that is viewed on them, and not just broadcasts and cable</a>. "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-google.de.html malware-...,
GNUN <=