[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www philosophy/basic-freedoms.fr.html philosoph...
From: |
GNUN |
Subject: |
www philosophy/basic-freedoms.fr.html philosoph... |
Date: |
Tue, 5 Jun 2018 16:00:07 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/06/05 16:00:06
Modified files:
philosophy : basic-freedoms.fr.html
surveillance-vs-democracy.fr.html
who-does-that-server-really-serve.fr.html
words-to-avoid.fr.html
philosophy/po : basic-freedoms.fr-en.html
surveillance-vs-democracy.fr-en.html
who-does-that-server-really-serve.fr-en.html
words-to-avoid.fr-en.html
proprietary : malware-apple.fr.html malware-games.fr.html
malware-microsoft.fr.html
malware-mobiles.fr.html
proprietary-insecurity.fr.html
proprietary-insecurity.ru.html
proprietary-sabotage.fr.html
proprietary-surveillance.fr.html
proprietary/po : malware-apple.fr-en.html
malware-appliances.fr-en.html
malware-games.fr-en.html
malware-microsoft.fr-en.html
malware-mobiles.fr-en.html
proprietary-insecurity.fr-en.html
proprietary-insecurity.ru-en.html
proprietary-insecurity.ru.po
proprietary-sabotage.fr-en.html
proprietary-surveillance.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/basic-freedoms.fr.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.fr.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/who-does-that-server-really-serve.fr.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.fr.html?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/basic-freedoms.fr-en.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.fr-en.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.fr-en.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.fr-en.html?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.fr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr-en.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.109&r2=1.110
Patches:
Index: philosophy/basic-freedoms.fr.html
===================================================================
RCS file: /web/www/www/philosophy/basic-freedoms.fr.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- philosophy/basic-freedoms.fr.html 18 Nov 2016 07:32:42 -0000 1.71
+++ philosophy/basic-freedoms.fr.html 5 Jun 2018 20:00:05 -0000 1.72
@@ -44,11 +44,11 @@
</li>
<li>
- <a href="http://www.factnet.org/">F.A.C.T.Net Inc.</a> est une synthèse de
-documents publiés sur Internet, un service d'information, une bibliothèque,
-un centre de dialogue et une archive à but non lucratif. Elle se consacre Ã
-la promotion et à la défense de la pensée internationale libre, de la
-liberté d'expression et des droits à la vie privée.
+ <a href="http://www.factnetglobal.org/">F.A.C.T.Net Inc.</a> est une
+synthèse de documents publiés sur Internet, un service d'information, une
+bibliothèque, un centre de dialogue et une archive à but non lucratif. Elle
+se consacre à la promotion et à la défense de la pensée internationale
+libre, de la liberté d'expression et des droits à la vie privée.
</li>
<li>
@@ -120,7 +120,7 @@
</div>
<p>Copyright © 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2007,
-2014, 2016 Free Software Foundation, Inc.</p>
+2014, 2016, 2018 Free Software Foundation, Inc.</p>
<p>Cette page peut être utilisée suivant les conditions de la licence <a
rel="license"
@@ -138,7 +138,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2016/11/18 07:32:42 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
Index: philosophy/surveillance-vs-democracy.fr.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.fr.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- philosophy/surveillance-vs-democracy.fr.html 5 Apr 2018 11:00:22
-0000 1.49
+++ philosophy/surveillance-vs-democracy.fr.html 5 Jun 2018 20:00:05
-0000 1.50
@@ -338,7 +338,7 @@
peuvent être regroupés dans un centre de données <cite>[data center]</cite>
et conservés ad vitam aeternam. à Detroit, les flics incitent les
commerçants à leur donner un <a
-href="http://www.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">accès
+href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">accès
illimité à leurs caméras de surveillance</a> pour qu'ils puissent s'en
servir pour regarder n'importe quand. C'est déjà dangereux, mais le pire est
à venir. Avec les progrès de la reconnaissance faciale, le jour n'est
@@ -348,7 +348,7 @@
<p>Les caméras et appareils photo connectés à Internet sont souvent minables
eux-mêmes du point de vue de la sécurité numérique ; dit autrement, <a
-href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">n'importe
+href="https://www.csoonline.com/article/2221934/microsoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html">n'importe
qui pourrait regarder ce qu'ils voient par leur objectif</a>. Cela fait de
ce genre d'appareil une grave menace pour la sécurité aussi bien que pour la
vie privée. Pour rétablir le respect de la vie privée, nous devons interdire
@@ -572,7 +572,7 @@
<cite>perjury</cite><a id="TransNote5-rev"
href="#TransNote5"><sup>5</sup></a> puisqu'ils le font si souvent, en
particulier dans le cadre de la comparution de manifestants et de <a
-href="http://photographyisnotacrime.com/">photographes</a>). Une ville de
+href="https://www.themaven.net/pinacnews/">photographes</a>). Une ville de
Californie qui a imposé à la police le port permanent d'une caméra a vu <a
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">l'usage
de la force diminuer de près de 60 %</a>. L'ACLU y est favorable.</p>
@@ -716,7 +716,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/04/05 11:00:22 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
Index: philosophy/who-does-that-server-really-serve.fr.html
===================================================================
RCS file: /web/www/www/philosophy/who-does-that-server-really-serve.fr.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- philosophy/who-does-that-server-really-serve.fr.html 31 Mar 2018
10:36:17 -0000 1.54
+++ philosophy/who-does-that-server-really-serve.fr.html 5 Jun 2018
20:00:05 -0000 1.55
@@ -220,7 +220,7 @@
entre « open source » et « libre ». Un code source qui est open source
<a
href="/philosophy/free-open-overlap.html">est presque toujours
libre</a>. Cependant, la notion de <a
-href="http://opendefinition.org/software-service">service à logiciel ouvert
+href="https://opendefinition.org/ossd/">service à logiciel ouvert
<cite>[open software]</cite></a>, autrement dit service dont le logiciel
serveur est open source, ne traite pas le problème du SaaSS.</p>
@@ -532,7 +532,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/03/31 10:36:17 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
Index: philosophy/words-to-avoid.fr.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.fr.html,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- philosophy/words-to-avoid.fr.html 22 Apr 2018 11:03:27 -0000 1.185
+++ philosophy/words-to-avoid.fr.html 5 Jun 2018 20:00:05 -0000 1.186
@@ -269,7 +269,7 @@
<p>
La <a
-href="http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf">définition
+href="https://csrc.nist.gov/publications/detail/sp/800-145/final">définition
de <cite>cloud computing</cite> donnée par le <abbr title="National
Institute of Standards and Technology">NIST</abbr></a> mentionne trois
scénarios qui soulèvent différents problèmes éthiques : le logiciel en
tant
@@ -1411,7 +1411,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/04/22 11:03:27 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
Index: philosophy/po/basic-freedoms.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/basic-freedoms.fr-en.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- philosophy/po/basic-freedoms.fr-en.html 18 Nov 2016 07:32:53 -0000
1.40
+++ philosophy/po/basic-freedoms.fr-en.html 5 Jun 2018 20:00:05 -0000
1.41
@@ -34,7 +34,7 @@
</li>
<li>
- <a href="http://www.factnet.org/">F.A.C.T.Net Inc.</a>
+ <a href="http://www.factnetglobal.org/">F.A.C.T.Net Inc.</a>
is a non-profit Internet digest, news service, library, dialogue
center, and archive dedicated to the promotion and defense of
international free thought, free speech, and privacy rights.
@@ -94,7 +94,7 @@
</div>
<p>Copyright © 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
-2007, 2014, 2016 Free Software Foundation, Inc.</p>
+2007, 2014, 2016, 2018 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -104,7 +104,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/11/18 07:32:53 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/surveillance-vs-democracy.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.fr-en.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- philosophy/po/surveillance-vs-democracy.fr-en.html 5 Apr 2018 11:00:22
-0000 1.44
+++ philosophy/po/surveillance-vs-democracy.fr-en.html 5 Jun 2018 20:00:05
-0000 1.45
@@ -299,8 +299,8 @@
<p>Nowadays, security cameras have become surveillance cameras: they
are connected to the Internet so recordings can be collected in a data
center and saved forever. In Detroit, the cops pressure businesses to
-give
-them <a
href="http://www.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">unlimited
+give them <a
+href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">unlimited
access to their surveillance cameras</a> so that they can look through
them at any and all times. This is already dangerous, but it is going
to get worse. Advances in face recognition may bring the day when
@@ -308,8 +308,8 @@
who they talk with.</p>
<p>Internet-connected cameras often have lousy digital security
-themselves, which
-means <a
href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">anyone
+themselves, which means <a
+href="https://www.csoonline.com/article/2221934/microsoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html">anyone
can watch what those cameras see</a>. This makes internet-connected
cameras a major threat to security as well as privacy. For privacy's
sake, we should ban the use of Internet-connected cameras aimed where
@@ -507,7 +507,7 @@
police have their own jargon term for perjury,
“<a
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">testilying</a>,”
since they do it so frequently, particularly about protesters
-and <a href="http://photographyisnotacrime.com/">photographers</a>.)
+and <a href="https://www.themaven.net/pinacnews/">photographers</a>.)
One city in California that required police to wear video cameras all
the time
found <a
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
@@ -609,7 +609,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/04/05 11:00:22 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/who-does-that-server-really-serve.fr-en.html
===================================================================
RCS file:
/web/www/www/philosophy/po/who-does-that-server-really-serve.fr-en.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- philosophy/po/who-does-that-server-really-serve.fr-en.html 31 Mar 2018
10:36:17 -0000 1.45
+++ philosophy/po/who-does-that-server-really-serve.fr-en.html 5 Jun 2018
20:00:05 -0000 1.46
@@ -200,7 +200,7 @@
“open” and “free”. Source code that is open
source <a href="/philosophy/free-open-overlap.html">is, nearly always,
free</a>. However, the idea of
-an <a href="http://opendefinition.org/software-service">“open
+an <a href="https://opendefinition.org/ossd/">“open
software” service</a>, meaning one whose server software is open
source and/or free, fails to address the issue of SaaSS.</p>
@@ -464,7 +464,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/03/31 10:36:17 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/words-to-avoid.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.fr-en.html,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- philosophy/po/words-to-avoid.fr-en.html 22 Apr 2018 11:03:28 -0000
1.105
+++ philosophy/po/words-to-avoid.fr-en.html 5 Jun 2018 20:00:05 -0000
1.106
@@ -292,7 +292,7 @@
</p>
<p>
-The <a href="http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf">
+The <a href="https://csrc.nist.gov/publications/detail/sp/800-145/final">
NIST definition of "cloud computing"</a> mentions three scenarios that
raise different ethical issues: Software as a Service, Platform as a
Service, and Infrastructure as a Service. However, that definition
@@ -1349,7 +1349,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/04/22 11:03:28 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary/malware-apple.fr.html 3 May 2018 20:59:26 -0000 1.51
+++ proprietary/malware-apple.fr.html 5 Jun 2018 20:00:05 -0000 1.52
@@ -171,7 +171,7 @@
<li>
<p>L'iPhone 7 contient un DRM qui est conçu spécifiquement pour <a
-href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">le
+href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">le
mettre hors service si un atelier « non autorisé » le répare</a>, ce qui
veut dire à peu près tout le monde en dehors d'Apple.</p>
@@ -230,7 +230,7 @@
le téléphone les espionne.</p></li>
<li><p>Les iPhones <a
-href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">envoient
+href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">envoient
une tas de données personnelles aux serveurs d'Apple</a>, où Big Brother
peut les récupérer.</p>
</li>
@@ -396,7 +396,7 @@
</li>
<li><p><a
-href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017">Apple
+href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">Apple
utilise un logiciel à DRM pour empêcher les gens de charger un iTruc avec un
cable USB générique</a>.</p></li>
@@ -646,7 +646,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/05/03 20:59:26 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-games.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.fr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/malware-games.fr.html 1 Jan 2018 17:34:55 -0000 1.5
+++ proprietary/malware-games.fr.html 5 Jun 2018 20:00:05 -0000 1.6
@@ -70,8 +70,8 @@
<li>
<p>Les jeux d'Oculus Rift ont maintenant <a
-href="http://motherboard.vice.com/read/new-oculus-drm-cross-platform"> des
-DRM destinés à empêcher leur fonctionnement sur d'autres systèmes</a>.</p>
+href="https://motherboard.vice.com/en_us/article/vv77ea/new-oculus-drm-cross-platform">
+des DRM destinés à empêcher leur fonctionnement sur d'autres
systèmes</a>.</p>
</li>
<li>
@@ -170,7 +170,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/01/01 17:34:55 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/malware-microsoft.fr.html 3 May 2018 19:59:43 -0000
1.54
+++ proprietary/malware-microsoft.fr.html 5 Jun 2018 20:00:05 -0000
1.55
@@ -171,7 +171,7 @@
<li>
<p>Microsoft a fait en sorte que Windows 7 et 8 ne fonctionnent plus sur
certains nouveaux ordinateurs, <a
-href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">ce
+href="https://support.microsoft.com/fr-fr/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">ce
qui oblige leurs propriétaires à passer à Windows 10</a>.</p>
</li>
@@ -314,7 +314,7 @@
réglant par défaut le niveau de télémétrie à « Complet »</a>.</p>
<p>Le <a
-href="https://docs.microsoft.com/fr-fr/windows/configuration/configure-windows-telemetry-in-your-organization#niveaux-de-t%C3%A9l%C3%A9m%C3%A9trie">niveau
+href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">niveau
« Complet »</a> de télémétrie permet aux ingénieurs de Microsoft
d'accéder,
entre autres, à des clés de registre qui contiennent <a
href="https://technet.microsoft.com/en-us/library/cc939702.aspx">de
@@ -381,7 +381,7 @@
<li>Des espiogiciels dans Windows 8 : <a
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">Windows
Update espionne l'utilisateur</a>Â ; <a
-href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">WindowsÂ
8.1
+href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">WindowsÂ
8.1
espionne les recherches locales</a>Â ; et dans Windows toujours, il y a <a
href="http://www.marketoracle.co.uk/Article40836.html">une clé secrète
appartenant à la NSA</a> dont nous ne connaissons pas la fonction. </li>
@@ -562,7 +562,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/05/03 19:59:43 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary/malware-mobiles.fr.html 25 Jan 2018 21:30:53 -0000 1.37
+++ proprietary/malware-mobiles.fr.html 5 Jun 2018 20:00:05 -0000 1.38
@@ -480,7 +480,7 @@
<li>
<p>L'iPhone 7 contient un DRM qui est conçu spécifiquement pour <a
-href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">le
+href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">le
mettre hors service si un atelier « non autorisé » le répare</a>, ce qui
veut dire à peu près tout le monde en dehors d'Apple.</p>
@@ -593,7 +593,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/01/25 21:30:53 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/proprietary-insecurity.fr.html 3 Jan 2018 19:01:23 -0000
1.59
+++ proprietary/proprietary-insecurity.fr.html 5 Jun 2018 20:00:05 -0000
1.60
@@ -171,7 +171,7 @@
<li>
<p>Lorsque le lave-vaisselle désinfecteur de Miele <a
-href="https://motherboard.vice.com/fr/article/un-lave-vaisselle-connecte-permet-dacceder-au-reseau-informatique-des-hopitaux">se
+href="https://motherboard.vice.com/fr/article/z49w3y/un-lave-vaisselle-connecte-permet-dacceder-au-reseau-informatique-des-hopitaux">se
connecte à l'Internet des dangers, sa sécurisation est en-dessous de
tout</a>.</p>
@@ -243,7 +243,7 @@
<li>
<p>Des « rançongiciels » <cite>[ransomware]</cite> <a
-href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">ont
+href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">ont
été développés pour un thermostat qui utilise du logiciel
privateur</a>.</p>
</li>
@@ -374,7 +374,7 @@
Les disque durs « à chiffrement automatique » utilisent pour ce faire un
micrologiciel <cite>[firmware]</cite> privateur, auquel par conséquent on ne
peut pas se fier. Les disques « My Passport » de Western Digital <a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">ont
+href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">ont
une porte dérobée</a>.
</p>
</li>
@@ -493,7 +493,7 @@
des gens en prenant le contrôle d'implants médicaux par radio</a>. Voici <a
href="http://www.bbc.co.uk/news/technology-17631838">des informations
supplémentaires</a>. Et <a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">lÃ
+href="https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">lÃ
aussi</a>.
</p>
</li>
@@ -637,7 +637,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/01/03 19:01:23 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary/proprietary-insecurity.ru.html 5 Jun 2018 17:59:47 -0000
1.51
+++ proprietary/proprietary-insecurity.ru.html 5 Jun 2018 20:00:05 -0000
1.52
@@ -365,7 +365,7 @@
“СамоÑиÑÑÑÑÑиеÑÑ” жеÑÑкие диÑки
ÑиÑÑÑÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð½ÐµÑвободнÑÑ
внÑÑÑенниÑ
пÑогÑамм, Ñак ÑÑо Ð²Ñ Ð½Ðµ можеÑе
им довеÑÑÑÑ. У диÑков “My
Passport” компании Western Digital <a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">еÑÑÑ
+href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">еÑÑÑ
ÑеÑнÑй Ñ
од</a>.
</p>
</li>
@@ -627,7 +627,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/06/05 17:59:47 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/proprietary-sabotage.fr.html 3 Feb 2018 10:36:20 -0000
1.43
+++ proprietary/proprietary-sabotage.fr.html 5 Jun 2018 20:00:05 -0000
1.44
@@ -103,7 +103,7 @@
<li>
<p>L'iPhone 7 contient un DRM qui est conçu spécifiquement pour <a
-href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">le
+href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">le
mettre hors service si un atelier « non autorisé » le répare</a>, ce qui
veut dire à peu près tout le monde en dehors d'Apple.</p>
@@ -116,7 +116,7 @@
<li>
<p>Microsoft a fait en sorte que Windows 7 et 8 ne fonctionnent plus sur
certains nouveaux ordinateurs, <a
-href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">ce
+href="https://support.microsoft.com/fr-fr/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">ce
qui oblige leurs propriétaires à passer à Windows 10</a>.</p>
</li>
@@ -451,7 +451,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/02/03 10:36:20 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary/proprietary-surveillance.fr.html 19 May 2018 13:31:37
-0000 1.118
+++ proprietary/proprietary-surveillance.fr.html 5 Jun 2018 20:00:05
-0000 1.119
@@ -185,7 +185,7 @@
réglant par défaut le niveau de télémétrie à « Complet »</a>.</p>
<p>Le <a
-href="https://docs.microsoft.com/fr-fr/windows/configuration/configure-windows-telemetry-in-your-organization#niveaux-de-t%C3%A9l%C3%A9m%C3%A9trie">niveau
+href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">niveau
« Complet »</a> de télémétrie permet aux ingénieurs de Microsoft
d'accéder,
entre autres, à des clés de registre qui contiennent <a
href="https://technet.microsoft.com/en-us/library/cc939702.aspx">de
@@ -612,7 +612,7 @@
le téléphone les espionne.</p></li>
<li><p>Les iPhones <a
-href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">envoient
+href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">envoient
une tas de données personnelles aux serveurs d'Apple</a>, où Big Brother
peut les récupérer.</p>
</li>
@@ -624,7 +624,7 @@
</li>
<li><p>Les utilisateurs d'Apple ne peuvent pas créer leur identifiant (<a
-href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">nécessaire
+href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">nécessaire
pour installer ne serait-ce que des applis gratuites</a>) sans donner une
adresse de courriel valide et recevoir le code envoyé dessus par Apple.</p>
</li>
@@ -1008,7 +1008,7 @@
<li><p> Les jouets « CloudPets » équipés de micros <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">divulguent
les conversations des enfants au fabricant</a>. Et vous savez quoi ? <a
-href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Des
+href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Des
pirates informatiques ont trouvé moyen d'accéder</a> au produit de cet
espionnage.</p>
@@ -1536,7 +1536,7 @@
</li>
<li><p>Les pages qui contiennent des boutons <cite>Like</cite> <a
-href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">permettent
+href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">permettent
à Facebook de pister les visiteurs de ces pages</a>, même ceux qui n'ont pas
de compte Facebook.</p>
</li>
@@ -1788,7 +1788,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/05/19 13:31:37 $
+$Date: 2018/06/05 20:00:05 $
<!-- timestamp end -->
</p>
Index: proprietary/po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/malware-apple.fr-en.html 3 May 2018 20:59:28 -0000
1.49
+++ proprietary/po/malware-apple.fr-en.html 5 Jun 2018 20:00:06 -0000
1.50
@@ -150,7 +150,7 @@
<li>
<p>The iPhone 7 contains DRM specifically designed to <a
-
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">
+
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides Apple.</p>
@@ -206,7 +206,7 @@
taken. Users would have no way to tell whether the phone is snooping on
them.</p></li>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
lots of personal data to Apple's servers</a>. Big Brother can
get them from there.</p>
</li>
@@ -359,7 +359,7 @@
</li>
<li><p><a
-
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017">
+
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">
Apple uses DRM software to prevent people from charging an iThing with a
generic USB cable</a>.</p></li>
@@ -585,7 +585,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/05/03 20:59:28 $
+$Date: 2018/06/05 20:00:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-appliances.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr-en.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/po/malware-appliances.fr-en.html 4 Mar 2018 20:59:11
-0000 1.35
+++ proprietary/po/malware-appliances.fr-en.html 5 Jun 2018 20:00:06
-0000 1.36
@@ -108,9 +108,9 @@
</li>
<li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
-<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to the Internet,
-its security is crap</a>.</p>
+<p>When Miele's Internet of Stings hospital disinfectant dishwasher is <a
+href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+connected to the Internet, its security is crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's filesystem,
infect it with malware, and force the dishwasher to launch attacks on
other devices in the network. Since these dishwashers are used in hospitals,
@@ -309,7 +309,7 @@
<li>
<p> “Self-encrypting” disk drives do the encryption with
proprietary firmware so you can't trust it. Western Digital's <a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
“My Passport” drives have a back door</a>.</p>
</li>
@@ -549,7 +549,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/03/04 20:59:11 $
+$Date: 2018/06/05 20:00:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-games.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/malware-games.fr-en.html 1 Jan 2018 17:34:55 -0000
1.5
+++ proprietary/po/malware-games.fr-en.html 5 Jun 2018 20:00:06 -0000
1.6
@@ -60,8 +60,8 @@
</li>
<li>
-<p>Oculus Rift games now have
-<a href="http://motherboard.vice.com/read/new-oculus-drm-cross-platform">
+<p>Oculus Rift games now have <a
+href="https://motherboard.vice.com/en_us/article/vv77ea/new-oculus-drm-cross-platform">
DRM meant to prevent running them on other systems</a>.</p>
</li>
@@ -140,7 +140,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/01 17:34:55 $
+$Date: 2018/06/05 20:00:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/po/malware-microsoft.fr-en.html 3 May 2018 19:59:43 -0000
1.52
+++ proprietary/po/malware-microsoft.fr-en.html 5 Jun 2018 20:00:06 -0000
1.53
@@ -150,7 +150,7 @@
<li>
<p>Microsoft has made Windows 7 and 8 cease to function on certain
new computers,
- <a
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">effectively
+ <a
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
forcing their owners to switch to Windows 10</a>.</p>
</li>
@@ -288,7 +288,7 @@
by force setting the telemetry mode to “Full”</a>.</p>
<p>The <a
-href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">
+href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
“Full” telemetry mode</a> allows Microsoft Windows
engineers to access, among other things, registry keys
<a href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
@@ -348,7 +348,7 @@
<li>Spyware in Windows 8: <a
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user.</a>
- <a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
+ <a
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
Windows 8.1 snoops on local searches.</a> And there's a
<a href="http://www.marketoracle.co.uk/Article40836.html">
secret NSA key in Windows</a>, whose functions we don't know.</li>
@@ -505,7 +505,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/05/03 19:59:43 $
+$Date: 2018/06/05 20:00:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/malware-mobiles.fr-en.html 25 Jan 2018 21:30:54 -0000
1.34
+++ proprietary/po/malware-mobiles.fr-en.html 5 Jun 2018 20:00:06 -0000
1.35
@@ -441,7 +441,7 @@
<li>
<p>The iPhone 7 contains DRM specifically designed to <a
-
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">
+
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides Apple.</p>
@@ -530,7 +530,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/25 21:30:54 $
+$Date: 2018/06/05 20:00:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/proprietary-insecurity.fr-en.html 3 May 2018 19:59:43
-0000 1.53
+++ proprietary/po/proprietary-insecurity.fr-en.html 5 Jun 2018 20:00:06
-0000 1.54
@@ -156,9 +156,9 @@
</li>
<li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
-<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to the Internet,
-its security is crap</a>.</p>
+<p>When Miele's Internet of Stings hospital disinfectant dishwasher is <a
+href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+connected to the Internet, its security is crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's filesystem,
infect it with malware, and force the dishwasher to launch attacks on other
@@ -223,8 +223,9 @@
</li>
<li>
-<p>Ransomware <a
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has
-been developed for a thermostat that uses proprietary software</a>.</p>
+<p>Ransomware <a
+href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">
+has been developed for a thermostat that uses proprietary software</a>.</p>
</li>
<li>
@@ -344,7 +345,7 @@
“Self-encrypting” disk drives do the encryption with proprietary
firmware so you can't trust it. Western Digital's “My Passport”
drives
-<a
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have
a back door</a>.
+<a
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have
a back door</a>.
</p>
</li>
@@ -452,7 +453,8 @@
It is possible to kill people by taking control of medical implants by
radio</a>. Here
is <a href="http://www.bbc.co.uk/news/technology-17631838">more
-information</a>. And <a
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.
+information</a>. And <a
+href="https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.
</p>
</li>
@@ -570,7 +572,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/05/03 19:59:43 $
+$Date: 2018/06/05 20:00:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/po/proprietary-insecurity.ru-en.html 5 Jun 2018 17:59:47
-0000 1.52
+++ proprietary/po/proprietary-insecurity.ru-en.html 5 Jun 2018 20:00:06
-0000 1.53
@@ -345,7 +345,7 @@
“Self-encrypting” disk drives do the encryption with proprietary
firmware so you can't trust it. Western Digital's “My Passport”
drives
-<a
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have
a back door</a>.
+<a
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have
a back door</a>.
</p>
</li>
@@ -572,7 +572,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/06/05 17:59:47 $
+$Date: 2018/06/05 20:00:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary/po/proprietary-insecurity.ru.po 5 Jun 2018 19:02:38 -0000
1.170
+++ proprietary/po/proprietary-insecurity.ru.po 5 Jun 2018 20:00:06 -0000
1.171
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-06-05 18:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -684,18 +683,6 @@
"компÑÑÑеÑам и дÑÑгим ÑÑÑÑойÑÑвам FitBit, Ñ
коÑоÑÑми они взаимодейÑÑвÑÑÑ."
#. type: Content of: <ul><li><p>
-# | “Self-encrypting” disk drives do the encryption with
-# | proprietary firmware so you can't trust it. Western Digital's “My
-# | Passport” drives <a
-# |
[-href=\"https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">have-]
-# |
{+href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">have+}
-# | a back door</a>.
-#| msgid ""
-#| "“Self-encrypting” disk drives do the encryption with "
-#| "proprietary firmware so you can't trust it. Western Digital's “My "
-#| "Passport” drives <a href=\"https://motherboard.vice.com/en_uk/read/"
-#| "some-popular-self-encrypting-hard-drives-have-really-bad-encryption"
-#| "\">have a back door</a>."
msgid ""
"“Self-encrypting” disk drives do the encryption with proprietary "
"firmware so you can't trust it. Western Digital's “My Passport” "
@@ -705,8 +692,9 @@
msgstr ""
"“СамоÑиÑÑÑÑÑиеÑÑ” жеÑÑкие диÑки
ÑиÑÑÑÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð½ÐµÑвободнÑÑ
"
"внÑÑÑенниÑ
пÑогÑамм, Ñак ÑÑо Ð²Ñ Ð½Ðµ можеÑе
им довеÑÑÑÑ. У диÑков “My "
-"Passport” компании Western Digital <a
href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-"
-"popular-self-encrypting-hard-drives-have-really-bad-encryption\">еÑÑÑ
ÑеÑнÑй Ñ
од</a>."
+"Passport” компании Western Digital <a
href=\"https://motherboard.vice."
+"com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-"
+"really-bad-encryption\">еÑÑÑ ÑеÑнÑй Ñ
од</a>."
#. type: Content of: <ul><li><p>
msgid ""
Index: proprietary/po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-sabotage.fr-en.html 3 Feb 2018 10:36:21
-0000 1.39
+++ proprietary/po/proprietary-sabotage.fr-en.html 5 Jun 2018 20:00:06
-0000 1.40
@@ -86,7 +86,7 @@
<li>
<p>The iPhone 7 contains DRM specifically designed to <a
-
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">
+
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides Apple.</p>
@@ -99,7 +99,7 @@
<li>
<p>Microsoft has made Windows 7 and 8 cease to
function on certain new computers,
- <a
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">effectively
+ <a
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
forcing their owners to switch to Windows 10</a>.</p>
</li>
@@ -385,7 +385,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/02/03 10:36:21 $
+$Date: 2018/06/05 20:00:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary/po/proprietary-surveillance.fr-en.html 19 May 2018 13:31:37
-0000 1.109
+++ proprietary/po/proprietary-surveillance.fr-en.html 5 Jun 2018 20:00:06
-0000 1.110
@@ -182,7 +182,7 @@
by force setting the telemetry mode to “Full”</a>.</p>
<p>The <a
-href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">
+href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
“Full” telemetry mode</a> allows Microsoft Windows
engineers to access, among other things, registry keys
<a href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
@@ -581,7 +581,7 @@
taken. Users would have no way to tell whether the phone is snooping on
them.</p></li>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
lots of personal data to Apple's servers</a>. Big Brother can
get them from there.</p>
</li>
@@ -591,7 +591,9 @@
days.</p>
</li>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ <li><p>Users cannot make an Apple ID <a
+href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">
+ (necessary to install even gratis apps)</a>
without giving a valid email address and receiving the code Apple
sends to it.</p>
</li>
@@ -952,11 +954,12 @@
to its customers.</p>
</li>
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
- collected by the manufacturer's snooping.</p>
+ <li><p> “CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what? <a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these conversations
was unacceptable by itself.</p></li>
@@ -1447,8 +1450,8 @@
Baidu's Japanese-input and Chinese-input apps spy on users.</a></p>
</li>
- <li><p>Pages that contain “Like” buttons
- <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ <li><p>Pages that contain “Like” buttons <a
+
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
enable Facebook to track visitors to those pages</a>—even
users that don't have Facebook accounts.</p>
</li>
@@ -1661,7 +1664,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/05/19 13:31:37 $
+$Date: 2018/06/05 20:00:06 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www philosophy/basic-freedoms.fr.html philosoph...,
GNUN <=