[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po proprietary-insecurity.de.po...
From: |
GNUN |
Subject: |
www/proprietary/po proprietary-insecurity.de.po... |
Date: |
Wed, 26 Sep 2018 10:28:12 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/09/26 10:28:11
Modified files:
proprietary/po : proprietary-insecurity.de.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.181&r2=1.182
Patches:
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary-insecurity.de.po 18 Sep 2018 17:27:39 -0000 1.114
+++ proprietary-insecurity.de.po 26 Sep 2018 14:28:11 -0000 1.115
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-09-18 17:25+0000\n"
+"POT-Creation-Date: 2018-09-26 14:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -128,6 +128,49 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
+"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
+"voice commands in other audio</a>, so that people cannot hear them, but "
+"Alexa and Siri can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+"<b>Siri</b>, <b>Alexa</b> und all die anderen Sprachsteuerungssysteme können
"
+"<a href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-"
+"it-astoundingly-easy-to-hack-siri-and-alexa\">durch Programme gekapert "
+"werden, die Befehle ‑ für Menschen unhörbar ‑"
+" im Ultraschallbereich wiedergeben</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Samsung phones randomly <a href=\"https://www.theverge.com/"
"circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"
"\">send photos to people in the owner's contact list</a>."
@@ -161,6 +204,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Intel's intentional “management engine” back door has <a href="
+"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
+"unintended back doors</a> too."
+msgstr ""
+"Intels vorsätzliche âManagement Engineâ-Hintertür hat <a
href=\"https://www."
+"theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\" title=\"Intel "
+"finds critical holes in secret Management Engine hidden in tons of desktop, "
+"server chipsets, unter: https://www.theregister.co.uk/2017/11/20/"
+"intel_flags_firmware_flaws/ The Register 2017.\">auch unbeabsichtigte "
+"Hintertüren</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -176,19 +232,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Intel's intentional “management engine” back door has <a href="
-"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
-"unintended back doors</a> too."
-msgstr ""
-"Intels vorsätzliche âManagement Engineâ-Hintertür hat <a
href=\"https://www."
-"theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\" title=\"Intel "
-"finds critical holes in secret Management Engine hidden in tons of desktop, "
-"server chipsets, unter: https://www.theregister.co.uk/2017/11/20/"
-"intel_flags_firmware_flaws/ The Register 2017.\">auch unbeabsichtigte "
-"Hintertüren</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Bad security in some cars makes it possible to <a href=\"https://cve.mitre."
"org/cgi-bin/cvename.cgi?name=CVE-2017-14937\"> remotely activate the "
"airbags</a>."
@@ -245,46 +288,22 @@
msgstr "Setzen Sie sich dem nicht aus und weisen all die IdD zurück!"
#. type: Content of: <ul><li><p>
+# | It is unfortunate that the article uses the term <a
+# | href=\"/philosophy/words-to-avoid.html#Monetize\">[-
+# | -]“monetize”</a>.
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\"> “monetize”</a>."
msgid ""
"It is unfortunate that the article uses the term <a href=\"/philosophy/words-"
-"to-avoid.html#Monetize\"> “monetize”</a>."
+"to-avoid.html#Monetize\">“monetize”</a>."
msgstr ""
"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
#. type: Content of: <ul><li><p>
msgid ""
-"Siri, Alexa, and all the other voice-control systems can be <a href="
-"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
-"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
-"commands in ultrasound that humans can't hear</a>."
-msgstr ""
-"<b>Siri</b>, <b>Alexa</b> und all die anderen Sprachsteuerungssysteme können
"
-"<a href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-"
-"it-astoundingly-easy-to-hack-siri-and-alexa\">durch Programme gekapert "
-"werden, die Befehle ‑ für Menschen unhörbar ‑"
-" im Ultraschallbereich wiedergeben</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
-"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
-"microphone-cameras.html\"> Crackers found a way to break security on a "
-"“smart” TV</a> and use its camera to watch the people who are "
-"watching TV."
-msgstr ""
-"<a href=\"//www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
-"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
-"microphone-cameras.html\" title=\"Is your TV watching you? Security alert "
-"over Samsung's Smart TV as hackers claim they can access its hard drive and "
-"seize control of built-in cameras, unter: dailymail.co.uk/sciencetech/"
-"article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-"
-"attacker-seize-control-microphone-cameras.html 2017.\">Cracker fanden einen "
-"Weg die Sicherheit eines âintelligentenâ TVs zu knacken</a>, und nutzen "
-"dessen Kamera um Zuschauer zu beobachten."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Many models of Internet-connected cameras <a href=\"/proprietary/proprietary-"
"back-doors.html#InternetCameraBackDoor\"> have backdoors</a>."
msgstr ""
@@ -308,58 +327,6 @@
"controls/ 2017.\">diese Konten finden und sie nutzen können, um in die "
"Kameras der Nutzer zu gelangen</a>."
-# HP-Notebooks der Serien EliteBook, ProBook, Elite x2 und ZBook
-#. type: Content of: <ul><li><p>
-msgid ""
-"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
-"installed on 28 models of HP laptops logged the user's keystroke to a file "
-"in the filesystem. Any process with access to the filesystem or the "
-"MapViewOfFile API could gain access to the log. Furthermore, <a href="
-"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
-"\">according to modzero</a> the “information-leak via Covert Storage "
-"Channel enables malware authors to capture keystrokes without taking the "
-"risk of being classified as malicious task by AV heuristics”."
-msgstr ""
-"Das Treiberpaket <b>Conexant HD Audio Driver</b> (Version 1.0.0.46 und "
-"vorherige), vorinstalliert auf 28 HP-Notebook-Modellen, schreibt alle "
-"Tastatureingaben (einschlieÃlich der Passwörter) des Anwenders in eine "
-"lesbare Datei im Dateisystem. Jeder Prozess mit Zugriff auf das Dateisystem "
-"oder der MapViewOfFile-API könnte auf das Protokoll zugreifen. Laut <a href="
-"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
-"\">Modzero darüber hinaus</a> <cite title=\"https://www.modzero.ch/"
-"advisories/MZ-17-01-Conexant-Keylogger.txt\">ermöglicht das Informationsleck
"
-"via <i>Covert Storage Channel</i> Schadsoftware-Autoren, Tastatureingaben zu "
-"erfassen, ohne das Risiko als schädliche Aufgabe von AV-Heuristiken "
-"eingestuft zu werden zu riskieren</cite>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The proprietary code that runs pacemakers, insulin pumps, and other medical "
-"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
-"of gross security faults</a>."
-msgstr ""
-"Der proprietäre Code, der Herzschrittmacher, Insulinpumpen und andere "
-"medizinische Geräte betreibt, ist <a href=\"//www.bbc.co.uk/news/"
-"technology-40042584\" title=\"'Thousands' of known bugs found in pacemaker "
-"code, unter: bbc.com/news/technology-40042584 2017.\">voller grober "
-"Sicherheitsfehler</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
-"by the Shadowbrokers group, are now being used to <a href=\"https://"
-"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
-"computers-around-the-world/\">attack a great number of Windows computers "
-"with ransomware</a>."
-msgstr ""
-"Die Ausnutzung der Sicherheitslücken von Programmfehlern unter Windows, die "
-"von der NSA entwickelt wurden und dann <i>The Shadow Brokers</i> "
-"veröffentlichten, werden nun für eine <a href=\"https://theintercept."
-"com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-"
-"around-the-world/\" title=\"Sam Biddle, Leaked NSA Malware Is Helping Hijack "
-"Computers Around the World, unter: TheIntercept.com 2017.\">groÃe Anzahl von
"
-"Windows-Rechnern mit Ransomware eingesetzt</a>."
-
# Notizen:
#
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr
#
@@ -414,6 +381,58 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The proprietary code that runs pacemakers, insulin pumps, and other medical "
+"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
+"of gross security faults</a>."
+msgstr ""
+"Der proprietäre Code, der Herzschrittmacher, Insulinpumpen und andere "
+"medizinische Geräte betreibt, ist <a href=\"//www.bbc.co.uk/news/"
+"technology-40042584\" title=\"'Thousands' of known bugs found in pacemaker "
+"code, unter: bbc.com/news/technology-40042584 2017.\">voller grober "
+"Sicherheitsfehler</a>."
+
+# HP-Notebooks der Serien EliteBook, ProBook, Elite x2 und ZBook
+#. type: Content of: <ul><li><p>
+msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
+"installed on 28 models of HP laptops logged the user's keystroke to a file "
+"in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a href="
+"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
+"\">according to modzero</a> the “information-leak via Covert Storage "
+"Channel enables malware authors to capture keystrokes without taking the "
+"risk of being classified as malicious task by AV heuristics”."
+msgstr ""
+"Das Treiberpaket <b>Conexant HD Audio Driver</b> (Version 1.0.0.46 und "
+"vorherige), vorinstalliert auf 28 HP-Notebook-Modellen, schreibt alle "
+"Tastatureingaben (einschlieÃlich der Passwörter) des Anwenders in eine "
+"lesbare Datei im Dateisystem. Jeder Prozess mit Zugriff auf das Dateisystem "
+"oder der MapViewOfFile-API könnte auf das Protokoll zugreifen. Laut <a href="
+"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
+"\">Modzero darüber hinaus</a> <cite title=\"https://www.modzero.ch/"
+"advisories/MZ-17-01-Conexant-Keylogger.txt\">ermöglicht das Informationsleck
"
+"via <i>Covert Storage Channel</i> Schadsoftware-Autoren, Tastatureingaben zu "
+"erfassen, ohne das Risiko als schädliche Aufgabe von AV-Heuristiken "
+"eingestuft zu werden zu riskieren</cite>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+"Die Ausnutzung der Sicherheitslücken von Programmfehlern unter Windows, die "
+"von der NSA entwickelt wurden und dann <i>The Shadow Brokers</i> "
+"veröffentlichten, werden nun für eine <a href=\"https://theintercept."
+"com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-"
+"around-the-world/\" title=\"Sam Biddle, Leaked NSA Malware Is Helping Hijack "
+"Computers Around the World, unter: TheIntercept.com 2017.\">groÃe Anzahl von
"
+"Windows-Rechnern mit Ransomware eingesetzt</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-"
"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
@@ -455,6 +474,54 @@
#. type: Content of: <ul><li><p>
msgid ""
+"If you buy a used “smart” car, house, TV, refrigerator, etc., "
+"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
+"used.html\">the previous owners can still remotely control it</a>."
+msgstr ""
+"Plant man den Kauf eines gebrauchten âintelligentenâ Autos, Hauses, TV-"
+"Geräts, Kühlschranks usw., <a href=\"https://boingboing.net/2017/02/20/the-"
+"previous-owners-of-used.html\" title=\"The previous owners of used
âsmartâ "
+"cars can still control them via the cars' apps (not just cars!), unter: "
+"boingboing.net 2017.\">können Vorbesitzer diese noch immer fernsteuern</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The mobile apps for communicating <a href=\"https://www.bleepingcomputer.com/"
+"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
+"\">with a smart but foolish car have very bad security</a>."
+msgstr ""
+"Mobile Apps zur Kommunikation <a href=\"https://www.bleepingcomputer.com/"
+"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
+"\">mit intelligentem und doch dummen Auto haben sehr törichte "
+"Sicherheitsvorkehrung</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This is in addition to the fact that the car contains a cellular modem that "
+"tells big brother all the time where it is. If you own such a car, it would "
+"be wise to disconnect the modem so as to turn off the tracking."
+msgstr ""
+"Dies ist neben der Tatsache, dass das Auto ein Mobilfunk-Modem enthält, das "
+"Big Brother jederzeit die genaue Position mitteilt. Besitzt man so eine "
+"Auto, wäre man klug beraten sowohl das Modem abzuklemmen als auch das "
+"Tracking zu deaktivieren."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
+"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
+"\">have a security hole that allows an SMS message to install ransomware</a>."
+msgstr ""
+"Samsung-Handys <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
+"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
+"\" title=\"SMS-Exploitable Bug in Samsung Galaxy Phones Can Be Used for "
+"Ransomware Attacks, unter: https://www.bleepingcomputer.com/news/security/"
+"sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-"
+"attacks/ 2017.\">haben eine Sicherheitslücke, die einer SMS-Nachricht "
+"ermöglicht Ransomeware zu installieren</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"WhatsApp has a feature that <a href=\"https://techcrunch.com/2017/01/13/"
"encrypted-messaging-platform-whatsapp-denies-backdoor-claim/\"> has been "
"described as a “back door”</a> because it would enable "
@@ -503,60 +570,22 @@
"Kind bitten können die Haustür zu öffnen, während Mami gerade nicht
guckt."
#. type: Content of: <ul><li><p>
+# | 4G LTE phone networks are drastically insecure. They can be <a
+# |
[-href=\"https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">-]
+# |
{+href=\"https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">+}
+# | taken over by third parties and used for man-in-the-middle attacks</a>.
+#, fuzzy
+#| msgid ""
+#| "4G LTE phone networks are drastically insecure. They can be <a href="
+#| "\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
+#| "uk/2016/10/23/"
+#| "every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
+#| "over by third parties and used for man-in-the-middle attacks</a>."
msgid ""
-"The mobile apps for communicating <a href=\"https://www.bleepingcomputer.com/"
-"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
-"\">with a smart but foolish car have very bad security</a>."
-msgstr ""
-"Mobile Apps zur Kommunikation <a href=\"https://www.bleepingcomputer.com/"
-"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
-"\">mit intelligentem und doch dummen Auto haben sehr törichte "
-"Sicherheitsvorkehrung</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is in addition to the fact that the car contains a cellular modem that "
-"tells big brother all the time where it is. If you own such a car, it would "
-"be wise to disconnect the modem so as to turn off the tracking."
-msgstr ""
-"Dies ist neben der Tatsache, dass das Auto ein Mobilfunk-Modem enthält, das "
-"Big Brother jederzeit die genaue Position mitteilt. Besitzt man so eine "
-"Auto, wäre man klug beraten sowohl das Modem abzuklemmen als auch das "
-"Tracking zu deaktivieren."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you buy a used “smart” car, house, TV, refrigerator, etc., "
-"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
-"used.html\">the previous owners can still remotely control it</a>."
-msgstr ""
-"Plant man den Kauf eines gebrauchten âintelligentenâ Autos, Hauses, TV-"
-"Geräts, Kühlschranks usw., <a href=\"https://boingboing.net/2017/02/20/the-"
-"previous-owners-of-used.html\" title=\"The previous owners of used
âsmartâ "
-"cars can still control them via the cars' apps (not just cars!), unter: "
-"boingboing.net 2017.\">können Vorbesitzer diese noch immer fernsteuern</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
-"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
-"\">have a security hole that allows an SMS message to install ransomware</a>."
-msgstr ""
-"Samsung-Handys <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
-"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
-"\" title=\"SMS-Exploitable Bug in Samsung Galaxy Phones Can Be Used for "
-"Ransomware Attacks, unter: https://www.bleepingcomputer.com/news/security/"
-"sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-"
-"attacks/ 2017.\">haben eine Sicherheitslücke, die einer SMS-Nachricht "
-"ermöglicht Ransomeware zu installieren</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"4G LTE phone networks are drastically insecure. They can be <a href="
-"\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
-"uk/2016/10/23/"
-"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
-"over by third parties and used for man-in-the-middle attacks</a>."
+"4G LTE phone networks are drastically insecure. They can be <a href="
+"\"https://www.theregister.co.uk/2016/10/23/"
+"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
+"over by third parties and used for man-in-the-middle attacks</a>."
msgstr ""
"LTE-Telefonnetze der vierten Generation (4G), auch als NGMN (Next Generation "
"Mobile Networks) bezeichnet, sind extrem unsicher. Sie können <a href="
@@ -661,22 +690,19 @@
msgstr "GNU/Linux braucht keine Antivirus-Software."
#. type: Content of: <ul><li><p>
-msgid ""
-"Over 70 brands of network-connected surveillance cameras <a href=\"http://"
-"www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
-"\">have security bugs that allow anyone to watch through them</a>."
-msgstr ""
-"Ãberwachungskameras mit Verbindung ins Internet von mehr als <a
href=\"//www."
-"kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\" title="
-"\"Remote Code Execution in CCTV-DVR affecting over 70 different vendors, "
-"unter: Kerneron Security, kerneronsec.com 2016.\">70 Markenartikel haben "
-"Sicherheitslücken, die jedermann zugucken lassen</a>."
-
-#. type: Content of: <ul><li><p>
+# | Samsung's “Smart Home” has a big security hole; <a
+# |
href=\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/\">{+
+# | +}unauthorized people can remotely control it</a>.
+#, fuzzy
+#| msgid ""
+#| "Samsung's “Smart Home” has a big security hole; <a href="
+#| "\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-"
+#| "hackers-make-keys-to-front-door/\">unauthorized people can remotely "
+#| "control it</a>."
msgid ""
"Samsung's “Smart Home” has a big security hole; <a href=\"http://"
"arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-"
-"keys-to-front-door/\">unauthorized people can remotely control it</a>."
+"keys-to-front-door/\"> unauthorized people can remotely control it</a>."
msgstr ""
"Erhebliche Sicherheitslücke in Samsung <em>âSmart Homeâ</em>: <a
href=\"//"
"arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-"
@@ -703,51 +729,32 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Nissan Leaf has a built-in cell phone modem which allows effectively "
-"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
-"nissan/\">to access its computers remotely and make changes in various "
-"settings</a>."
-msgstr ""
-"Das <ins>GroÃserien-Elektroauto</ins> <b>Nissan Leaf</b> hat ein eingebautes
"
-"Infotainmentsystem, das praktisch jedermann via Mobilfunkmodem erlaubt <a "
-"href=\"https://www.troyhunt.com/controlling-vehicle-features-of-nissan/\" "
-"title=\"Controlling vehicle features of Nissan LEAFs across the globe via "
-"vulnerable APIs, unter: Troy Hunt, troyhunt.com 2016.\">auf (seinem) "
-"Bordrechner per Fernzugriff zuzugreifen</a> und verschiedenste Einstellungen "
-"vorzunehmen."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"That's easy to do because the system has no authentication when accessed "
-"through the modem. However, even if it asked for authentication, you "
-"couldn't be confident that Nissan has no access. The software in the car is "
-"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
-"\">which means it demands blind faith from its users</a>."
-msgstr ""
-"Da das System keine Authentifizierung beim Zugriff auf das Mobilfunkmodem "
-"durchführt, ist das recht einfach. Doch selbst wenn diese angefordert
würde, "
-"könnte man nicht mit Gewissheit sagen, ob Nissan nicht auch Zugang hätte. "
-"Die Software im Auto ist proprietär, was bedeutet, sie <a
href=\"/philosophy/"
-"free-software-even-more-important\">erfordert blindes Vertrauen von seinen "
-"Benutzern</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Even if no one connects to the car remotely, the cell phone modem enables "
-"the phone company to track the car's movements all the time; it is possible "
-"to physically remove the cell phone modem though."
+"A bug in the iThings Messages app <a href=\"https://theintercept."
+"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
+"a malicious web site to extract all the user's messaging history</a>."
msgstr ""
-"Selbst wenn niemand aus der Ferne zum Auto in Verbindung steht, ermöglicht "
-"das Mobilfunksystem<ins> ‑ wie jedes andere auch ‑"
-" </ins> dem Mobilfunkanbieter, ständig die Route des Autos zu "
-"verfolgen. Das Mobiltelefon-Modem physisch zu entfernen wäre möglich â¦"
+"Ein Programmfehler in der iDings Nachrichtenanwendung <a href=\"https://"
+"theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-"
+"click/\" title=\"Yael Grauer, Apple Bug Exposed Chat History With a Single "
+"Click, unter: The Interceptor, theintercept.com 2016.\">erlaubte einer "
+"böswilligen Internetpräsenz den gesamten Nachrichtenverlauf eines Benutzers
"
+"abzuziehen</a>."
#. type: Content of: <ul><li><p>
+# | Malware {+was+} found on <a
+# |
href=\"http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html\">{+
+# | +}security cameras available through Amazon</a>.
+#, fuzzy
+#| msgid ""
+#| "Malware found on <a href=\"http://www.slate.com/blogs/"
+#| "future_tense/2016/04/11/"
+#| "security_cameras_sold_through_amazon_have_malware_according_to_security."
+#| "html\">security cameras available through Amazon</a>."
msgid ""
-"Malware found on <a href=\"http://www.slate.com/blogs/"
+"Malware was found on <a href=\"http://www.slate.com/blogs/"
"future_tense/2016/04/11/"
"security_cameras_sold_through_amazon_have_malware_according_to_security.html"
-"\">security cameras available through Amazon</a>."
+"\"> security cameras available through Amazon</a>."
msgstr ""
"<a href=\"//www.slate.com/blogs/future_tense/2016/04/11/"
"security_cameras_sold_through_amazon_have_malware_according_to_security.html"
@@ -767,23 +774,44 @@
"Schadsoftware in der Kamera."
#. type: Content of: <ul><li><p>
-msgid ""
-"A bug in the iThings Messages app <a href=\"https://theintercept."
-"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
-"a malicious web site to extract all the user's messaging history</a>."
+# | Over 70 brands of network-connected surveillance cameras {+have+} <a
+# |
[-href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">have-]
+# |
{+href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">+}
+# | security bugs that allow anyone to watch through them</a>.
+#, fuzzy
+#| msgid ""
+#| "Over 70 brands of network-connected surveillance cameras <a href=\"http://"
+#| "www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
+#| "\">have security bugs that allow anyone to watch through them</a>."
+msgid ""
+"Over 70 brands of network-connected surveillance cameras have <a href="
+"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
+"html\"> security bugs that allow anyone to watch through them</a>."
msgstr ""
-"Ein Programmfehler in der iDings Nachrichtenanwendung <a href=\"https://"
-"theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-"
-"click/\" title=\"Yael Grauer, Apple Bug Exposed Chat History With a Single "
-"Click, unter: The Interceptor, theintercept.com 2016.\">erlaubte einer "
-"böswilligen Internetpräsenz den gesamten Nachrichtenverlauf eines Benutzers
"
-"abzuziehen</a>."
+"Ãberwachungskameras mit Verbindung ins Internet von mehr als <a
href=\"//www."
+"kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\" title="
+"\"Remote Code Execution in CCTV-DVR affecting over 70 different vendors, "
+"unter: Kerneron Security, kerneronsec.com 2016.\">70 Markenartikel haben "
+"Sicherheitslücken, die jedermann zugucken lassen</a>."
#. type: Content of: <ul><li><p>
+# | Many proprietary payment apps <a
+# |
href=\"http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data\">[-
+# | -]transmit personal data in an insecure way</a>. However, the worse aspect
+# | of these apps is that <a
+# | href=\"/philosophy/surveillance-vs-democracy.html\">payment is not
+# | anonymous</a>.
+#, fuzzy
+#| msgid ""
+#| "Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
+#| "articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
+#| "securing-user-data\"> transmit personal data in an insecure way</a>. "
+#| "However, the worse aspect of these apps is that <a href=\"/philosophy/"
+#| "surveillance-vs-democracy.html\">payment is not anonymous</a>."
msgid ""
"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
-"user-data\"> transmit personal data in an insecure way</a>. However, the "
+"user-data\">transmit personal data in an insecure way</a>. However, the "
"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
"democracy.html\">payment is not anonymous</a>."
msgstr ""
@@ -795,9 +823,72 @@
#. type: Content of: <ul><li><p>
msgid ""
-"FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-security/"
-"latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-"
-"trackers/\"> have a Bluetooth vulnerability</a> that allows attackers to "
+"The Nissan Leaf has a built-in cell phone modem which allows effectively "
+"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
+"nissan/\">to access its computers remotely and make changes in various "
+"settings</a>."
+msgstr ""
+"Das <ins>GroÃserien-Elektroauto</ins> <b>Nissan Leaf</b> hat ein eingebautes
"
+"Infotainmentsystem, das praktisch jedermann via Mobilfunkmodem erlaubt <a "
+"href=\"https://www.troyhunt.com/controlling-vehicle-features-of-nissan/\" "
+"title=\"Controlling vehicle features of Nissan LEAFs across the globe via "
+"vulnerable APIs, unter: Troy Hunt, troyhunt.com 2016.\">auf (seinem) "
+"Bordrechner per Fernzugriff zuzugreifen</a> und verschiedenste Einstellungen "
+"vorzunehmen."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"That's easy to do because the system has no authentication when accessed "
+"through the modem. However, even if it asked for authentication, you "
+"couldn't be confident that Nissan has no access. The software in the car is "
+"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
+"\">which means it demands blind faith from its users</a>."
+msgstr ""
+"Da das System keine Authentifizierung beim Zugriff auf das Mobilfunkmodem "
+"durchführt, ist das recht einfach. Doch selbst wenn diese angefordert
würde, "
+"könnte man nicht mit Gewissheit sagen, ob Nissan nicht auch Zugang hätte. "
+"Die Software im Auto ist proprietär, was bedeutet, sie <a
href=\"/philosophy/"
+"free-software-even-more-important\">erfordert blindes Vertrauen von seinen "
+"Benutzern</a>."
+
+#. type: Content of: <ul><li><p>
+# | Even if no one connects to the car remotely, the cell phone modem enables
+# | the phone company to track the car's movements all the time; it is
+# | possible to physically remove the cell phone modem{+,+} though.
+#, fuzzy
+#| msgid ""
+#| "Even if no one connects to the car remotely, the cell phone modem enables "
+#| "the phone company to track the car's movements all the time; it is "
+#| "possible to physically remove the cell phone modem though."
+msgid ""
+"Even if no one connects to the car remotely, the cell phone modem enables "
+"the phone company to track the car's movements all the time; it is possible "
+"to physically remove the cell phone modem, though."
+msgstr ""
+"Selbst wenn niemand aus der Ferne zum Auto in Verbindung steht, ermöglicht "
+"das Mobilfunksystem<ins> ‑ wie jedes andere auch ‑"
+" </ins> dem Mobilfunkanbieter, ständig die Route des Autos zu "
+"verfolgen. Das Mobiltelefon-Modem physisch zu entfernen wäre möglich â¦"
+
+#. type: Content of: <ul><li><p>
+# | FitBit fitness trackers [-<a
+# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">-]
+# | have a {+<a
+# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">+}
+# | Bluetooth vulnerability</a> that allows attackers to send malware to the
+# | devices, which can subsequently spread to computers and other FitBit
+# | trackers that interact with them.
+#, fuzzy
+#| msgid ""
+#| "FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-"
+#| "security/latest-security-news/10-second-hack-delivers-first-ever-malware-"
+#| "to-fitness-trackers/\"> have a Bluetooth vulnerability</a> that allows "
+#| "attackers to send malware to the devices, which can subsequently spread "
+#| "to computers and other FitBit trackers that interact with them."
+msgid ""
+"FitBit fitness trackers have a <a href=\"http://www.tripwire.com/state-of-"
+"security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-"
+"fitness-trackers/\"> Bluetooth vulnerability</a> that allows attackers to "
"send malware to the devices, which can subsequently spread to computers and "
"other FitBit trackers that interact with them."
msgstr ""
@@ -810,12 +901,24 @@
"Ãberwachungsgeräten austauscht."
#. type: Content of: <ul><li><p>
+# | “Self-encrypting” disk drives do the encryption with
+# | proprietary firmware so you can't trust it. Western Digital's “My
+# | Passport” drives <a
+# |
href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">{+
+# | +}have a back door</a>.
+#, fuzzy
+#| msgid ""
+#| "“Self-encrypting” disk drives do the encryption with "
+#| "proprietary firmware so you can't trust it. Western Digital's “My "
+#| "Passport” drives <a href=\"https://motherboard.vice.com/en_us/"
+#| "article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-"
+#| "encryption\">have a back door</a>."
msgid ""
"“Self-encrypting” disk drives do the encryption with proprietary "
"firmware so you can't trust it. Western Digital's “My Passport” "
"drives <a href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-"
-"popular-self-encrypting-hard-drives-have-really-bad-encryption\">have a back "
-"door</a>."
+"popular-self-encrypting-hard-drives-have-really-bad-encryption\"> have a "
+"back door</a>."
msgstr ""
"âSelbstverschlüsselndeâ Plattenlaufwerke führen die Verschlüsselung
mittels "
"proprietärer Firmware durch, der man daher nicht uneingeschränkt vertrauen "
@@ -827,19 +930,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
-"door for 4 years</a>, which could be exploited by attackers to gain root "
-"privileges."
-msgstr ""
-"Apple OS X hatte <a href=\"https://truesecdev.wordpress.com/2015/04/09/"
-"hidden-backdoor-api-to-root-privileges-in-apple-os-x/\" title=\"Hidden "
-"backdoor API to root privileges in Apple OS X, unter: truesecdev.wordpress."
-"com 2015.\">vorsätzlich 4 Jahre eine lokale Hintertür</a>, die von "
-"Angreifern ausgenutzt werden konnte, um Root-Rechte zu erlangen."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
@@ -853,10 +943,22 @@
"oder Lastwagens möglich ist."
#. type: Content of: <ul><li><p>
+# | Crackers were able to <a
+# |
href=\"http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">{+
+# | +}take remote control of the Jeep</a> “connected car”. {+They
+# | could track the car, start or stop the engine, and activate or deactivate
+# | the brakes, and more.+}
+#, fuzzy
+#| msgid ""
+#| "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
+#| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"
+#| "\">take remote control of the Jeep</a> “connected car”."
msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
-"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take "
-"remote control of the Jeep</a> “connected car”."
+"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> take "
+"remote control of the Jeep</a> “connected car”. They could track "
+"the car, start or stop the engine, and activate or deactivate the brakes, "
+"and more."
msgstr ""
"Cracker konnten âVernetzte Fahrzeugâ-Technologie <a
href=\"//arstechnica.com/"
"security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-"
@@ -864,14 +966,6 @@
"\"tn01-ref\" class=\"transnote\">[1]</a>"
#. type: Content of: <ul><li><p>
-msgid ""
-"They could track the car, start or stop the engine, and activate or "
-"deactivate the brakes, and more."
-msgstr ""
-"Unter anderem konnte das Fahrzeug verfolgt, der Motor gestartet oder "
-"gestoppt und die Bremsen aktiviert bzw. deaktiviert werden und vieles mehr."
-
-#. type: Content of: <ul><li><p>
msgid "I expect that Chrysler and the NSA can do this too."
msgstr "<ins>Vorstellbar wäre</ins>, dass Chrysler und NSA dies auch können."
@@ -886,6 +980,59 @@
"sollte es besser grundsätzlich deaktiviert werden.</ins>"
#. type: Content of: <ul><li><p>
+# | Due to bad security in a drug pump, crackers could use it to <a
+# |
href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/\">{+
+# | +}kill patients</a>.
+#, fuzzy
+#| msgid ""
+#| "Due to bad security in a drug pump, crackers could use it to <a href="
+#| "\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
+#| "pumps/\">kill patients</a>."
+msgid ""
+"Due to bad security in a drug pump, crackers could use it to <a href="
+"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
+"pumps/\"> kill patients</a>."
+msgstr ""
+"Aufgrund der schlechten Sicherheit in einer Medikamentenpumpe könnten "
+"Cracker <a href=\"//www.wired.com/2015/06/hackers-can-send-fatal-doses-"
+"hospital-drug-pumps/\" title=\"Hacker Can Send Fatal Dose to Hospital Drug "
+"Pumps, unter: wired.com 2015.\">Patienten töten</a>."
+
+#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html\">
+# | Many smartphone apps use insecure authentication methods when storing your
+# | personal data on remote [-servers.</a>-] {+servers</a>.+} This leaves
+# | personal information like email addresses, passwords, and health
+# | information vulnerable. Because many of these apps are proprietary it
+# | makes it hard to impossible to know which apps are at risk.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-"
+#| "millions-users.html\"> Many smartphone apps use insecure authentication "
+#| "methods when storing your personal data on remote servers.</a> This "
+#| "leaves personal information like email addresses, passwords, and health "
+#| "information vulnerable. Because many of these apps are proprietary it "
+#| "makes it hard to impossible to know which apps are at risk."
+msgid ""
+"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
+"users.html\"> Many smartphone apps use insecure authentication methods when "
+"storing your personal data on remote servers</a>. This leaves personal "
+"information like email addresses, passwords, and health information "
+"vulnerable. Because many of these apps are proprietary it makes it hard to "
+"impossible to know which apps are at risk."
+msgstr ""
+"<a href=\"//phys.org/news/2015-05-app-vulnerability-threatens-millions-users."
+"html\" title=\"App data vulnerability threatens millions of users, unter: "
+"phys.org 2015.\">Viele Smartphone-Applikationen verwenden unsichere "
+"Authentifizierungsmethoden bei der Speicherung IHRER persönlichen Daten auf "
+"(irgendwelchen) Internetservern</a>. Dies macht persönliche Daten wie
E-Mail-"
+"Adressen, Passwörter und Gesundheitsinformationen angreifbar. Da viele "
+"dieser Apps proprietär sind, macht es schwierig ‑ wenn nicht
"
+"gar unmöglich ‑ zu wissen, welche Apps eine Gefahr "
+"darstellen."
+
+#. type: Content of: <ul><li><p>
msgid ""
"Hospira infusion pumps, which are used to administer drugs to a patient, "
"were rated “<a href=\"https://securityledger.com/2015/05/researcher-"
@@ -911,48 +1058,72 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Due to bad security in a drug pump, crackers could use it to <a href="
-"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
-"pumps/\">kill patients</a>."
+"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
+"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
+"door for 4 years</a>, which could be exploited by attackers to gain root "
+"privileges."
msgstr ""
-"Aufgrund der schlechten Sicherheit in einer Medikamentenpumpe könnten "
-"Cracker <a href=\"//www.wired.com/2015/06/hackers-can-send-fatal-doses-"
-"hospital-drug-pumps/\" title=\"Hacker Can Send Fatal Dose to Hospital Drug "
-"Pumps, unter: wired.com 2015.\">Patienten töten</a>."
+"Apple OS X hatte <a href=\"https://truesecdev.wordpress.com/2015/04/09/"
+"hidden-backdoor-api-to-root-privileges-in-apple-os-x/\" title=\"Hidden "
+"backdoor API to root privileges in Apple OS X, unter: truesecdev.wordpress."
+"com 2015.\">vorsätzlich 4 Jahre eine lokale Hintertür</a>, die von "
+"Angreifern ausgenutzt werden konnte, um Root-Rechte zu erlangen."
-# (German translation more exactly regarding devices.)
#. type: Content of: <ul><li><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "An app to prevent “identity theft” (access to personal data) "
+#| "by storing users' data on a special server <a href=\"http://arstechnica."
+#| "com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-"
+#| "over-concerns-that-app-isnt-safe/\">was deactivated by its developer</a> "
+#| "which had discovered a security flaw."
msgid ""
-"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
-"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
-"phones, including iPhones, Android, and BlackBerry</a>. While there is not "
-"much detail here, it seems that this does not operate via the universal back "
-"door that we know nearly all portable phones have. It may involve "
-"exploiting various bugs. There are <a href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> lots "
-"of bugs in the phones' radio software</a>."
+"An app to prevent “identity theft” (access to personal data) by "
+"storing users' data on a special server <a href=\"http://arstechnica.com/"
+"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
+"concerns-that-app-isnt-safe/\">was deactivated by its developer</a> which "
+"had discovered a security flaw."
msgstr ""
-"<a href=\"//www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-"
-"on-smart-phone-data-a-920971.html\">Der US-Geheimdienst NSA kann sich Zugang "
-"zu iPhone- und BlackBerry-Geräten sowie zu Geräten mit Android-"
-"Betriebssystem verschaffen</a>. Es gibt zwar kaum Details, es scheint aber, "
-"dass dies nicht über die universelle Hintertür funktioniert, von der wir "
-"wissen, dass sie nahezu alle tragbaren Telefone haben. Dies kann "
-"verschiedene ausnutzbare Programmfehler einschlieÃen. Es gibt viele <a href="
-"\"//www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\">Programmfehler in "
-"der Mobilfunksoftware von Mobiltelefonen</a>."
+"Eine Applikation, die âIdentitätsdiebstahlâ (Zugriff auf persönliche
Daten) "
+"durch Speichern von Nutzerdaten auf einem speziellen Server verhindern soll, "
+"<a href=\"//arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-"
+"deletes-user-data-over-concerns-that-app-isnt-safe/\" title=\"ID theft "
+"protector LifeLock deletes user data over concerns that app isnât safe, "
+"unter: arstechnica.com 2014.\">wurde vom Entwickler deaktiviert</a>, als "
+"dieser eine Sicherheitslücke entdeckte."
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
-"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
-"intrusion."
+"That developer seems to be conscientious about protecting personal data from "
+"third parties in general, but it can't protect that data from the state. "
+"Quite the contrary: confiding your data to someone else's server, if not "
+"first encrypted by you with free software, undermines your rights."
msgstr ""
-"<a href=\"//www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/\" "
-"title=\"When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House "
-"Via The Internet, unter: forbes.com 2013.\"><em>âIntelligentes
Wohnenâ</em> "
-"[engl.]</a> entpuppt sich dummerweise anfällig für Angriffe."
+"Dieser Entwickler scheint generell <ins>im Umgang mit</ins> "
+"personenbezogenen Daten von Dritten gewissenhaft zu sein, aber es kann nicht "
+"die Daten vor dem Staat schützen. Ganz im Gegenteil: dem Server von "
+"irgendjemand anderen <ins>die eigenen</ins> Daten anzuvertrauen, untergräbt,
"
+"sofern nicht zuvor <ins>selbst</ins> mit freier Software verschlüsselt, Ihre
"
+"Rechte."
+
+#. type: Content of: <ul><li><p>
+# | Lots of <a
+# | href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/\">{+
+# | +}hospital equipment has lousy security</a>, and it can be fatal.
+#, fuzzy
+#| msgid ""
+#| "Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-"
+#| "vulnerable/\">hospital equipment has lousy security</a>, and it can be "
+#| "fatal."
+msgid ""
+"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
+"\"> hospital equipment has lousy security</a>, and it can be fatal."
+msgstr ""
+"Eine Menge <a href=\"//www.wired.com/2014/04/hospital-equipment-vulnerable/"
+"\" title=\"Itâs Insanely Easy to Hack Hospital Equipment, unter: wired.com "
+"2014.\">Geräte in Krankenhäusern haben eine lausige Sicherheit</a>, und das
"
+"kann tödlich sein.<a href=\"#tn03\" class=\"transnote\">[3]</a>"
#. type: Content of: <ul><li><p>
msgid ""
@@ -967,73 +1138,49 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\"> The FTC punished a company for making "
-"webcams with bad security so that it was easy for anyone to watch them</a>."
-msgstr ""
-"Die US-Bundeshandelskommission <a href=\"//www.nytimes.com/2013/09/05/"
-"technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\" title="
-"\"Eeward Wyatt, F.T.C. Says Webcamâs Flaw Put Usersâ Lives on Display, "
-"unter: The New York Times, nytimes.com 2013.\">FTC straft Unternehmen wegen "
-"Herstellung von Webcams mit schlechten Sicherheitsstandards ab</a>, so dass "
-"es für jedermann leicht war zuzugucken.<a href=\"#tn02\" id=\"tn02-ref\" "
-"class=\"transnote\">[2]</a>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\"> It is possible to take control "
-"of some car computers through malware in music files</a>. Also <a href="
-"\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">by radio</"
-"a>. Here is <a href=\"http://www.autosec.org/faq.html\">more information</"
-"a>."
+"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
+"have modifiable software</a>, which makes them vulnerable to viruses."
msgstr ""
-"Es ist möglich, die <a href=\"//www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\">Kontrolle über einige Fahrzeug-"
-"Bordrechner durch Schadsoftware in Musikdateien</a> zu übernehmen. Auch <a "
-"href=\"//www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">per Funk</"
-"a>. <a href=\"//www.autosec.org/faq.html\" title=\"FAQ, unter: The Center "
-"for Automotive Embedded Systems Security (CAESS), www.autosec.org/faq.html"
-"\">Weitere Informationen â¦</a>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
-"dies-days-before-scheduled-black-hat-appearance/\"> It is possible to kill "
-"people by taking control of medical implants by radio</a>. Here is <a href="
-"\"http://www.bbc.co.uk/news/technology-17631838\">more information</a>. And "
-"<a href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive."
-"com/2013/02/broken-hearts-how-plausible-was.html\">here</a>."
-msgstr ""
-"Es ist möglich, <a href=\"//siliconangle.com/blog/2013/07/27/famed-hacker-"
-"barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\" title="
-"\"SiliconANGLE, Famed Hacker Barnaby Jack Dies Days Before Scheduled Black "
-"Hat Appearance, unter: siliconangle.com 2013.\">Menschen durch Ãbernahme der
"
-"Kontrolle medizinischer Implantate per Funk zu töten</a>. Weitere "
-"Informationen unter <a\n"
-"href=\"https://www.bbc.co.uk/news/technology-17631838\" xml:lang=\"en\" lang="
-"\"en\" >BBC News (2012), Medical device hack attacks may kill, researchers "
-"warn </a> und <a href=\"//blog.ioactive.com/2013/02/broken-hearts-how-"
-"plausible-was.html\" xml:lang=\"en\" lang=\"en\" >IOActive (2013), âBroken "
-"Heartsâ: How plausible was the Homeland pacemaker hack?</a><a
href=\"#tn03\" "
-"id=\"tn03-ref\" class=\"transnote\">[3]</a>"
+"<a href=\"//www.bunniestudios.com/blog/?p=3554\" title=\"On Hacking MicroSD "
+"Cards, unter: bunniestudios.com 2013.\">Einige Flash-Speicher enthalten "
+"modifizierbare Software</a>, die sie anfällig für Viren macht."
#. type: Content of: <ul><li><p>
+# | We don't call this a “back door” because it is normal that you
+# | can install a new system in a computer{+,+} given physical access to it.
+# | However, memory sticks and cards should not be modifiable in this way.
+#, fuzzy
+#| msgid ""
+#| "We don't call this a “back door” because it is normal that "
+#| "you can install a new system in a computer given physical access to it. "
+#| "However, memory sticks and cards should not be modifiable in this way."
msgid ""
-"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
-"\">hospital equipment has lousy security</a>, and it can be fatal."
+"We don't call this a “back door” because it is normal that you "
+"can install a new system in a computer, given physical access to it. "
+"However, memory sticks and cards should not be modifiable in this way."
msgstr ""
-"Eine Menge <a href=\"//www.wired.com/2014/04/hospital-equipment-vulnerable/"
-"\" title=\"Itâs Insanely Easy to Hack Hospital Equipment, unter: wired.com "
-"2014.\">Geräte in Krankenhäusern haben eine lausige Sicherheit</a>, und das
"
-"kann tödlich sein.<a href=\"#tn03\" class=\"transnote\">[3]</a>"
+"Wir nennen dies nicht <em>âHintertürâ</em>, weil es üblich ist, dass
man auf "
+"einem Rechner ein neues System in Anbetracht physikalischen Zugangs darauf "
+"installieren kann. Allerdings sollten Speichersticks und -karten nicht auf "
+"diese Weise modifizierbar sein."
#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/\">
+# | Point-of-sale terminals running Windows were taken [-over-] {+over</a>+}
+# | and turned into a botnet for the purpose of collecting customers' credit
+# | card [-numbers</a>.-] {+numbers.+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
+#| "of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
+#| "running Windows were taken over and turned into a botnet for the purpose "
+#| "of collecting customers' credit card numbers</a>."
msgid ""
"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
"age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
-"running Windows were taken over and turned into a botnet for the purpose of "
-"collecting customers' credit card numbers</a>."
+"running Windows were taken over</a> and turned into a botnet for the purpose "
+"of collecting customers' credit card numbers."
msgstr ""
"<ins>Geräte bzw. Terminals zum bargeldlosen Zahlen an elektronischen Kassen "
"(eigentlich <i>Verkaufsort</i>), sogenannte </ins><a\n"
@@ -1044,60 +1191,100 @@
"Windows ‑ Ã¼bernommen und zu einem Botnetz</a> gemacht, um "
"Kreditkartendaten von Kunden zu sammeln."
+# (German translation more exactly regarding devices.)
#. type: Content of: <ul><li><p>
-msgid ""
-"An app to prevent “identity theft” (access to personal data) by "
-"storing users' data on a special server <a href=\"http://arstechnica.com/"
-"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
-"concerns-that-app-isnt-safe/\">was deactivated by its developer</a> which "
-"had discovered a security flaw."
-msgstr ""
-"Eine Applikation, die âIdentitätsdiebstahlâ (Zugriff auf persönliche
Daten) "
-"durch Speichern von Nutzerdaten auf einem speziellen Server verhindern soll, "
-"<a href=\"//arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-"
-"deletes-user-data-over-concerns-that-app-isnt-safe/\" title=\"ID theft "
-"protector LifeLock deletes user data over concerns that app isnât safe, "
-"unter: arstechnica.com 2014.\">wurde vom Entwickler deaktiviert</a>, als "
-"dieser eine Sicherheitslücke entdeckte."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"That developer seems to be conscientious about protecting personal data from "
-"third parties in general, but it can't protect that data from the state. "
-"Quite the contrary: confiding your data to someone else's server, if not "
-"first encrypted by you with free software, undermines your rights."
+# | <a
+# |
[-href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">-]
+# |
{+href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">+}
+# | The NSA can tap data in smart phones, including iPhones, Android, and
+# | BlackBerry</a>. While there is not much detail here, it seems that this
+# | does not operate via the universal back door that we know nearly all
+# | portable phones have. It may involve exploiting various bugs. There are
+# | <a
+# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# | lots of bugs in the phones' radio software</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#| "smart phones, including iPhones, Android, and BlackBerry</a>. While "
+#| "there is not much detail here, it seems that this does not operate via "
+#| "the universal back door that we know nearly all portable phones have. It "
+#| "may involve exploiting various bugs. There are <a href=\"http://www."
+#| "osnews.com/story/27416/"
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs "
+#| "in the phones' radio software</a>."
+msgid ""
+"<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/"
+"international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971."
+"html\"> The NSA can tap data in smart phones, including iPhones, Android, "
+"and BlackBerry</a>. While there is not much detail here, it seems that this "
+"does not operate via the universal back door that we know nearly all "
+"portable phones have. It may involve exploiting various bugs. There are <a "
+"href=\"http://www.osnews.com/story/27416/"
+"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
+"the phones' radio software</a>."
msgstr ""
-"Dieser Entwickler scheint generell <ins>im Umgang mit</ins> "
-"personenbezogenen Daten von Dritten gewissenhaft zu sein, aber es kann nicht "
-"die Daten vor dem Staat schützen. Ganz im Gegenteil: dem Server von "
-"irgendjemand anderen <ins>die eigenen</ins> Daten anzuvertrauen, untergräbt,
"
-"sofern nicht zuvor <ins>selbst</ins> mit freier Software verschlüsselt, Ihre
"
-"Rechte."
+"<a href=\"//www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-"
+"on-smart-phone-data-a-920971.html\">Der US-Geheimdienst NSA kann sich Zugang "
+"zu iPhone- und BlackBerry-Geräten sowie zu Geräten mit Android-"
+"Betriebssystem verschaffen</a>. Es gibt zwar kaum Details, es scheint aber, "
+"dass dies nicht über die universelle Hintertür funktioniert, von der wir "
+"wissen, dass sie nahezu alle tragbaren Telefone haben. Dies kann "
+"verschiedene ausnutzbare Programmfehler einschlieÃen. Es gibt viele <a href="
+"\"//www.osnews.com/story/27416/"
+"The_second_operating_system_hiding_in_every_mobile_phone\">Programmfehler in "
+"der Mobilfunksoftware von Mobiltelefonen</a>."
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
-"have modifiable software</a>, which makes them vulnerable to viruses."
+"<a href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-"
+"codes-security\">The NSA has put back doors into nonfree encryption "
+"software</a>. We don't know which ones they are, but we can be sure they "
+"include some widely used systems. This reinforces the point that you can "
+"never trust the security of nonfree software."
msgstr ""
-"<a href=\"//www.bunniestudios.com/blog/?p=3554\" title=\"On Hacking MicroSD "
-"Cards, unter: bunniestudios.com 2013.\">Einige Flash-Speicher enthalten "
-"modifizierbare Software</a>, die sie anfällig für Viren macht."
#. type: Content of: <ul><li><p>
-msgid ""
-"We don't call this a “back door” because it is normal that you "
-"can install a new system in a computer given physical access to it. "
-"However, memory sticks and cards should not be modifiable in this way."
+# | [-<a
+# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">-]The
+# | FTC punished a company for making webcams with {+<a
+# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">+}
+# | bad security so that it was easy for anyone to watch {+through+} them</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-"
+#| "flaw-put-users-lives-on-display.html\"> The FTC punished a company for "
+#| "making webcams with bad security so that it was easy for anyone to watch "
+#| "them</a>."
+msgid ""
+"The FTC punished a company for making webcams with <a href=\"http://www."
+"nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-"
+"display.html\"> bad security so that it was easy for anyone to watch through "
+"them</a>."
msgstr ""
-"Wir nennen dies nicht <em>âHintertürâ</em>, weil es üblich ist, dass
man auf "
-"einem Rechner ein neues System in Anbetracht physikalischen Zugangs darauf "
-"installieren kann. Allerdings sollten Speichersticks und -karten nicht auf "
-"diese Weise modifizierbar sein."
+"Die US-Bundeshandelskommission <a href=\"//www.nytimes.com/2013/09/05/"
+"technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\" title="
+"\"Eeward Wyatt, F.T.C. Says Webcamâs Flaw Put Usersâ Lives on Display, "
+"unter: The New York Times, nytimes.com 2013.\">FTC straft Unternehmen wegen "
+"Herstellung von Webcams mit schlechten Sicherheitsstandards ab</a>, so dass "
+"es für jedermann leicht war zuzugucken.<a href=\"#tn02\" id=\"tn02-ref\" "
+"class=\"transnote\">[2]</a>"
#. type: Content of: <ul><li><p>
+# | <a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable
+# | nonfree software in disk drives can be written by a nonfree
+# | [-program.</a>-] {+program</a>.+} This makes any system vulnerable to
+# | persistent attacks that normal forensics won't detect.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
+#| "nonfree software in disk drives can be written by a nonfree program.</a> "
+#| "This makes any system vulnerable to persistent attacks that normal "
+#| "forensics won't detect."
msgid ""
"<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
-"nonfree software in disk drives can be written by a nonfree program.</a> "
+"nonfree software in disk drives can be written by a nonfree program</a>. "
"This makes any system vulnerable to persistent attacks that normal forensics "
"won't detect."
msgstr ""
@@ -1108,23 +1295,112 @@
"nicht erkennt. "
#. type: Content of: <ul><li><p>
+# | [-<a
+# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">-]It
+# | is possible to {+<a
+# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">+}
+# | kill people by taking control of medical implants by radio</a>. [-Here
+# | is-] {+More information in+} <a
+# | [-href=\"http://www.bbc.co.uk/news/technology-17631838\">more
+# | information</a>. And-]
+# | {+href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a>
+# | and+} <a
+# |
[-href=\"http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">here</a>.-]
+# |
{+href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">
+# | IOActive Labs Research blog</a>.+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-"
+#| "jack-dies-days-before-scheduled-black-hat-appearance/\"> It is possible "
+#| "to kill people by taking control of medical implants by radio</a>. Here "
+#| "is <a href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
+#| "information</a>. And <a href=\"http://blog.ioactive.com/2013/02/broken-"
+#| "hearts-how-plausible-was.html\">here</a>."
+msgid ""
+"It is possible to <a href=\"http://siliconangle.com/blog/2013/07/27/famed-"
+"hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\"> kill "
+"people by taking control of medical implants by radio</a>. More information "
+"in <a href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a> "
+"and <a href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-"
+"was.html\"> IOActive Labs Research blog</a>."
+msgstr ""
+"Es ist möglich, Menschen durch <a href=\"//siliconangle.com/blog/2013/07/27/"
+"famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\" "
+"title=\"SiliconANGLE, Famed Hacker Barnaby Jack Dies Days Before Scheduled "
+"Black Hat Appearance, unter: siliconangle.com 2013.\">Kontrolle "
+"medizinischer Implantate per Funk</a> zu töten. Weitere Informationen unter "
+"<a\n"
+"href=\"//www.bbc.co.uk/news/technology-17631838\" xml:lang=\"en\" lang=\"en"
+"\" title=\"BBC News, Medical device hack attacks may kill, researchers warn, "
+"unter: bbc.co.uk 2012.\">Medical device hack attacks may kill, researchers "
+"warn</a> und <a href=\"//blog.ioactive.com/2013/02/broken-hearts-how-"
+"plausible-was.html\" xml:lang=\"en\" lang=\"en\" title=\"IOActive, âBroken "
+"Heartsâ: How plausible was the Homeland pacemaker hack?, unter:
ioactive.com "
+"2013.\">“Broken Hearts”: How plausible was the Homeland "
+"pacemaker hack?</a><a href=\"#tn03\" id=\"tn03-ref\" class=\"transnote\">[3]"
+"</a>"
+
+#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
-"users.html\"> Many smartphone apps use insecure authentication methods when "
-"storing your personal data on remote servers.</a> This leaves personal "
-"information like email addresses, passwords, and health information "
-"vulnerable. Because many of these apps are proprietary it makes it hard to "
-"impossible to know which apps are at risk."
+"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
+"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
+"intrusion."
msgstr ""
-"<a href=\"//phys.org/news/2015-05-app-vulnerability-threatens-millions-users."
-"html\" title=\"App data vulnerability threatens millions of users, unter: "
-"phys.org 2015.\">Viele Smartphone-Applikationen verwenden unsichere "
-"Authentifizierungsmethoden bei der Speicherung IHRER persönlichen Daten auf "
-"(irgendwelchen) Internetservern</a>. Dies macht persönliche Daten wie
E-Mail-"
-"Adressen, Passwörter und Gesundheitsinformationen angreifbar. Da viele "
-"dieser Apps proprietär sind, macht es schwierig ‑ wenn nicht
"
-"gar unmöglich ‑ zu wissen, welche Apps eine Gefahr "
-"darstellen."
+"<a href=\"//www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/\" "
+"title=\"When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House "
+"Via The Internet, unter: forbes.com 2013.\"><em>âIntelligentes
Wohnenâ</em> "
+"[engl.]</a> entpuppt sich dummerweise anfällig für Angriffe."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
+"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
+"microphone-cameras.html\"> Crackers found a way to break security on a "
+"“smart” TV</a> and use its camera to watch the people who are "
+"watching TV."
+msgstr ""
+"<a href=\"//www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
+"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
+"microphone-cameras.html\" title=\"Is your TV watching you? Security alert "
+"over Samsung's Smart TV as hackers claim they can access its hard drive and "
+"seize control of built-in cameras, unter: dailymail.co.uk/sciencetech/"
+"article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-"
+"attacker-seize-control-microphone-cameras.html 2017.\">Cracker fanden einen "
+"Weg die Sicherheit eines âintelligentenâ TVs zu knacken</a>, und nutzen "
+"dessen Kamera um Zuschauer zu beobachten."
+
+#. type: Content of: <ul><li><p>
+# | [-<a
+# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">-]It
+# | is possible to take control of some car computers through {+<a
+# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">+}
+# | malware in music files</a>. Also <a
+# | href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">{+
+# | +}by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html\">more
+# | information</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+#| "hacking_music_can_take_control_your_car/\"> It is possible to take "
+#| "control of some car computers through malware in music files</a>. Also "
+#| "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+#| "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+#| "\">more information</a>."
+msgid ""
+"It is possible to take control of some car computers through <a href="
+"\"http://www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\"> malware in music files</a>. "
+"Also <a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+"_r=0\"> by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+"\">more information</a>."
+msgstr ""
+"Es ist möglich, die <a href=\"//www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\">Kontrolle über einige Fahrzeug-"
+"Bordrechner durch Schadsoftware in Musikdateien</a> zu übernehmen. Auch <a "
+"href=\"//www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">per Funk</"
+"a>. <a href=\"//www.autosec.org/faq.html\" title=\"FAQ, unter: The Center "
+"for Automotive Embedded Systems Security (CAESS), www.autosec.org/faq.html"
+"\">Weitere Informationen â¦</a>"
# âSmartphones sind die besten Wanzen, die jemals entwickelt wurden. Und dies
# ist ein bitterer Fakt, der Kriminellen ebenso in die Hände spielt, wie auch
@@ -1233,6 +1509,36 @@
msgstr "Letzte Ãnderung:"
#~ msgid ""
+#~ "They could track the car, start or stop the engine, and activate or "
+#~ "deactivate the brakes, and more."
+#~ msgstr ""
+#~ "Unter anderem konnte das Fahrzeug verfolgt, der Motor gestartet oder "
+#~ "gestoppt und die Bremsen aktiviert bzw. deaktiviert werden und vieles "
+#~ "mehr."
+
+#~ msgid ""
+#~ "<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-"
+#~ "jack-dies-days-before-scheduled-black-hat-appearance/\"> It is possible "
+#~ "to kill people by taking control of medical implants by radio</a>. Here "
+#~ "is <a href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
+#~ "information</a>. And <a href=\"https://web.archive.org/"
+#~ "web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-"
+#~ "plausible-was.html\">here</a>."
+#~ msgstr ""
+#~ "Es ist möglich, <a
href=\"//siliconangle.com/blog/2013/07/27/famed-hacker-"
+#~ "barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\" title="
+#~ "\"SiliconANGLE, Famed Hacker Barnaby Jack Dies Days Before Scheduled "
+#~ "Black Hat Appearance, unter: siliconangle.com 2013.\">Menschen durch "
+#~ "Ãbernahme der Kontrolle medizinischer Implantate per Funk zu töten</a>. "
+#~ "Weitere Informationen unter <a\n"
+#~ "href=\"https://www.bbc.co.uk/news/technology-17631838\" xml:lang=\"en\" "
+#~ "lang=\"en\" >BBC News (2012), Medical device hack attacks may kill, "
+#~ "researchers warn </a> und <a href=\"//blog.ioactive.com/2013/02/broken-"
+#~ "hearts-how-plausible-was.html\" xml:lang=\"en\" lang=\"en\" >IOActive "
+#~ "(2013), âBroken Heartsâ: How plausible was the Homeland pacemaker
hack?</"
+#~ "a><a href=\"#tn03\" id=\"tn03-ref\" class=\"transnote\">[3]</a>"
+
+#~ msgid ""
#~ "When Miele's Internet of Stings hospital disinfectant dishwasher is <a "
#~ "href=\"https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-"
#~ "is-connecting-hospitals-to-the-internet-of-shit\">connected to the "
@@ -1273,30 +1579,6 @@
#~ "\">haben eine Hintertür</a>."
#~ msgid ""
-#~ "<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-"
-#~ "jack-dies-days-before-scheduled-black-hat-appearance/\"> It is possible "
-#~ "to kill people by taking control of medical implants by radio</a>. Here "
-#~ "is <a href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
-#~ "information</a>. And <a href=\"http://blog.ioactive.com/2013/02/broken-"
-#~ "hearts-how-plausible-was.html\">here</a>."
-#~ msgstr ""
-#~ "Es ist möglich, Menschen durch <a href=\"//siliconangle.com/"
-#~ "blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-"
-#~ "black-hat-appearance/\" title=\"SiliconANGLE, Famed Hacker Barnaby Jack "
-#~ "Dies Days Before Scheduled Black Hat Appearance, unter: siliconangle.com "
-#~ "2013.\">Kontrolle medizinischer Implantate per Funk</a> zu töten. Weitere
"
-#~ "Informationen unter <a\n"
-#~ "href=\"//www.bbc.co.uk/news/technology-17631838\" xml:lang=\"en\" lang="
-#~ "\"en\" title=\"BBC News, Medical device hack attacks may kill, "
-#~ "researchers warn, unter: bbc.co.uk 2012.\">Medical device hack attacks "
-#~ "may kill, researchers warn</a> und <a href=\"//blog.ioactive.com/2013/02/"
-#~ "broken-hearts-how-plausible-was.html\" xml:lang=\"en\" lang=\"en\" title="
-#~ "\"IOActive, âBroken Heartsâ: How plausible was the Homeland pacemaker "
-#~ "hack?, unter: ioactive.com 2013.\">“Broken Hearts”: How "
-#~ "plausible was the Homeland pacemaker hack?</a><a href=\"#tn03\" id=\"tn03-"
-#~ "ref\" class=\"transnote\">[3]</a>"
-
-#~ msgid ""
#~ "This page is licensed under a <a rel=\"license\" href=\"http://"
#~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
#~ "NoDerivatives 4.0 International License</a>."
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary-insecurity.fr.po 25 Sep 2018 21:06:12 -0000 1.138
+++ proprietary-insecurity.fr.po 26 Sep 2018 14:28:11 -0000 1.139
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-09-18 17:25+0000\n"
+"POT-Creation-Date: 2018-09-26 14:26+0000\n"
"PO-Revision-Date: 2018-09-18 22:14+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-09-26 14:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -110,6 +111,49 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
+"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
+"voice commands in other audio</a>, so that people cannot hear them, but "
+"Alexa and Siri can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+"Siri, Alexa et tous les autres systèmes de commande vocale peuvent être "
+"piratés par des programmes qui <a href=\"https://www.fastcodesign."
+"com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-"
+"and-alexa\">envoient les commandes sous forme d'ultrasons inaudibles par les "
+"humains</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Samsung phones randomly <a href=\"https://www.theverge.com/"
"circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"
"\">send photos to people in the owner's contact list</a>."
@@ -139,6 +183,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Intel's intentional “management engine” back door has <a href="
+"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
+"unintended back doors</a> too."
+msgstr ""
+"La porte dérobée intentionnelle du « Moteur de gestion Intel » a aussi
des "
+"<a href=\"https://www.theregister.co.uk/2017/11/20/"
+"intel_flags_firmware_flaws/\">portes dérobées non intentionnelles</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -151,16 +205,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Intel's intentional “management engine” back door has <a href="
-"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
-"unintended back doors</a> too."
-msgstr ""
-"La porte dérobée intentionnelle du « Moteur de gestion Intel » a aussi
des "
-"<a href=\"https://www.theregister.co.uk/2017/11/20/"
-"intel_flags_firmware_flaws/\">portes dérobées non intentionnelles</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Bad security in some cars makes it possible to <a href=\"https://cve.mitre."
"org/cgi-bin/cvename.cgi?name=CVE-2017-14937\"> remotely activate the "
"airbags</a>."
@@ -207,42 +251,22 @@
msgstr "Ne vous laissez pas avoir, rejetez tous ces objets dangereux."
#. type: Content of: <ul><li><p>
+# | It is unfortunate that the article uses the term <a
+# | href=\"/philosophy/words-to-avoid.html#Monetize\">[-
+# | -]“monetize”</a>.
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\"> “monetize”</a>."
msgid ""
"It is unfortunate that the article uses the term <a href=\"/philosophy/words-"
-"to-avoid.html#Monetize\"> “monetize”</a>."
+"to-avoid.html#Monetize\">“monetize”</a>."
msgstr ""
"C'est dommage que l'article utilise le terme « <a href=\"/philosophy/words-"
"to-avoid.html#Monetize\">monétiser</a> »."
#. type: Content of: <ul><li><p>
msgid ""
-"Siri, Alexa, and all the other voice-control systems can be <a href="
-"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
-"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
-"commands in ultrasound that humans can't hear</a>."
-msgstr ""
-"Siri, Alexa et tous les autres systèmes de commande vocale peuvent être "
-"piratés par des programmes qui <a href=\"https://www.fastcodesign."
-"com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-"
-"and-alexa\">envoient les commandes sous forme d'ultrasons inaudibles par les "
-"humains</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
-"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
-"microphone-cameras.html\"> Crackers found a way to break security on a "
-"“smart” TV</a> and use its camera to watch the people who are "
-"watching TV."
-msgstr ""
-"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
-"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
-"microphone-cameras.html\">Des crackers ont trouvé moyen de briser la "
-"sécurité d'un téléviseur « intelligent »</a> et d'utiliser sa caméra
pour "
-"regarder les gens qui sont en train de regarder la télévision."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Many models of Internet-connected cameras <a href=\"/proprietary/proprietary-"
"back-doors.html#InternetCameraBackDoor\"> have backdoors</a>."
msgstr ""
@@ -265,54 +289,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
-"installed on 28 models of HP laptops logged the user's keystroke to a file "
-"in the filesystem. Any process with access to the filesystem or the "
-"MapViewOfFile API could gain access to the log. Furthermore, <a href="
-"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
-"\">according to modzero</a> the “information-leak via Covert Storage "
-"Channel enables malware authors to capture keystrokes without taking the "
-"risk of being classified as malicious task by AV heuristics”."
-msgstr ""
-"Un pilote audio de Conexant préinstallé sur 28 modèles de portables HP "
-"(<cite>HD Audio Driver Package</cite>, versions 1.0.0.46 et précédentes) "
-"journalisait les frappes de l'utilisateur dans un fichier local. Tout "
-"processus qui avait accès au système de fichiers ou à l'API MapViewOfFile "
-"pouvait y accéder. De plus, <a href=\"https://www.modzero.ch/advisories/"
-"MZ-17-01-Conexant-Keylogger.txt\">d'après modzero</a>, la « fuite de
données "
-"transitant par le canal caché de stockage <cite>[Covert Storage Channel]</"
-"cite> permet aux auteurs de maliciels de capturer les saisies clavier sans "
-"prendre le risque de voir l'analyseur heuristique de l'antivirus classer "
-"cette action comme malveillante »."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The proprietary code that runs pacemakers, insulin pumps, and other medical "
-"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
-"of gross security faults</a>."
-msgstr ""
-"Le code privateur qui fait fonctionner les pacemakers et les pompes à "
-"insuline, ainsi que d'autres dispositifs médicaux, est <a href=\"http://www."
-"bbc.co.uk/news/technology-40042584\">rempli de failles de sécurité "
-"monstrueuses</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
-"by the Shadowbrokers group, are now being used to <a href=\"https://"
-"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
-"computers-around-the-world/\">attack a great number of Windows computers "
-"with ransomware</a>."
-msgstr ""
-"Des exploits utilisant certains bogues de Windows, développés par la NSA "
-"puis divulgués par le groupe Shadowbrokers, servent maintenant à <a href="
-"\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-"
-"helping-hijack-computers-around-the-world/\">attaquer un grand nombre "
-"d'ordinateurs sous Windows avec un logiciel de rançon<cite>[ransomware]</"
-"cite></a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Intel's CPU backdoor—the Intel Management Engine—had a <a href="
"\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-"
"execution-bug-that-lurked-in-cpus-for-10-years/\">major security "
@@ -354,6 +330,54 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The proprietary code that runs pacemakers, insulin pumps, and other medical "
+"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
+"of gross security faults</a>."
+msgstr ""
+"Le code privateur qui fait fonctionner les pacemakers et les pompes à "
+"insuline, ainsi que d'autres dispositifs médicaux, est <a href=\"http://www."
+"bbc.co.uk/news/technology-40042584\">rempli de failles de sécurité "
+"monstrueuses</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
+"installed on 28 models of HP laptops logged the user's keystroke to a file "
+"in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a href="
+"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
+"\">according to modzero</a> the “information-leak via Covert Storage "
+"Channel enables malware authors to capture keystrokes without taking the "
+"risk of being classified as malicious task by AV heuristics”."
+msgstr ""
+"Un pilote audio de Conexant préinstallé sur 28 modèles de portables HP "
+"(<cite>HD Audio Driver Package</cite>, versions 1.0.0.46 et précédentes) "
+"journalisait les frappes de l'utilisateur dans un fichier local. Tout "
+"processus qui avait accès au système de fichiers ou à l'API MapViewOfFile "
+"pouvait y accéder. De plus, <a href=\"https://www.modzero.ch/advisories/"
+"MZ-17-01-Conexant-Keylogger.txt\">d'après modzero</a>, la « fuite de
données "
+"transitant par le canal caché de stockage <cite>[Covert Storage Channel]</"
+"cite> permet aux auteurs de maliciels de capturer les saisies clavier sans "
+"prendre le risque de voir l'analyseur heuristique de l'antivirus classer "
+"cette action comme malveillante »."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+"Des exploits utilisant certains bogues de Windows, développés par la NSA "
+"puis divulgués par le groupe Shadowbrokers, servent maintenant à <a href="
+"\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-"
+"helping-hijack-computers-around-the-world/\">attaquer un grand nombre "
+"d'ordinateurs sous Windows avec un logiciel de rançon<cite>[ransomware]</"
+"cite></a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-"
"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
@@ -391,6 +415,49 @@
#. type: Content of: <ul><li><p>
msgid ""
+"If you buy a used “smart” car, house, TV, refrigerator, etc., "
+"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
+"used.html\">the previous owners can still remotely control it</a>."
+msgstr ""
+"Si vous achetez du matériel « intelligent » d'occasion (voiture,
système "
+"domotique, téléviseur, frigo ou autre), <a href=\"http://boingboing."
+"net/2017/02/20/the-previous-owners-of-used.html\">le précédent
propriétaire "
+"peut continuer à le contrôler à distance</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The mobile apps for communicating <a href=\"https://www.bleepingcomputer.com/"
+"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
+"\">with a smart but foolish car have very bad security</a>."
+msgstr ""
+"Les applis mobiles servant à communiquer <a href=\"https://www."
+"bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-"
+"insecure-android-apps/\">avec une voiture intelligente, mais imprudente, "
+"sont très mal sécurisées</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This is in addition to the fact that the car contains a cellular modem that "
+"tells big brother all the time where it is. If you own such a car, it would "
+"be wise to disconnect the modem so as to turn off the tracking."
+msgstr ""
+"Et de plus, la voiture contient un modem cellulaire qui dit en permanence où
"
+"elle se trouve à Big Brother. Si vous possédez une voiture de cette sorte, "
+"vous seriez bien avisé de débrancher le modem afin de désactiver le
pistage."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
+"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
+"\">have a security hole that allows an SMS message to install ransomware</a>."
+msgstr ""
+"Des téléphones Samsung <a href=\"https://www.bleepingcomputer.com/news/"
+"security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-"
+"ransomware-attacks/\">possèdent une faille de sécurité qui permet "
+"d'installer un logiciel de rançon en passant par un SMS</a>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
"WhatsApp has a feature that <a href=\"https://techcrunch.com/2017/01/13/"
"encrypted-messaging-platform-whatsapp-denies-backdoor-claim/\"> has been "
"described as a “back door”</a> because it would enable "
@@ -436,78 +503,45 @@
"porte d'entrée pendant que Maman a le dos tourné."
#. type: Content of: <ul><li><p>
+# | 4G LTE phone networks are drastically insecure. They can be <a
+# |
[-href=\"https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">-]
+# |
{+href=\"https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">+}
+# | taken over by third parties and used for man-in-the-middle attacks</a>.
+#, fuzzy
+#| msgid ""
+#| "4G LTE phone networks are drastically insecure. They can be <a href="
+#| "\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
+#| "uk/2016/10/23/"
+#| "every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
+#| "over by third parties and used for man-in-the-middle attacks</a>."
msgid ""
-"The mobile apps for communicating <a href=\"https://www.bleepingcomputer.com/"
-"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
-"\">with a smart but foolish car have very bad security</a>."
+"4G LTE phone networks are drastically insecure. They can be <a href="
+"\"https://www.theregister.co.uk/2016/10/23/"
+"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
+"over by third parties and used for man-in-the-middle attacks</a>."
msgstr ""
-"Les applis mobiles servant à communiquer <a href=\"https://www."
-"bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-"
-"insecure-android-apps/\">avec une voiture intelligente, mais imprudente, "
-"sont très mal sécurisées</a>."
+"Les réseaux 4G LTE sont extrêmement mal sécurisés. <a href=\"https://web."
+"archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/"
+"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">Des tiers "
+"peuvent en prendre le contrôle et les utiliser pour des attaques de "
+"« l'homme du milieu »</a>"
#. type: Content of: <ul><li><p>
msgid ""
-"This is in addition to the fact that the car contains a cellular modem that "
-"tells big brother all the time where it is. If you own such a car, it would "
-"be wise to disconnect the modem so as to turn off the tracking."
+"Due to weak security, <a href=\"http://jalopnik.com/almost-every-volkswagen-"
+"built-since-1995-is-vulnerable-1785159844\">it is easy to open the doors of "
+"100 million cars built by Volkswagen</a>."
msgstr ""
-"Et de plus, la voiture contient un modem cellulaire qui dit en permanence où
"
-"elle se trouve à Big Brother. Si vous possédez une voiture de cette sorte, "
-"vous seriez bien avisé de débrancher le modem afin de désactiver le
pistage."
+"à cause d'un défaut de sécurité, <a
href=\"http://jalopnik.com/almost-every-"
+"volkswagen-built-since-1995-is-vulnerable-1785159844\">il est facile "
+"d'ouvrir les portes de 100 millions de voitures construites par Volkswagen</"
+"a>."
#. type: Content of: <ul><li><p>
msgid ""
-"If you buy a used “smart” car, house, TV, refrigerator, etc., "
-"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
-"used.html\">the previous owners can still remotely control it</a>."
-msgstr ""
-"Si vous achetez du matériel « intelligent » d'occasion (voiture,
système "
-"domotique, téléviseur, frigo ou autre), <a href=\"http://boingboing."
-"net/2017/02/20/the-previous-owners-of-used.html\">le précédent
propriétaire "
-"peut continuer à le contrôler à distance</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
-"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
-"\">have a security hole that allows an SMS message to install ransomware</a>."
-msgstr ""
-"Des téléphones Samsung <a href=\"https://www.bleepingcomputer.com/news/"
-"security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-"
-"ransomware-attacks/\">possèdent une faille de sécurité qui permet "
-"d'installer un logiciel de rançon en passant par un SMS</a>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"4G LTE phone networks are drastically insecure. They can be <a href="
-"\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
-"uk/2016/10/23/"
-"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
-"over by third parties and used for man-in-the-middle attacks</a>."
-msgstr ""
-"Les réseaux 4G LTE sont extrêmement mal sécurisés. <a href=\"https://web."
-"archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/"
-"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">Des tiers "
-"peuvent en prendre le contrôle et les utiliser pour des attaques de "
-"« l'homme du milieu »</a>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Due to weak security, <a href=\"http://jalopnik.com/almost-every-volkswagen-"
-"built-since-1995-is-vulnerable-1785159844\">it is easy to open the doors of "
-"100 million cars built by Volkswagen</a>."
-msgstr ""
-"à cause d'un défaut de sécurité, <a
href=\"http://jalopnik.com/almost-every-"
-"volkswagen-built-since-1995-is-vulnerable-1785159844\">il est facile "
-"d'ouvrir les portes de 100 millions de voitures construites par Volkswagen</"
-"a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Ransomware <a href=\"https://www.pentestpartners.com/security-blog/"
-"thermostat-ransomware-a-lesson-in-iot-security/\"> has been developed for a "
-"thermostat that uses proprietary software</a>."
+"Ransomware <a href=\"https://www.pentestpartners.com/security-blog/"
+"thermostat-ransomware-a-lesson-in-iot-security/\"> has been developed for a "
+"thermostat that uses proprietary software</a>."
msgstr ""
"Des « rançongiciels » <cite>[ransomware]</cite> <a href=\"https://www."
"pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-"
@@ -578,21 +612,19 @@
msgstr "GNU/Linux n'a pas besoin d'antivirus."
#. type: Content of: <ul><li><p>
-msgid ""
-"Over 70 brands of network-connected surveillance cameras <a href=\"http://"
-"www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
-"\">have security bugs that allow anyone to watch through them</a>."
-msgstr ""
-"Plus de 70 modèles de caméras de surveillance connectées au réseau <a
href="
-"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
-"html\">ont des failles de sécurité qui permettent à n'importe qui de s'en "
-"servir pour regarder</a>."
-
-#. type: Content of: <ul><li><p>
+# | Samsung's “Smart Home” has a big security hole; <a
+# |
href=\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/\">{+
+# | +}unauthorized people can remotely control it</a>.
+#, fuzzy
+#| msgid ""
+#| "Samsung's “Smart Home” has a big security hole; <a href="
+#| "\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-"
+#| "hackers-make-keys-to-front-door/\">unauthorized people can remotely "
+#| "control it</a>."
msgid ""
"Samsung's “Smart Home” has a big security hole; <a href=\"http://"
"arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-"
-"keys-to-front-door/\">unauthorized people can remotely control it</a>."
+"keys-to-front-door/\"> unauthorized people can remotely control it</a>."
msgstr ""
"le système « Smart Home » (maison intelligente) de Samsung a une grosse "
"faille de sécurité ; <a href=\"http://arstechnica.com/security/2016/05/"
@@ -618,48 +650,30 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Nissan Leaf has a built-in cell phone modem which allows effectively "
-"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
-"nissan/\">to access its computers remotely and make changes in various "
-"settings</a>."
-msgstr ""
-"La « Leaf » de Nissan a un modem de téléphonie mobile intégré qui
permet à "
-"n'importe qui <a href=\"https://www.troyhunt.com/controlling-vehicle-"
-"features-of-nissan/\">d'accéder à distance à ses ordinateurs et de changer
"
-"différents réglages</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"That's easy to do because the system has no authentication when accessed "
-"through the modem. However, even if it asked for authentication, you "
-"couldn't be confident that Nissan has no access. The software in the car is "
-"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
-"\">which means it demands blind faith from its users</a>."
-msgstr ""
-"C'est facile parce que le système n'a pas d'authentification quand on y "
-"accède par modem. Cependant, même s'il demandait une authentification, vous
"
-"ne pourriez jamais être sûr que Nissan n'y aurait pas accès. Le logiciel
de "
-"la voiture est privateur, <a href=\"/philosophy/free-software-even-more-"
-"important.html\">ce qui signifie qu'il exige de ses utilisateurs une "
-"confiance aveugle</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Even if no one connects to the car remotely, the cell phone modem enables "
-"the phone company to track the car's movements all the time; it is possible "
-"to physically remove the cell phone modem though."
+"A bug in the iThings Messages app <a href=\"https://theintercept."
+"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
+"a malicious web site to extract all the user's messaging history</a>."
msgstr ""
-"Même si personne ne se connecte à distance à la voiture, le modem de "
-"téléphonie mobile permet à l'opérateur de tracer en permanence les "
-"déplacements de la voiture ; il est toutefois possible de l'enlever "
-"physiquement."
+"Un bogue dans l'appli « Messages » des iTrucs <a
href=\"https://theintercept."
+"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"
+"\">permettait à un site malveillant d'extraire tout l'historique de "
+"messagerie de l'utilisateur</a>."
#. type: Content of: <ul><li><p>
+# | Malware {+was+} found on <a
+# |
href=\"http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html\">{+
+# | +}security cameras available through Amazon</a>.
+#, fuzzy
+#| msgid ""
+#| "Malware found on <a href=\"http://www.slate.com/blogs/"
+#| "future_tense/2016/04/11/"
+#| "security_cameras_sold_through_amazon_have_malware_according_to_security."
+#| "html\">security cameras available through Amazon</a>."
msgid ""
-"Malware found on <a href=\"http://www.slate.com/blogs/"
+"Malware was found on <a href=\"http://www.slate.com/blogs/"
"future_tense/2016/04/11/"
"security_cameras_sold_through_amazon_have_malware_according_to_security.html"
-"\">security cameras available through Amazon</a>."
+"\"> security cameras available through Amazon</a>."
msgstr ""
"Un logiciel malveillant a été trouvé dans <a href=\"http://www.slate.com/"
"blogs/future_tense/2016/04/11/"
@@ -678,21 +692,43 @@
"l'intermédiaire d'un logiciel malveillant infectant la caméra."
#. type: Content of: <ul><li><p>
+# | Over 70 brands of network-connected surveillance cameras {+have+} <a
+# |
[-href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">have-]
+# |
{+href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">+}
+# | security bugs that allow anyone to watch through them</a>.
+#, fuzzy
+#| msgid ""
+#| "Over 70 brands of network-connected surveillance cameras <a href=\"http://"
+#| "www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
+#| "\">have security bugs that allow anyone to watch through them</a>."
msgid ""
-"A bug in the iThings Messages app <a href=\"https://theintercept."
-"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
-"a malicious web site to extract all the user's messaging history</a>."
+"Over 70 brands of network-connected surveillance cameras have <a href="
+"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
+"html\"> security bugs that allow anyone to watch through them</a>."
msgstr ""
-"Un bogue dans l'appli « Messages » des iTrucs <a
href=\"https://theintercept."
-"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"
-"\">permettait à un site malveillant d'extraire tout l'historique de "
-"messagerie de l'utilisateur</a>."
+"Plus de 70 modèles de caméras de surveillance connectées au réseau <a
href="
+"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
+"html\">ont des failles de sécurité qui permettent à n'importe qui de s'en "
+"servir pour regarder</a>."
#. type: Content of: <ul><li><p>
+# | Many proprietary payment apps <a
+# |
href=\"http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data\">[-
+# | -]transmit personal data in an insecure way</a>. However, the worse aspect
+# | of these apps is that <a
+# | href=\"/philosophy/surveillance-vs-democracy.html\">payment is not
+# | anonymous</a>.
+#, fuzzy
+#| msgid ""
+#| "Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
+#| "articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
+#| "securing-user-data\"> transmit personal data in an insecure way</a>. "
+#| "However, the worse aspect of these apps is that <a href=\"/philosophy/"
+#| "surveillance-vs-democracy.html\">payment is not anonymous</a>."
msgid ""
"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
-"user-data\"> transmit personal data in an insecure way</a>. However, the "
+"user-data\">transmit personal data in an insecure way</a>. However, the "
"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
"democracy.html\">payment is not anonymous</a>."
msgstr ""
@@ -704,9 +740,69 @@
#. type: Content of: <ul><li><p>
msgid ""
-"FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-security/"
-"latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-"
-"trackers/\"> have a Bluetooth vulnerability</a> that allows attackers to "
+"The Nissan Leaf has a built-in cell phone modem which allows effectively "
+"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
+"nissan/\">to access its computers remotely and make changes in various "
+"settings</a>."
+msgstr ""
+"La « Leaf » de Nissan a un modem de téléphonie mobile intégré qui
permet à "
+"n'importe qui <a href=\"https://www.troyhunt.com/controlling-vehicle-"
+"features-of-nissan/\">d'accéder à distance à ses ordinateurs et de changer
"
+"différents réglages</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"That's easy to do because the system has no authentication when accessed "
+"through the modem. However, even if it asked for authentication, you "
+"couldn't be confident that Nissan has no access. The software in the car is "
+"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
+"\">which means it demands blind faith from its users</a>."
+msgstr ""
+"C'est facile parce que le système n'a pas d'authentification quand on y "
+"accède par modem. Cependant, même s'il demandait une authentification, vous
"
+"ne pourriez jamais être sûr que Nissan n'y aurait pas accès. Le logiciel
de "
+"la voiture est privateur, <a href=\"/philosophy/free-software-even-more-"
+"important.html\">ce qui signifie qu'il exige de ses utilisateurs une "
+"confiance aveugle</a>."
+
+#. type: Content of: <ul><li><p>
+# | Even if no one connects to the car remotely, the cell phone modem enables
+# | the phone company to track the car's movements all the time; it is
+# | possible to physically remove the cell phone modem{+,+} though.
+#, fuzzy
+#| msgid ""
+#| "Even if no one connects to the car remotely, the cell phone modem enables "
+#| "the phone company to track the car's movements all the time; it is "
+#| "possible to physically remove the cell phone modem though."
+msgid ""
+"Even if no one connects to the car remotely, the cell phone modem enables "
+"the phone company to track the car's movements all the time; it is possible "
+"to physically remove the cell phone modem, though."
+msgstr ""
+"Même si personne ne se connecte à distance à la voiture, le modem de "
+"téléphonie mobile permet à l'opérateur de tracer en permanence les "
+"déplacements de la voiture ; il est toutefois possible de l'enlever "
+"physiquement."
+
+#. type: Content of: <ul><li><p>
+# | FitBit fitness trackers [-<a
+# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">-]
+# | have a {+<a
+# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">+}
+# | Bluetooth vulnerability</a> that allows attackers to send malware to the
+# | devices, which can subsequently spread to computers and other FitBit
+# | trackers that interact with them.
+#, fuzzy
+#| msgid ""
+#| "FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-"
+#| "security/latest-security-news/10-second-hack-delivers-first-ever-malware-"
+#| "to-fitness-trackers/\"> have a Bluetooth vulnerability</a> that allows "
+#| "attackers to send malware to the devices, which can subsequently spread "
+#| "to computers and other FitBit trackers that interact with them."
+msgid ""
+"FitBit fitness trackers have a <a href=\"http://www.tripwire.com/state-of-"
+"security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-"
+"fitness-trackers/\"> Bluetooth vulnerability</a> that allows attackers to "
"send malware to the devices, which can subsequently spread to computers and "
"other FitBit trackers that interact with them."
msgstr ""
@@ -718,12 +814,24 @@
"moniteurs Fitbit avec lesquels ils interagissent."
#. type: Content of: <ul><li><p>
+# | “Self-encrypting” disk drives do the encryption with
+# | proprietary firmware so you can't trust it. Western Digital's “My
+# | Passport” drives <a
+# |
href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">{+
+# | +}have a back door</a>.
+#, fuzzy
+#| msgid ""
+#| "“Self-encrypting” disk drives do the encryption with "
+#| "proprietary firmware so you can't trust it. Western Digital's “My "
+#| "Passport” drives <a href=\"https://motherboard.vice.com/en_us/"
+#| "article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-"
+#| "encryption\">have a back door</a>."
msgid ""
"“Self-encrypting” disk drives do the encryption with proprietary "
"firmware so you can't trust it. Western Digital's “My Passport” "
"drives <a href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-"
-"popular-self-encrypting-hard-drives-have-really-bad-encryption\">have a back "
-"door</a>."
+"popular-self-encrypting-hard-drives-have-really-bad-encryption\"> have a "
+"back door</a>."
msgstr ""
"Les disques durs « à chiffrement automatique » utilisent pour ce faire
un "
"micrologiciel <cite>[firmware]</cite> privateur, auquel par conséquent on ne
"
@@ -734,18 +842,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
-"door for 4 years</a>, which could be exploited by attackers to gain root "
-"privileges."
-msgstr ""
-"Pendant quatre ans, MacOS X a eu <a href=\"https://truesecdev.wordpress."
-"com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/\">une "
-"porte dérobée intentionnelle</a> qui pouvait être exploitée par des "
-"attaquants pour obtenir les privilèges du superutilisateur
<cite>root</cite>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
@@ -758,24 +854,28 @@
"d'une voiture ou d'un camion au moyen d'un SMS."
#. type: Content of: <ul><li><p>
+# | Crackers were able to <a
+# |
href=\"http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">{+
+# | +}take remote control of the Jeep</a> “connected car”. {+They
+# | could track the car, start or stop the engine, and activate or deactivate
+# | the brakes, and more.+}
+#, fuzzy
+#| msgid ""
+#| "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
+#| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"
+#| "\">take remote control of the Jeep</a> “connected car”."
msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
-"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take "
-"remote control of the Jeep</a> “connected car”."
+"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> take "
+"remote control of the Jeep</a> “connected car”. They could track "
+"the car, start or stop the engine, and activate or deactivate the brakes, "
+"and more."
msgstr ""
"Des crackers ont été en mesure de <a href=\"http://arstechnica.com/"
"security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-"
"remotely/\">prendre le contrôle à distance</a> de la « Jeep connectéeÂ
»."
#. type: Content of: <ul><li><p>
-msgid ""
-"They could track the car, start or stop the engine, and activate or "
-"deactivate the brakes, and more."
-msgstr ""
-"Ils ont pu suivre les déplacements de la voiture, démarrer et arrêter le "
-"moteur, activer et désactiver les freins, et plus encore."
-
-#. type: Content of: <ul><li><p>
msgid "I expect that Chrysler and the NSA can do this too."
msgstr "J'imagine que Chrysler et la NSA peuvent faire de même."
@@ -788,145 +888,97 @@
"je le désactiverai."
#. type: Content of: <ul><li><p>
-msgid ""
-"Hospira infusion pumps, which are used to administer drugs to a patient, "
-"were rated “<a href=\"https://securityledger.com/2015/05/researcher-"
-"drug-pump-the-least-secure-ip-device-ive-ever-seen/\">least secure IP device "
-"I've ever seen</a>” by a security researcher."
-msgstr ""
-"Les pompes à perfusion Hospira, qui sont utilisées pour administrer des "
-"médicaments à des patients, sont considérées comme « <a href=\"https://"
-"securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-"
-"ive-ever-seen/\">les périphériques IP les moins sécurisés que j'ai jamais
"
-"vus</a> » par un chercheur en sécurité informatique."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Depending on what drug is being infused, the insecurity could open the door "
-"to murder."
-msgstr ""
-"Selon le médicament qui est perfusé, l'insécurité pourrait ouvrir la
porte "
-"au meurtre."
-
-#. type: Content of: <ul><li><p>
+# | Due to bad security in a drug pump, crackers could use it to <a
+# |
href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/\">{+
+# | +}kill patients</a>.
+#, fuzzy
+#| msgid ""
+#| "Due to bad security in a drug pump, crackers could use it to <a href="
+#| "\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
+#| "pumps/\">kill patients</a>."
msgid ""
"Due to bad security in a drug pump, crackers could use it to <a href="
"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
-"pumps/\">kill patients</a>."
+"pumps/\"> kill patients</a>."
msgstr ""
"En raison du défaut de sécurité de certaines pompes à perfusion, des "
"crackers pourraient les utiliser pour <a href=\"http://www.wired.com/2015/06/"
"hackers-can-send-fatal-doses-hospital-drug-pumps/\">tuer des patients</a>."
#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html\">
+# | Many smartphone apps use insecure authentication methods when storing your
+# | personal data on remote [-servers.</a>-] {+servers</a>.+} This leaves
+# | personal information like email addresses, passwords, and health
+# | information vulnerable. Because many of these apps are proprietary it
+# | makes it hard to impossible to know which apps are at risk.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-"
+#| "millions-users.html\"> Many smartphone apps use insecure authentication "
+#| "methods when storing your personal data on remote servers.</a> This "
+#| "leaves personal information like email addresses, passwords, and health "
+#| "information vulnerable. Because many of these apps are proprietary it "
+#| "makes it hard to impossible to know which apps are at risk."
msgid ""
-"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
-"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
-"phones, including iPhones, Android, and BlackBerry</a>. While there is not "
-"much detail here, it seems that this does not operate via the universal back "
-"door that we know nearly all portable phones have. It may involve "
-"exploiting various bugs. There are <a href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> lots "
-"of bugs in the phones' radio software</a>."
-msgstr ""
-"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
-"spy-on-smart-phone-data-a-920971.html\">La NSA peut aller chercher des "
-"données dans les smartphones, que ce soit les iPhones, les Android ou les "
-"Blackberry</a>. Bien que l'article soit peu détaillé, il semble que cette "
-"opération n'utilise pas la porte dérobée universelle qui, on le sait, se "
-"trouve dans presque tous les téléphones portables. Il est possible qu'elle "
-"exploite différentes bogues. Il y a de plus <a href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">une "
-"multitude de bogues dans le logiciel de radio des téléphones</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
-"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
-"intrusion."
-msgstr ""
-"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
-"hack/\">Dans les « maisons intelligentes »</a>, on découvre des "
-"vulnérabilités stupides permettant les intrusions."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The <a href=\"http://arstechnica.com/security/2014/02/crypto-weaknesses-in-"
-"whatsapp-the-kind-of-stuff-the-nsa-would-love/\">insecurity of WhatsApp</a> "
-"makes eavesdropping a snap."
-msgstr ""
-"Grâce à la <a href=\"http://arstechnica.com/security/2014/02/crypto-"
-"weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/\">mauvaise "
-"sécurisation de WhatsApp</a>, les écoutes deviennent un jeu d'enfant."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\"> The FTC punished a company for making "
-"webcams with bad security so that it was easy for anyone to watch them</a>."
-msgstr ""
-"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\">La <abbr title=\"Federal Trade Commission"
-"\">FTC</abbr> a sanctionné une entreprise pour avoir fabriqué des webcams "
-"comportant des failles de sécurité telles qu'il était facile pour
n'importe "
-"qui de regarder ce qui était filmé</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\"> It is possible to take control "
-"of some car computers through malware in music files</a>. Also <a href="
-"\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">by radio</"
-"a>. Here is <a href=\"http://www.autosec.org/faq.html\">more information</"
-"a>."
+"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
+"users.html\"> Many smartphone apps use insecure authentication methods when "
+"storing your personal data on remote servers</a>. This leaves personal "
+"information like email addresses, passwords, and health information "
+"vulnerable. Because many of these apps are proprietary it makes it hard to "
+"impossible to know which apps are at risk."
msgstr ""
-"Il est possible de <a href=\"http://www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\">prendre le contrôle de "
-"l'ordinateur de bord de certaines voitures, au moyen de logiciels "
-"malveillants infectant des fichiers musicaux</a>. Et également <a href="
-"\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">au moyen de "
-"la radio</a>. Voici <a href=\"http://www.autosec.org/faq.html\">des "
-"informations supplémentaires</a>."
+"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
+"users.html\">De nombreuses applis pour smartphones utilisent des méthodes "
+"d'authentification non sécurisées quand vous stockez vos données "
+"personnelles dans des serveurs distants</a>. De ce fait, vos informations "
+"personnelles (adresses de courriel, mots de passe ou données de santé, par "
+"exemple) restent vulnérables. Beaucoup de ces applis étant privatrices, il "
+"est difficile, voire impossible, de savoir lesquelles présentent un risque."
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
-"dies-days-before-scheduled-black-hat-appearance/\"> It is possible to kill "
-"people by taking control of medical implants by radio</a>. Here is <a href="
-"\"http://www.bbc.co.uk/news/technology-17631838\">more information</a>. And "
-"<a href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive."
-"com/2013/02/broken-hearts-how-plausible-was.html\">here</a>."
+"Hospira infusion pumps, which are used to administer drugs to a patient, "
+"were rated “<a href=\"https://securityledger.com/2015/05/researcher-"
+"drug-pump-the-least-secure-ip-device-ive-ever-seen/\">least secure IP device "
+"I've ever seen</a>” by a security researcher."
msgstr ""
-"Il est possible de <a href=\"http://siliconangle.com/blog/2013/07/27/famed-"
-"hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">tuer "
-"des gens en prenant le contrôle d'implants médicaux par radio</a>. Voici <a
"
-"href=\"http://www.bbc.co.uk/news/technology-17631838\">des informations "
-"supplémentaires</a>. Et <a href=\"https://web.archive.org/"
-"web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-"
-"plausible-was.html\">là aussi</a>."
+"Les pompes à perfusion Hospira, qui sont utilisées pour administrer des "
+"médicaments à des patients, sont considérées comme « <a href=\"https://"
+"securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-"
+"ive-ever-seen/\">les périphériques IP les moins sécurisés que j'ai jamais
"
+"vus</a> » par un chercheur en sécurité informatique."
#. type: Content of: <ul><li><p>
msgid ""
-"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
-"\">hospital equipment has lousy security</a>, and it can be fatal."
+"Depending on what drug is being infused, the insecurity could open the door "
+"to murder."
msgstr ""
-"Bon nombre <a href=\"http://www.wired.com/2014/04/hospital-equipment-"
-"vulnerable/\">d'appareils médicaux ont une sécurisation en dessous de
tout</"
-"a>, et ce peut être mortel."
+"Selon le médicament qui est perfusé, l'insécurité pourrait ouvrir la
porte "
+"au meurtre."
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
-"age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
-"running Windows were taken over and turned into a botnet for the purpose of "
-"collecting customers' credit card numbers</a>."
+"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
+"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
+"door for 4 years</a>, which could be exploited by attackers to gain root "
+"privileges."
msgstr ""
-"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
-"age-with-first-known-point-of-sale-botnet/\">Des terminaux de paiement "
-"tournant sous Windows ont été piratés et transformés en botnet afin de "
-"récupérer les numéros de cartes de crédit des clients</a>."
+"Pendant quatre ans, MacOS X a eu <a href=\"https://truesecdev.wordpress."
+"com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/\">une "
+"porte dérobée intentionnelle</a> qui pouvait être exploitée par des "
+"attaquants pour obtenir les privilèges du superutilisateur
<cite>root</cite>."
#. type: Content of: <ul><li><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "An app to prevent “identity theft” (access to personal data) "
+#| "by storing users' data on a special server <a href=\"http://arstechnica."
+#| "com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-"
+#| "over-concerns-that-app-isnt-safe/\">was deactivated by its developer</a> "
+#| "which had discovered a security flaw."
msgid ""
"An app to prevent “identity theft” (access to personal data) by "
"storing users' data on a special server <a href=\"http://arstechnica.com/"
@@ -954,6 +1006,33 @@
"fragiliser vos droits."
#. type: Content of: <ul><li><p>
+# | Lots of <a
+# | href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/\">{+
+# | +}hospital equipment has lousy security</a>, and it can be fatal.
+#, fuzzy
+#| msgid ""
+#| "Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-"
+#| "vulnerable/\">hospital equipment has lousy security</a>, and it can be "
+#| "fatal."
+msgid ""
+"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
+"\"> hospital equipment has lousy security</a>, and it can be fatal."
+msgstr ""
+"Bon nombre <a href=\"http://www.wired.com/2014/04/hospital-equipment-"
+"vulnerable/\">d'appareils médicaux ont une sécurisation en dessous de
tout</"
+"a>, et ce peut être mortel."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The <a href=\"http://arstechnica.com/security/2014/02/crypto-weaknesses-in-"
+"whatsapp-the-kind-of-stuff-the-nsa-would-love/\">insecurity of WhatsApp</a> "
+"makes eavesdropping a snap."
+msgstr ""
+"Grâce à la <a href=\"http://arstechnica.com/security/2014/02/crypto-"
+"weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/\">mauvaise "
+"sécurisation de WhatsApp</a>, les écoutes deviennent un jeu d'enfant."
+
+#. type: Content of: <ul><li><p>
msgid ""
"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
"have modifiable software</a>, which makes them vulnerable to viruses."
@@ -963,9 +1042,17 @@
"virus."
#. type: Content of: <ul><li><p>
+# | We don't call this a “back door” because it is normal that you
+# | can install a new system in a computer{+,+} given physical access to it.
+# | However, memory sticks and cards should not be modifiable in this way.
+#, fuzzy
+#| msgid ""
+#| "We don't call this a “back door” because it is normal that "
+#| "you can install a new system in a computer given physical access to it. "
+#| "However, memory sticks and cards should not be modifiable in this way."
msgid ""
"We don't call this a “back door” because it is normal that you "
-"can install a new system in a computer given physical access to it. "
+"can install a new system in a computer, given physical access to it. "
"However, memory sticks and cards should not be modifiable in this way."
msgstr ""
"Nous n'appelons pas cela une « porte dérobée » parce que c'est normal
de "
@@ -974,9 +1061,118 @@
"mémoire soient modifiables de cette façon-là ."
#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/\">
+# | Point-of-sale terminals running Windows were taken [-over-] {+over</a>+}
+# | and turned into a botnet for the purpose of collecting customers' credit
+# | card [-numbers</a>.-] {+numbers.+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
+#| "of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
+#| "running Windows were taken over and turned into a botnet for the purpose "
+#| "of collecting customers' credit card numbers</a>."
+msgid ""
+"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
+"age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
+"running Windows were taken over</a> and turned into a botnet for the purpose "
+"of collecting customers' credit card numbers."
+msgstr ""
+"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
+"age-with-first-known-point-of-sale-botnet/\">Des terminaux de paiement "
+"tournant sous Windows ont été piratés et transformés en botnet afin de "
+"récupérer les numéros de cartes de crédit des clients</a>."
+
+#. type: Content of: <ul><li><p>
+# | <a
+# |
[-href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">-]
+# |
{+href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">+}
+# | The NSA can tap data in smart phones, including iPhones, Android, and
+# | BlackBerry</a>. While there is not much detail here, it seems that this
+# | does not operate via the universal back door that we know nearly all
+# | portable phones have. It may involve exploiting various bugs. There are
+# | <a
+# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# | lots of bugs in the phones' radio software</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#| "smart phones, including iPhones, Android, and BlackBerry</a>. While "
+#| "there is not much detail here, it seems that this does not operate via "
+#| "the universal back door that we know nearly all portable phones have. It "
+#| "may involve exploiting various bugs. There are <a href=\"http://www."
+#| "osnews.com/story/27416/"
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs "
+#| "in the phones' radio software</a>."
+msgid ""
+"<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/"
+"international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971."
+"html\"> The NSA can tap data in smart phones, including iPhones, Android, "
+"and BlackBerry</a>. While there is not much detail here, it seems that this "
+"does not operate via the universal back door that we know nearly all "
+"portable phones have. It may involve exploiting various bugs. There are <a "
+"href=\"http://www.osnews.com/story/27416/"
+"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
+"the phones' radio software</a>."
+msgstr ""
+"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
+"spy-on-smart-phone-data-a-920971.html\">La NSA peut aller chercher des "
+"données dans les smartphones, que ce soit les iPhones, les Android ou les "
+"Blackberry</a>. Bien que l'article soit peu détaillé, il semble que cette "
+"opération n'utilise pas la porte dérobée universelle qui, on le sait, se "
+"trouve dans presque tous les téléphones portables. Il est possible qu'elle "
+"exploite différentes bogues. Il y a de plus <a href=\"http://www.osnews.com/"
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">une "
+"multitude de bogues dans le logiciel de radio des téléphones</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"<a href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-"
+"codes-security\">The NSA has put back doors into nonfree encryption "
+"software</a>. We don't know which ones they are, but we can be sure they "
+"include some widely used systems. This reinforces the point that you can "
+"never trust the security of nonfree software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-<a
+# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">-]The
+# | FTC punished a company for making webcams with {+<a
+# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">+}
+# | bad security so that it was easy for anyone to watch {+through+} them</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-"
+#| "flaw-put-users-lives-on-display.html\"> The FTC punished a company for "
+#| "making webcams with bad security so that it was easy for anyone to watch "
+#| "them</a>."
+msgid ""
+"The FTC punished a company for making webcams with <a href=\"http://www."
+"nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-"
+"display.html\"> bad security so that it was easy for anyone to watch through "
+"them</a>."
+msgstr ""
+"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
+"put-users-lives-on-display.html\">La <abbr title=\"Federal Trade Commission"
+"\">FTC</abbr> a sanctionné une entreprise pour avoir fabriqué des webcams "
+"comportant des failles de sécurité telles qu'il était facile pour
n'importe "
+"qui de regarder ce qui était filmé</a>."
+
+#. type: Content of: <ul><li><p>
+# | <a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable
+# | nonfree software in disk drives can be written by a nonfree
+# | [-program.</a>-] {+program</a>.+} This makes any system vulnerable to
+# | persistent attacks that normal forensics won't detect.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
+#| "nonfree software in disk drives can be written by a nonfree program.</a> "
+#| "This makes any system vulnerable to persistent attacks that normal "
+#| "forensics won't detect."
msgid ""
"<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
-"nonfree software in disk drives can be written by a nonfree program.</a> "
+"nonfree software in disk drives can be written by a nonfree program</a>. "
"This makes any system vulnerable to persistent attacks that normal forensics "
"won't detect."
msgstr ""
@@ -986,21 +1182,100 @@
"persistantes que les outils d'analyse normaux ne détecteront pas."
#. type: Content of: <ul><li><p>
+# | [-<a
+# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">-]It
+# | is possible to {+<a
+# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">+}
+# | kill people by taking control of medical implants by radio</a>. [-Here
+# | is-] {+More information in+} <a
+# | [-href=\"http://www.bbc.co.uk/news/technology-17631838\">more
+# | information</a>. And-]
+# | {+href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a>
+# | and+} <a
+# |
[-href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">here</a>.-]
+# |
{+href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">
+# | IOActive Labs Research blog</a>.+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-"
+#| "jack-dies-days-before-scheduled-black-hat-appearance/\"> It is possible "
+#| "to kill people by taking control of medical implants by radio</a>. Here "
+#| "is <a href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
+#| "information</a>. And <a href=\"https://web.archive.org/"
+#| "web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-"
+#| "plausible-was.html\">here</a>."
+msgid ""
+"It is possible to <a href=\"http://siliconangle.com/blog/2013/07/27/famed-"
+"hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\"> kill "
+"people by taking control of medical implants by radio</a>. More information "
+"in <a href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a> "
+"and <a href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-"
+"was.html\"> IOActive Labs Research blog</a>."
+msgstr ""
+"Il est possible de <a href=\"http://siliconangle.com/blog/2013/07/27/famed-"
+"hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">tuer "
+"des gens en prenant le contrôle d'implants médicaux par radio</a>. Voici <a
"
+"href=\"http://www.bbc.co.uk/news/technology-17631838\">des informations "
+"supplémentaires</a>. Et <a href=\"https://web.archive.org/"
+"web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-"
+"plausible-was.html\">là aussi</a>."
+
+#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
-"users.html\"> Many smartphone apps use insecure authentication methods when "
-"storing your personal data on remote servers.</a> This leaves personal "
-"information like email addresses, passwords, and health information "
-"vulnerable. Because many of these apps are proprietary it makes it hard to "
-"impossible to know which apps are at risk."
+"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
+"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
+"intrusion."
msgstr ""
-"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
-"users.html\">De nombreuses applis pour smartphones utilisent des méthodes "
-"d'authentification non sécurisées quand vous stockez vos données "
-"personnelles dans des serveurs distants</a>. De ce fait, vos informations "
-"personnelles (adresses de courriel, mots de passe ou données de santé, par "
-"exemple) restent vulnérables. Beaucoup de ces applis étant privatrices, il "
-"est difficile, voire impossible, de savoir lesquelles présentent un risque."
+"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
+"hack/\">Dans les « maisons intelligentes »</a>, on découvre des "
+"vulnérabilités stupides permettant les intrusions."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
+"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
+"microphone-cameras.html\"> Crackers found a way to break security on a "
+"“smart” TV</a> and use its camera to watch the people who are "
+"watching TV."
+msgstr ""
+"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
+"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
+"microphone-cameras.html\">Des crackers ont trouvé moyen de briser la "
+"sécurité d'un téléviseur « intelligent »</a> et d'utiliser sa caméra
pour "
+"regarder les gens qui sont en train de regarder la télévision."
+
+#. type: Content of: <ul><li><p>
+# | [-<a
+# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">-]It
+# | is possible to take control of some car computers through {+<a
+# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">+}
+# | malware in music files</a>. Also <a
+# | href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">{+
+# | +}by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html\">more
+# | information</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+#| "hacking_music_can_take_control_your_car/\"> It is possible to take "
+#| "control of some car computers through malware in music files</a>. Also "
+#| "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+#| "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+#| "\">more information</a>."
+msgid ""
+"It is possible to take control of some car computers through <a href="
+"\"http://www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\"> malware in music files</a>. "
+"Also <a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+"_r=0\"> by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+"\">more information</a>."
+msgstr ""
+"Il est possible de <a href=\"http://www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\">prendre le contrôle de "
+"l'ordinateur de bord de certaines voitures, au moyen de logiciels "
+"malveillants infectant des fichiers musicaux</a>. Et également <a href="
+"\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">au moyen de "
+"la radio</a>. Voici <a href=\"http://www.autosec.org/faq.html\">des "
+"informations supplémentaires</a>."
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -1073,3 +1348,10 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "They could track the car, start or stop the engine, and activate or "
+#~ "deactivate the brakes, and more."
+#~ msgstr ""
+#~ "Ils ont pu suivre les déplacements de la voiture, démarrer et arrêter
le "
+#~ "moteur, activer et désactiver les freins, et plus encore."
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-insecurity.it-diff.html 18 Sep 2018 17:27:39 -0000 1.11
+++ proprietary-insecurity.it-diff.html 26 Sep 2018 14:28:11 -0000 1.12
@@ -12,6 +12,11 @@
<body><pre>
<!--#include virtual="/server/header.html" -->
<!-- Parent-Version: 1.84 -->
+<span class="inserted"><ins><em><!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--></em></ins></span>
<title>Proprietary Insecurity
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-insecurity.translist"
-->
@@ -46,114 +51,177 @@
<em>helpless to fix any security problems that arise</em>.
Keeping the
users helpless is what's culpable about proprietary software.</p>
+<span class="removed"><del><strong><ul></strong></del></span>
+
<span class="inserted"><ins><em><p>If you know of an example that ought
to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.</p></em></ins></span>
+to present the specifics.</p>
-<ul>
-<span class="inserted"><ins><em><li>
- <p>Some Samsung phones
- randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
+<ul class="blurbs"></em></ins></span>
+ <li <span class="removed"><del><strong>id="break-security-smarttv">
+ <p><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers</strong></del></span> <span
class="inserted"><ins><em>id="M201809240">
+ <p>Researchers have discovered how to <a
+
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands in other audio</a>, so that people cannot hear
+ them, but Alexa and Siri can.</p>
+ </li>
+
+ <li id="M201808120">
+ <p>Crackers</em></ins></span> found a way to break <span
class="inserted"><ins><em>the</em></ins></span> security <span
class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>of an Amazon device,
+ and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into</em></ins></span> a <span
class="removed"><del><strong>“smart”
TV</a></strong></del></span> <span class="inserted"><ins><em>listening
device</a> for them.</p>
+
+ <p>It was very difficult for them to do this. The job would be much
+ easier for Amazon. And if some government such as China or the US
+ told Amazon to do this, or cease to sell the product in that country,
+ do you think Amazon would have the moral fiber to say no?</p>
+
+ <p>These crackers are probably hackers too, but please <a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
+ “hacking” to mean “breaking
security”</a>.</p>
+ </li>
+
+ <li id="M201807100">
+ <p>Siri, Alexa, and all the other voice-control systems can be <a
+
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
+ hijacked by programs that play commands in ultrasound that humans
+ can't hear</a>.</p>
+ </li>
+
+ <li id="M201807020">
+ <p>Some Samsung phones randomly <a
+
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
photos to people in the owner's contact list</a>.</p>
-</li>
-<li>
- <p>One of the dangers of the “internet of stings” is that,
if
- you lose your internet service, you also <a
-href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control of your house and appliances</a>.</p>
- <p>For your safety, don't use any appliance with a connection to the
real
- internet.</p>
-</li>
-<li>
- <p>Amazon recently invited consumers to be suckers and <a
-href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
- allow delivery staff to open their front doors</a>. Wouldn't you
know it,
- the system has a grave security flaw.</p>
-</li>
-<li>
+ </li>
+
+ <li id="M201712240">
+ <p>One of the dangers of the “internet of stings”
+ is that, if you lose your internet service, you also <a
+
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ lose control of your house</em></ins></span> and <span
class="inserted"><ins><em>appliances</a>.</p>
+
+ <p>For your safety, don't</em></ins></span> use <span
class="inserted"><ins><em>any appliance with a connection to the
+ real internet.</p>
+ </li>
+
+ <li id="M201711204">
<p>Intel's intentional “management engine” back door has
<a
-href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
+
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
unintended back doors</a> too.</p>
-</li>
-<li>
- <p>Bad security in some cars makes it possible
- to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
+ </li>
+
+ <li id="M201711200">
+ <p>Amazon recently invited consumers to be suckers and <a
+
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff to open their front doors</a>. Wouldn't you know
+ it, the system has a grave security flaw.</p>
+ </li>
+
+ <li id="M201709290">
+ <p>Bad security in some cars makes it possible to <a
+ href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
remotely activate the airbags</a>.</p>
-</li>
-<li>
- <p>A “smart” intravenous pump designed for
- hospitals is connected to the internet. Naturally <a
-href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
- its security has been cracked</a>.</p>
+ </li>
+
+ <li id="M201709200">
+ <p>A “smart” intravenous pump
+ designed for hospitals is connected to the internet. Naturally <a
+
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"></em></ins></span>
+ its <span class="removed"><del><strong>camera</strong></del></span> <span
class="inserted"><ins><em>security has been cracked</a>.</p>
+
<p>Note that this article misuses the term <a
-href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring to crackers.</p>
-</li>
-<li>
- <p>The bad security in many Internet of Stings devices
- allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
+ referring</em></ins></span> to <span
class="removed"><del><strong>watch</strong></del></span> <span
class="inserted"><ins><em>crackers.</p>
+ </li>
+
+ <li id="M201708280">
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on</em></ins></span> the people <span
class="removed"><del><strong>who are watching
TV.</p></strong></del></span> <span class="inserted"><ins><em>that use
them</a>.</p>
+
<p>Don't be a sucker—reject all the stings.</p>
+
<p>It is unfortunate that the article uses the term <a
- href="/philosophy/words-to-avoid.html#Monetize">
- “monetize”</a>.</p>
-</li>
-<li>
- <p>Siri, Alexa, and all the other voice-control systems can be
- <a
-href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
- hijacked by programs that play commands in ultrasound that humans can't
- hear</a>.</p>
-</li></em></ins></span>
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li></strong></del></span>
-<li id="break-security-smarttv">
- <p><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a> and use its camera
- to watch the people who are watching TV.</p>
-</li>
-<li>
+ <span class="inserted"><ins><em><li id="M201706201"></em></ins></span>
<p>Many models of Internet-connected cameras <a
href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
have backdoors</a>.</p>
- <p>That is a malicious functionality, but in addition it is a gross
- insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them to get into
- users' cameras</a>.</p>
-
-</li>
+ <p>That is a malicious functionality, but in addition it
+ is a gross insecurity since anyone, including malicious crackers, <a
+
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
+ find those accounts and use them to get into users'
cameras</a>.</p>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p>
Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
- pre-installed on 28 models of HP laptops logged the user's
- keystroke to a file in the filesystem. Any process with access to
- the filesystem or the MapViewOfFile API could gain access to the
- log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
- to modzero</a> the “information-leak via Covert Storage
- Channel enables malware authors to capture keystrokes without
- taking the risk of being classified as malicious task by AV
- heuristics”.
+ pre-installed</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201706050">
+ <p id="intel-me-10-year-vulnerability">Intel's
+ CPU backdoor—the Intel Management Engine—had a <a
+
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
+ security vulnerability for 10 years</a>.</p>
+
+ <p>The vulnerability allowed a cracker to access
+ the computer's Intel Active Management Technology (AMT) <a
+
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
+ web interface with an empty password and gave administrative
+ access</a> to access the computer's keyboard, mouse, monitor among
+ other privileges.</p>
+
+ <p>It does not help that in newer Intel processors, it is impossible
+ to turn off the Intel Management Engine. Thus, even users who are
+ proactive about their security can do nothing to protect themselves
+ besides using machines that don't come with the backdoor.</p>
+ </li>
+
+ <li id="M201705250">
+ <p>The proprietary code that runs pacemakers,
+ insulin pumps, and other medical devices is <a
+ href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
+ security faults</a>.</p>
+ </li>
+
+ <li id="M201705160">
+ <p>Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+ pre-installed</em></ins></span> on 28 models of HP laptops logged the
user's keystroke
+ to a file in the filesystem. Any process with access to the filesystem
+ or the MapViewOfFile API could gain access to the log. Furthermore, <a
+
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
+ to modzero</a> the “information-leak via Covert Storage Channel
+ enables malware authors to capture keystrokes without taking the risk
+ of being classified as malicious task by AV
+ <span class="removed"><del><strong>heuristics”.
</p>
</li>
<li>
<p>The proprietary code that runs pacemakers, insulin pumps, and other
medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p>
-</li>
+full of gross security faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705120"></em></ins></span>
<p>Exploits of bugs in Windows, which were developed by the NSA
- and then leaked by the Shadowbrokers group, are now being used to
- <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
- of Windows computers with ransomware</a>.
- </p>
-</li>
+ and then leaked by the Shadowbrokers group, are now being used to <a
+
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
+ a great number of Windows computers with <span
class="removed"><del><strong>ransomware</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>ransomware</a>.</p></em></ins></span>
+ </li>
-<li id="intel-me-10-year-vulnerability">
+ <li <span
class="removed"><del><strong>id="intel-me-10-year-vulnerability">
<p>Intel's CPU backdoor—the Intel Management Engine—had a
<a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security
vulnerability for 10 years</a>.</p>
@@ -172,43 +240,82 @@
</li>
-<li>
- <p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
+<li></strong></del></span> <span
class="inserted"><ins><em>id="M201704050"></em></ins></span>
+ <p>Many Android devices <a
+
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because of a bug in
Broadcom's non-free firmware.</p>
-</li>
+ </li>
-<li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
<a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
-<span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
-connected</em></ins></span> to the Internet, its security is
crap</a>.</p>
+<span class="removed"><del><strong><li></strong></del></span>
-<p>For example, a cracker can gain access to the dishwasher's
filesystem,
-infect it with malware, and force the dishwasher to launch attacks on other
-devices in the network. Since these dishwashers are used in hospitals, such
-attacks could potentially put hundreds of lives at risk.</p>
+ <span class="inserted"><ins><em><li id="M201703270"></em></ins></span>
+ <p>When Miele's Internet of
+ Stings hospital disinfectant dishwasher is <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected</em></ins></span> to the Internet, its security is
crap</a>.</p>
+
+ <p>For example, a cracker can gain access to the dishwasher's
+ filesystem, infect it with malware, and force the dishwasher to launch
+ attacks on other devices in the network. Since these dishwashers are
+ used in hospitals, such attacks could potentially put hundreds of
+ lives at risk.</p>
+ </li>
+<span class="removed"><del><strong><li><p>WhatsApp
has</strong></del></span>
-</li>
-<li><p>WhatsApp has a feature that
+ <span class="inserted"><ins><em><li id="M201702200">
+ <p>If you buy</em></ins></span> a <span
class="removed"><del><strong>feature that
<a
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
- has been described as a “back door”</a>
- because it would enable governments to nullify its encryption.</p>
+ has been described</strong></del></span> <span
class="inserted"><ins><em>used “smart”
+ car, house, TV, refrigerator, etc., usually <a
+
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+ previous owners can still remotely control it</a>.</p>
+ </li>
+
+ <li id="M201702170">
+ <p>The mobile apps for communicating <a
+
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
+ a smart but foolish car have very bad security</a>.</p>
+
+ <p>This is in addition to the fact that the car contains a cellular
+ modem that tells big brother all the time where it is. If you own
+ such a car, it would be wise to disconnect the modem so as to turn
+ off the tracking.</p>
+ </li>
+
+ <li id="M201701270">
+ <p>Samsung phones <a
+
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
+ a security hole that allows an SMS message to install
+ ransomware</a>.</p>
+ </li>
+
+ <li id="M201701130">
+ <p>WhatsApp has a feature that <a
+
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
+ has been described</em></ins></span> as a “back
door”</a> because it would
+ enable governments to nullify its encryption.</p>
+
<p>The developers say that it wasn't intended as a back door, and that
may well be true. But that leaves the crucial question of whether it
functions as one. Because the program is nonfree, we cannot check by
- studying it.</p></li>
+ studying <span class="removed"><del><strong>it.</p></li>
-<li>
-<p>The “smart” toys My Friend Cayla and i-Que can be
-<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
controlled with a mobile phone</a>; physical access
-is not necessary. This would enable crackers to listen in on a child's
-conversations, and even speak into the toys themselves.</p>
+<li></strong></del></span> <span class="inserted"><ins><em>it.</p>
+ </li>
-<p>This means a burglar could speak into the toys and ask the child to
-unlock the front door while Mommy's not looking.</p>
-</li>
+ <li id="M201612061"></em></ins></span>
+ <p>The “smart” toys My Friend Cayla and i-Que can be
<a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
+ controlled with a mobile phone</a>; physical access is not
+ necessary. This would enable crackers to listen in on a child's
+ conversations, and even speak into the toys themselves.</p>
+
+ <p>This means a burglar could speak into the toys and ask the child
+ to unlock the front door while Mommy's not looking.</p>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p>The mobile apps for
communicating <a
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
a smart but foolish car have very bad security</a>.</p>
@@ -230,64 +337,85 @@
<p>Samsung
phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
a security hole that allows an SMS message to install
-<span
class="removed"><del><strong>ransomeware</a>.</p></strong></del></span>
-<span
class="inserted"><ins><em>ransomware</a>.</p></em></ins></span>
+ransomeware</a>.</p>
</li>
-<li>
-<p>4G LTE phone networks are drastically insecure. They can be
-<a
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
-taken
-over by third parties and used for man-in-the-middle
attacks</a>.</p>
-</li>
+<li></strong></del></span>
-<li>
-<p>Due to weak security, <a
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
-is easy to open the doors of 100 million cars built by
Volkswagen</a>.</p>
-</li>
+ <span class="inserted"><ins><em><li id="M201610230"></em></ins></span>
+ <p>4G LTE phone networks are drastically insecure. They can be <a
<span
class="removed"><del><strong>href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"></em></ins></span>
+ taken over by third parties and used for man-in-the-middle
+ attacks</a>.</p>
+ </li>
-<li>
-<p>Ransomware <a <span
class="removed"><del><strong>href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has</strong></del></span>
-<span
class="inserted"><ins><em>href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">
-has</em></ins></span> been developed for a thermostat that uses proprietary
software</a>.</p>
-</li>
+<span class="removed"><del><strong><li></strong></del></span>
-<li>
-<p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in
-Internet Explorer and Edge</a> allows an attacker to retrieve
-Microsoft account credentials, if the user is tricked into visiting a
-malicious link.</p>
-</li>
+ <span class="inserted"><ins><em><li id="M201608110"></em></ins></span>
+ <p>Due to weak security, <a
+
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
+ is easy to open the doors of 100 million cars built by
+ Volkswagen</a>.</p>
+ </li>
-<li>
-<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
-WhatsApp messages are not entirely deleted</a>. They can be recovered
-in various ways.
-</p>
-</li>
+<span class="removed"><del><strong><li></strong></del></span>
-<li>
-<p>A vulnerability in Apple's Image I/O API allowed an attacker to
-<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ <span class="inserted"><ins><em><li id="M201608080"></em></ins></span>
+ <p>Ransomware <a <span
class="removed"><del><strong>href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">
+ has</em></ins></span> been developed for a thermostat that uses proprietary
+ software</a>.</p>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201608020"></em></ins></span>
+ <p>A <a
+
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
+ in Internet Explorer and Edge</a> allows an attacker to retrieve
+ Microsoft account credentials, if the user is tricked into visiting
+ a malicious link.</p>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201607290"></em></ins></span>
+ <p><a
+
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
+ WhatsApp messages are not entirely deleted</a>. They can be recovered
+ in various <span class="removed"><del><strong>ways.
+</p></strong></del></span> <span
class="inserted"><ins><em>ways.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201607220"></em></ins></span>
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
+
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
<span class="removed"><del><strong>malacious</strong></del></span>
<span class="inserted"><ins><em>malicious</em></ins></span> code from any
application which uses this API to render a
certain kind of image file</a>.</p>
-</li>
-<li>
-<p>A bug in a proprietary ASN.1 library, used in cell phone towers as
-well as cell phones and
-routers, <a
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
-taking control of those systems</a>.</p>
-</li>
+ </li>
+<span class="removed"><del><strong><li></strong></del></span>
-<li>
-<p>Antivirus programs have so many errors
- that <a
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
+ <span class="inserted"><ins><em><li id="M201607190"></em></ins></span>
+ <p>A bug in a proprietary ASN.1 library, used
+ in cell phone towers as well as cell phones and routers, <a
+
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
+ taking control of those systems</a>.</p>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606290"></em></ins></span>
+ <p>Antivirus programs have so many errors that <a
+
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
may make security worse</a>.</p>
-<p>GNU/Linux does not need antivirus software.</p>
-</li>
-<li>
+ <p>GNU/Linux does not need antivirus software.</p>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>Over 70 brands of network-connected surveillance
cameras <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">have
security bugs that allow anyone to watch through them</a>.</p>
@@ -295,39 +423,78 @@
<li>
<p>
-Samsung's “Smart Home” has a big security
-hole; <a
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">unauthorized
-people can remotely control it</a>.</p>
+Samsung's</strong></del></span>
-<p>Samsung claims that this is an “open” platform so the
-problem is partly the fault of app developers. That is clearly true if
-the apps are proprietary software.</p>
+ <span class="inserted"><ins><em><li id="M201605020">
+ <p>Samsung's</em></ins></span> “Smart Home” has a big
security hole; <a <span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">unauthorized</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+ unauthorized</em></ins></span> people can remotely control
it</a>.</p>
+
+ <p>Samsung claims that this is an “open” platform so the
+ problem is partly the fault of app developers. That is clearly true
+ if the apps are proprietary software.</p>
+
+ <p>Anything whose name is “Smart” is most likely going
+ to screw you.</p>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>
+The Nissan Leaf has</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201604120">
+ <p>A bug in the iThings Messages app <a
+
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</em></ins></span>
+ a <span class="removed"><del><strong>built-in cell
phone</strong></del></span> <span class="inserted"><ins><em>malicious web site
to extract all the user's messaging
+ history</a>.</p>
+ </li>
+
+ <li id="M201604110">
+ <p>Malware was found on <a
+
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+ security cameras available through Amazon</a>.</p>
+
+ <p>A camera that records locally on physical media, and has no
network
+ connection, does not threaten people with surveillance—neither
+ by watching people through the camera, nor through malware in the
+ camera.</p>
+ </li>
+
+ <li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
+ </li>
+
+ <li id="M201603100">
+ <p>Many proprietary payment apps <a
+
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit
+ personal data in an insecure way</a>. However,
+ the worse aspect of these apps is that <a
+ href="/philosophy/surveillance-vs-democracy.html">payment is not
+ anonymous</a>.</p>
+ </li>
+
+ <li id="M201602240">
+ <p id="nissan-modem">The Nissan Leaf has a built-in
+ cell phone</em></ins></span> modem which allows effectively anyone <a
+
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in the car is proprietary, <a
+ href="/philosophy/free-software-even-more-important.html">which means
+ it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone modem
+ enables the phone company to track the car's movements all the time;
+ it is possible to physically remove the cell phone <span
class="removed"><del><strong>modem</strong></del></span> <span
class="inserted"><ins><em>modem,</em></ins></span> though.</p>
+ </li>
-<p>Anything whose name is “Smart” is most likely going to
-screw you.</p>
-</li>
-
-<li>
-<p>
-The Nissan Leaf has a built-in cell phone modem which allows
-effectively
-anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
-access its computers remotely and make changes in various
-settings</a>.</p>
-
-<p>That's easy to do because the system has no authentication when
-accessed through the modem. However, even if it asked for
-authentication, you couldn't be confident that Nissan has no
-access. The software in the car is
-proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
-means it demands blind faith from its users</a>.</p>
-
-<p>Even if no one connects to the car remotely, the cell phone modem
-enables the phone company to track the car's movements all the time;
-it is possible to physically remove the cell phone modem though.</p>
-</li>
-
-<li>
+<span class="removed"><del><strong><li>
<p>
Malware found
on <a
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">security
@@ -358,19 +525,27 @@
<li>
<p>
-FitBit fitness trackers <a
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-have a Bluetooth vulnerability</a> that allows
-attackers to send malware to the devices, which can subsequently spread
-to computers and other FitBit trackers that interact with them.
-</p>
-</li>
+FitBit</strong></del></span>
-<li>
-<p>
-“Self-encrypting” disk drives do the encryption with proprietary
-firmware so you can't trust it. Western Digital's “My Passport”
-drives
-<a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
<span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</em></ins></span>
a back door</a>.
+ <span class="inserted"><ins><em><li id="M201510210">
+ <p>FitBit</em></ins></span> fitness trackers <span
class="removed"><del><strong><a
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"></strong></del></span>
have a <span class="inserted"><ins><em><a
+
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"></em></ins></span>
+ Bluetooth vulnerability</a> that allows attackers to send malware
+ to the devices, which can subsequently spread to computers and other
+ FitBit trackers that interact with <span class="removed"><del><strong>them.
+</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>
+“Self-encrypting”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510200">
+ <p>“Self-encrypting”</em></ins></span> disk drives
+ do the encryption with proprietary firmware so you
+ can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+ have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
</p>
</li>
@@ -380,51 +555,84 @@
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+ </li>
-<li>
-<p>Security researchers discovered a
-<a
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
-vulnerability in diagnostic dongles used for vehicle tracking and
-insurance</a> that let them take remote control of a car or
-lorry using an SMS.
-</p>
-</li>
+<span class="removed"><del><strong><li></strong></del></span>
-<li>
+ <span class="inserted"><ins><em><li id="M201508120"></em></ins></span>
+ <p>Security researchers discovered a <a
+
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
+ vulnerability in diagnostic dongles used for vehicle tracking and
+ insurance</a> that let them take remote control of a car or lorry
+ using an <span class="removed"><del><strong>SMS.
+</p></strong></del></span> <span
class="inserted"><ins><em>SMS.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>
-Crackers were able to
-<a
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">take
remote control of the Jeep</a>
-“connected car”.
-<br/>They could track the car, start or stop the engine, and
-activate or deactivate the brakes, and more.
+Crackers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507214">
+ <p>Crackers</em></ins></span> were able to <a <span
class="removed"><del><strong>href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">take</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">
+ take</em></ins></span> remote control of the Jeep</a>
“connected car”.
+<span class="removed"><del><strong><br/>They</strong></del></span> <span
class="inserted"><ins><em>They</em></ins></span>
+ could track the car, start or stop the engine, and activate or
+ deactivate the brakes, and <span class="removed"><del><strong>more.
</p>
<p>
-I expect that Chrysler and the NSA can do this too.
+I</strong></del></span> <span class="inserted"><ins><em>more.</p>
+
+ <p>I</em></ins></span> expect that Chrysler and the NSA can do this
<span class="removed"><del><strong>too.
</p>
<p>
-If I ever own a car, and it contains a portable phone, I will
-deactivate that.
-</p>
-</li>
+If</strong></del></span> <span class="inserted"><ins><em>too.</p>
-<li>
+ <p>If</em></ins></span> I ever own a car, and it contains a portable
phone, I will
+ deactivate <span class="removed"><del><strong>that.
+</p></strong></del></span> <span
class="inserted"><ins><em>that.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>
-Hospira infusion pumps, which are used to administer drugs to
-a patient, were rated
+Hospira infusion pumps, which are used to administer
drugs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201506080">
+ <p>Due</em></ins></span> to <span class="inserted"><ins><em>bad
security in</em></ins></span> a <span class="removed"><del><strong>patient,
were rated
“<a
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
-secure IP device I've ever seen</a>”
-by a security researcher.
-</p>
-<p>
-Depending on what drug is being infused, the insecurity could
-open the door to murder.
-</p>
-</li>
+secure IP</strong></del></span> <span class="inserted"><ins><em>drug pump,
crackers could use it to <a
+
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
+ kill patients</a>.</p>
+ </li>
-<li>
+ <li id="M201505294">
+ <p><a
+
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
+ Many smartphone apps use insecure authentication methods when storing
+ your personal data on remote servers</a>. This leaves personal
+ information like email addresses, passwords, and health information
+ vulnerable. Because many of these apps are proprietary it makes it
+ hard to impossible to know which apps are at risk.</p>
+ </li>
+
+ <li id="M201505050">
+ <p>Hospira infusion pumps, which are used
+ to administer drugs to a patient, were rated “<a
+
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
+ secure IP</em></ins></span> device I've ever seen</a>” by a
security <span class="removed"><del><strong>researcher.
+</p>
+<p>
+Depending</strong></del></span>
+ <span class="inserted"><ins><em>researcher.</p>
+
+ <p>Depending</em></ins></span> on what drug is being infused, the
insecurity could open
+ the door to <span class="removed"><del><strong>murder.
+</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>
Due to bad security in a drug pump, crackers could use it to
<a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
@@ -432,11 +640,15 @@
</li>
<li>
-<p>
-<a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+<p></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201504090">
+ <p>Mac OS X had an</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones, Android, and
BlackBerry</a>. While there is not much detail here, it seems that
-this does not operate via the universal back door that we know nearly
+this does not operate via the universal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+ intentional local</em></ins></span> back door <span
class="removed"><del><strong>that we know nearly
all portable phones have. It may involve exploiting various bugs.
There
are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
@@ -459,7 +671,7 @@
<li>
<p><a
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
The FTC punished a company for making webcams with bad security so
-that it was easy for anyone to watch them</a>.
+that it was easy</strong></del></span> for <span
class="removed"><del><strong>anyone to watch them</a>.
</p>
</li>
@@ -478,13 +690,12 @@
It is possible to kill people by taking control of medical implants by
radio</a>. Here
is <a href="http://www.bbc.co.uk/news/technology-17631838">more
-information</a>. And <a <span
class="removed"><del><strong>href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.</strong></del></span>
-<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.</em></ins></span>
+information</a>. And <a
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.
</p>
</li>
<li>
-<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">hospital
equipment has lousy security</a>, and it can be fatal.
+<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">hospital
equipment has lousy security</a>, and it can</strong></del></span> <span
class="inserted"><ins><em>4 years</a>, which could</em></ins></span> be
<span class="removed"><del><strong>fatal.
</p>
</li>
@@ -493,53 +704,152 @@
Point-of-sale terminals running Windows were taken over and turned
into a botnet for the purpose of collecting customers' credit card
numbers</a>.
-</p>
-</li>
+</p></strong></del></span> <span class="inserted"><ins><em>exploited
+ by attackers to gain root privileges.</p></em></ins></span>
+ </li>
-<li>
-<p>An app to prevent “identity theft” (access to personal
data)
-by storing users' data on a special server
-<a
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
-deactivated by its developer</a> which had discovered a security flaw.
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201405190"></em></ins></span>
+ <p>An app to prevent “identity theft”
+ (access to personal data) by storing users' data on a special server <a
+
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
+ deactivated by its developer</a> which had discovered a security
<span class="removed"><del><strong>flaw.
</p>
<p>
-That developer seems to be conscientious about protecting personal
-data from third parties in general, but it can't protect that data
-from the state. Quite the contrary: confiding your data to someone
+That</strong></del></span>
+ <span class="inserted"><ins><em>flaw.</p>
+
+ <p>That</em></ins></span> developer seems to be conscientious about
protecting personal
+ data from third parties in general, but it can't protect that data
+ from the state. Quite the <span class="removed"><del><strong>contrary:
confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your rights.
-</p>
-</li>
+</p></strong></del></span> <span class="inserted"><ins><em>contrary:
confiding your data to someone
+ else's server, if not first encrypted by you with free software,
+ undermines your rights.</p>
+ </li>
+
+ <li id="M201404250">
+ <p>Lots of <a
+ href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+ hospital equipment has lousy security</a>, and it can be
fatal.</p>
+ </li>
+
+ <li id="M201402210">
+ <p>The <a
+
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
+ of WhatsApp</a> makes eavesdropping a snap.</p>
+ </li>
+
+ <li id="M201312290">
+ <p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
+ memories have modifiable software</a>, which makes them vulnerable
+ to viruses.</p>
+
+ <p>We don't call this a “back door” because it is normal
+ that you can install a new system in a computer, given physical access
+ to it. However, memory sticks and cards should not be modifiable in
+ this way.</p>
+ </li>
-<li>
-<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some flash
+ <li id="M201312040">
+ <p><a
+
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+ Point-of-sale terminals running Windows were taken over</a> and
+ turned into a botnet for the purpose of collecting customers' credit
+ card numbers.</p>
+ </li>
+
+ <li id="M201311120">
+ <p><a
+
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA can tap data in smart phones, including iPhones,
+ Android, and BlackBerry</a>. While there is not much
+ detail here, it seems that this does not operate via
+ the universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There are <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots of bugs in the phones' radio
software</a>.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201309054"></em></ins></span>
+ <p><a <span
class="removed"><del><strong>href="http://www.bunniestudios.com/blog/?p=3554">
Some flash
memories have modifiable software</a>, which makes them vulnerable to
viruses.</p>
-<p>We don't call this a “back door” because it is normal
-that you can install a new system in a computer given physical access
-to it. However, memory sticks and cards should not be modifiable in
-this way.</p>
-</li>
+<p>We</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">The
+ NSA has put back doors into nonfree encryption software</a>.
We</em></ins></span> don't <span class="removed"><del><strong>call this a
“back door” because it is normal</strong></del></span>
+ <span class="inserted"><ins><em>know which ones they are, but we can be
sure they include some widely
+ used systems. This reinforces the point</em></ins></span> that you can
<span class="removed"><del><strong>install a new system
in</strong></del></span> <span class="inserted"><ins><em>never trust
+ the security of nonfree software.</p>
+ </li>
+
+ <li id="M201309050">
+ <p>The FTC punished</em></ins></span> a <span
class="removed"><del><strong>computer given physical
access</strong></del></span> <span class="inserted"><ins><em>company for making
webcams with <a
+
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+ bad security so that it was easy for anyone</em></ins></span> to <span
class="removed"><del><strong>it. However, memory sticks and cards should not
be modifiable in
+this way.</p></strong></del></span> <span
class="inserted"><ins><em>watch through
+ them</a>.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308060"></em></ins></span>
+ <p><a href="http://spritesmods.com/?art=hddhack&page=6">
+ Replaceable nonfree software in disk drives can be written by a
+ nonfree
+<span class="removed"><del><strong>program.</a></strong></del></span>
<span class="inserted"><ins><em>program</a>.</em></ins></span> This makes
any system vulnerable to persistent
+ attacks that normal forensics won't detect.</p>
+ </li>
-<li>
-<p><a href="http://spritesmods.com/?art=hddhack&page=6">
Replaceable
-nonfree software in disk drives can be written by a nonfree
-program.</a> This makes any system vulnerable to persistent attacks
-that normal forensics won't detect.</p>
-</li>
-
-<li>
+<span class="removed"><del><strong><li>
<p><a
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
Many smartphone apps use insecure authentication methods when storing
your personal data on remote servers.</a>
-This leaves personal information like email addresses, passwords, and health
information vulnerable. Because many
-of these apps are proprietary it makes it hard to impossible to know which
apps are at risk.</p>
-</li>
+This leaves personal</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307270">
+ <p> It is possible to <a
+
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+ kill people by taking control of medical
+ implants by radio</a>. More</em></ins></span> information <span
class="removed"><del><strong>like email addresses,
passwords,</strong></del></span> <span class="inserted"><ins><em>in <a
+ href="http://www.bbc.co.uk/news/technology-17631838">BBC
+ News</a></em></ins></span> and <span
class="removed"><del><strong>health information vulnerable. Because many
+of these apps are proprietary it makes it hard</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
+ IOActive Labs Research blog</a>.</p>
+ </li>
+ <li id="M201307260">
+ <p><a
+
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+ “Smart homes”</a> turn out</em></ins></span> to <span
class="removed"><del><strong>impossible</strong></del></span> <span
class="inserted"><ins><em>be stupidly vulnerable</em></ins></span> to <span
class="removed"><del><strong>know which apps</strong></del></span>
+ <span class="inserted"><ins><em>intrusion.</p>
+ </li>
+
+ <li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who</em></ins></span> are <span
class="removed"><del><strong>at risk.</p></strong></del></span> <span
class="inserted"><ins><em>watching TV.</p>
+ </li>
+
+ <li id="M201103110">
+ <p>It is possible to take control of some car computers through <a
+
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
+ malware in music files</a>. Also <a
+ href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">
+ by radio</a>. Here is <a
href="http://www.autosec.org/faq.html">more
+ information</a>.</p></em></ins></span>
+ </li>
</ul>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -598,7 +908,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/18 17:27:39 $
+$Date: 2018/09/26 14:28:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary-insecurity.it.po 18 Sep 2018 17:27:39 -0000 1.130
+++ proprietary-insecurity.it.po 26 Sep 2018 14:28:11 -0000 1.131
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-09-18 17:25+0000\n"
+"POT-Creation-Date: 2018-09-26 14:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -121,6 +121,48 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
+"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
+"voice commands in other audio</a>, so that people cannot hear them, but "
+"Alexa and Siri can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+"Siri, Alexa e tutti gli altri sistemi comandati a voce possono essere <a "
+"href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">controllati tramite programmi che "
+"usano ultrasuoni</a> che l'orecchio umano non percepisce."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Samsung phones randomly <a href=\"https://www.theverge.com/"
"circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"
"\">send photos to people in the owner's contact list</a>."
@@ -142,17 +184,17 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon recently invited consumers to be suckers and <a href=\"https://www."
-"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
-"delivery staff to open their front doors</a>. Wouldn't you know it, the "
-"system has a grave security flaw."
+"Intel's intentional “management engine” back door has <a href="
+"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
+"unintended back doors</a> too."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Intel's intentional “management engine” back door has <a href="
-"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
-"unintended back doors</a> too."
+"Amazon recently invited consumers to be suckers and <a href=\"https://www."
+"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
+"delivery staff to open their front doors</a>. Wouldn't you know it, the "
+"system has a grave security flaw."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -191,34 +233,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"It is unfortunate that the article uses the term <a href=\"/philosophy/words-"
-"to-avoid.html#Monetize\"> “monetize”</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Siri, Alexa, and all the other voice-control systems can be <a href="
-"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
-"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
-"commands in ultrasound that humans can't hear</a>."
-msgstr ""
-"Siri, Alexa e tutti gli altri sistemi comandati a voce possono essere <a "
-"href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
-"astoundingly-easy-to-hack-siri-and-alexa\">controllati tramite programmi che "
-"usano ultrasuoni</a> che l'orecchio umano non percepisce."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
-"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
-"microphone-cameras.html\"> Crackers found a way to break security on a "
-"“smart” TV</a> and use its camera to watch the people who are "
-"watching TV."
+"to-avoid.html#Monetize\">“monetize”</a>."
msgstr ""
-"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
-"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
-"microphone-cameras.html\"> I \"cracker\" hanno trovato un modo di penetrare "
-"in una “smart” TV</a> e usare la sua telecamera per guardare le "
-"persone che stanno guardando la TV."
#. type: Content of: <ul><li><p>
msgid ""
@@ -244,51 +260,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
-"installed on 28 models of HP laptops logged the user's keystroke to a file "
-"in the filesystem. Any process with access to the filesystem or the "
-"MapViewOfFile API could gain access to the log. Furthermore, <a href="
-"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
-"\">according to modzero</a> the “information-leak via Covert Storage "
-"Channel enables malware authors to capture keystrokes without taking the "
-"risk of being classified as malicious task by AV heuristics”."
-msgstr ""
-"Il driver Conexant HD Audio (versione 1.0.0.46 e precedenti) pre-installato "
-"su 28 modelli di portatili HP scriveva su un file i tasti premuti "
-"dall'utente. Qualsiasi processo con accesso al filesystem o all'API "
-"MapViewOfFile poteva ottenere accesso al log. Inoltre, <a href=\"https://www."
-"modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt\">secondo modzero</a> "
-"l'uso di tecniche di tipo \"Covert Storage Channel\" permette agli autori di "
-"malware di trasmettere i tasti premuti senza correre il rischio di essere "
-"classificati come software pericoloso dai controlli euristici degli "
-"antivirus."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The proprietary code that runs pacemakers, insulin pumps, and other medical "
-"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
-"of gross security faults</a>."
-msgstr ""
-"Il codice proprietario che fa funzionare pace-maker, pompe di insulina e "
-"altri dispositivi medici è <a href=\"http://www.bbc.co.uk/news/"
-"technology-40042584\"> pieno di problemi di sicurezza</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
-"by the Shadowbrokers group, are now being used to <a href=\"https://"
-"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
-"computers-around-the-world/\">attack a great number of Windows computers "
-"with ransomware</a>."
-msgstr ""
-"Attacchi che sfruttano difetti di Windows, sviluppati originariamente dalla "
-"NSA e poi trafugati dal gruppo Shadowbrokers, vengono ora usati per <a href="
-"\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-"
-"helping-hijack-computers-around-the-world/\">colpire molti computer Windows</"
-"a> e richiedere un riscatto."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Intel's CPU backdoor—the Intel Management Engine—had a <a href="
"\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-"
"execution-bug-that-lurked-in-cpus-for-10-years/\">major security "
@@ -328,6 +299,51 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The proprietary code that runs pacemakers, insulin pumps, and other medical "
+"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
+"of gross security faults</a>."
+msgstr ""
+"Il codice proprietario che fa funzionare pace-maker, pompe di insulina e "
+"altri dispositivi medici è <a href=\"http://www.bbc.co.uk/news/"
+"technology-40042584\"> pieno di problemi di sicurezza</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
+"installed on 28 models of HP laptops logged the user's keystroke to a file "
+"in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a href="
+"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
+"\">according to modzero</a> the “information-leak via Covert Storage "
+"Channel enables malware authors to capture keystrokes without taking the "
+"risk of being classified as malicious task by AV heuristics”."
+msgstr ""
+"Il driver Conexant HD Audio (versione 1.0.0.46 e precedenti) pre-installato "
+"su 28 modelli di portatili HP scriveva su un file i tasti premuti "
+"dall'utente. Qualsiasi processo con accesso al filesystem o all'API "
+"MapViewOfFile poteva ottenere accesso al log. Inoltre, <a href=\"https://www."
+"modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt\">secondo modzero</a> "
+"l'uso di tecniche di tipo \"Covert Storage Channel\" permette agli autori di "
+"malware di trasmettere i tasti premuti senza correre il rischio di essere "
+"classificati come software pericoloso dai controlli euristici degli "
+"antivirus."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+"Attacchi che sfruttano difetti di Windows, sviluppati originariamente dalla "
+"NSA e poi trafugati dal gruppo Shadowbrokers, vengono ora usati per <a href="
+"\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-"
+"helping-hijack-computers-around-the-world/\">colpire molti computer Windows</"
+"a> e richiedere un riscatto."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-"
"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
@@ -374,48 +390,14 @@
#. type: Content of: <ul><li><p>
msgid ""
-"WhatsApp has a feature that <a href=\"https://techcrunch.com/2017/01/13/"
-"encrypted-messaging-platform-whatsapp-denies-backdoor-claim/\"> has been "
-"described as a “back door”</a> because it would enable "
-"governments to nullify its encryption."
-msgstr ""
-"WhatsApp ha una funzione che <a href=\"https://techcrunch.com/2017/01/13/"
-"encrypted-messaging-platform-whatsapp-denies-backdoor-claim/\"> è stata "
-"descritta come “backdoor”</a> perché consentirebbe al governo di
"
-"annullare la cifratura del testo."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers say that it wasn't intended as a back door, and that may well "
-"be true. But that leaves the crucial question of whether it functions as "
-"one. Because the program is nonfree, we cannot check by studying it."
-msgstr ""
-"Gli sviluppatori, forse anche in buona fede, dicono che non era intesa come "
-"backdoor, ma questo lascia aperto il dubbio se qualcuno la possa usare come "
-"tale. Dato che il programma non è software libero non possiamo controllarlo."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The “smart” toys My Friend Cayla and i-Que can be <a href="
-"\"https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-"
-"laws\">remotely controlled with a mobile phone</a>; physical access is not "
-"necessary. This would enable crackers to listen in on a child's "
-"conversations, and even speak into the toys themselves."
-msgstr ""
-"I giocattoli “smart” My Friend Cayla and i-Que possono essere <a "
-"href=\"https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-"
-"consumer-laws\">controllati da remoto con un telefono cellulare</a>; non è "
-"necessario l'accesso fisico. Questo permetterebbe ai malintenzionati di "
-"ascoltare le conversazioni di un bambino e persino di parlare attraverso i "
-"giocattoli."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This means a burglar could speak into the toys and ask the child to unlock "
-"the front door while Mommy's not looking."
+"If you buy a used “smart” car, house, TV, refrigerator, etc., "
+"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
+"used.html\">the previous owners can still remotely control it</a>."
msgstr ""
-"Ad esempio un ladro potrebbe chiedere a un bambino, attraverso il "
-"giocattolo, di aprire la porta mentre la mamma è distratta."
+"Se acquistate un'auto, casa, TV, frigorifero di tipo \"smart\" da altri, "
+"solitamente <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-"
+"of-used.html\">il proprietario precedente può ancora controllarla da
remoto</"
+"a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -440,17 +422,6 @@
"tracciamento."
#. type: Content of: <ul><li><p>
-msgid ""
-"If you buy a used “smart” car, house, TV, refrigerator, etc., "
-"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
-"used.html\">the previous owners can still remotely control it</a>."
-msgstr ""
-"Se acquistate un'auto, casa, TV, frigorifero di tipo \"smart\" da altri, "
-"solitamente <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-"
-"of-used.html\">il proprietario precedente può ancora controllarla da
remoto</"
-"a>."
-
-#. type: Content of: <ul><li><p>
# | Samsung phones <a
# |
href=\"https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/\">have
# | a security hole that allows an SMS message to install ransom[-e-]ware</a>.
@@ -472,41 +443,96 @@
#. type: Content of: <ul><li><p>
msgid ""
-"4G LTE phone networks are drastically insecure. They can be <a href="
-"\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
-"uk/2016/10/23/"
-"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
-"over by third parties and used for man-in-the-middle attacks</a>."
+"WhatsApp has a feature that <a href=\"https://techcrunch.com/2017/01/13/"
+"encrypted-messaging-platform-whatsapp-denies-backdoor-claim/\"> has been "
+"described as a “back door”</a> because it would enable "
+"governments to nullify its encryption."
msgstr ""
-"Le reti telefoniche cellulari di tipo 4G LTE sono insicure. Possono essere "
-"<a href=\"https://web.archive.org/web/20161027223907/http://www.theregister."
-"co.uk/2016/10/23/"
-"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> "
-"controllate da terze parti</a> e usate per attacchi di tipo \"man in the "
-"middle\"."
+"WhatsApp ha una funzione che <a href=\"https://techcrunch.com/2017/01/13/"
+"encrypted-messaging-platform-whatsapp-denies-backdoor-claim/\"> è stata "
+"descritta come “backdoor”</a> perché consentirebbe al governo di
"
+"annullare la cifratura del testo."
#. type: Content of: <ul><li><p>
msgid ""
-"Due to weak security, <a href=\"http://jalopnik.com/almost-every-volkswagen-"
-"built-since-1995-is-vulnerable-1785159844\">it is easy to open the doors of "
-"100 million cars built by Volkswagen</a>."
+"The developers say that it wasn't intended as a back door, and that may well "
+"be true. But that leaves the crucial question of whether it functions as "
+"one. Because the program is nonfree, we cannot check by studying it."
msgstr ""
-"Per carenze di sicurezza <a href=\"http://jalopnik.com/almost-every-"
-"volkswagen-built-since-1995-is-vulnerable-1785159844\">è facile aprire le "
-"porte di 100 milioni di auto costruite da Volkswagen</a>."
+"Gli sviluppatori, forse anche in buona fede, dicono che non era intesa come "
+"backdoor, ma questo lascia aperto il dubbio se qualcuno la possa usare come "
+"tale. Dato che il programma non è software libero non possiamo controllarlo."
#. type: Content of: <ul><li><p>
-# | Ransomware <a
-# |
[-href=\"https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/\">has-]
-# |
{+href=\"https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/\">
-# | has+} been developed for a thermostat that uses proprietary software</a>.
-#, fuzzy
-#| msgid ""
-#| "Ransomware <a href=\"https://www.pentestpartners.com/blog/thermostat-"
-#| "ransomware-a-lesson-in-iot-security/\">has been developed for a "
-#| "thermostat that uses proprietary software</a>."
msgid ""
-"Ransomware <a href=\"https://www.pentestpartners.com/security-blog/"
+"The “smart” toys My Friend Cayla and i-Que can be <a href="
+"\"https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-"
+"laws\">remotely controlled with a mobile phone</a>; physical access is not "
+"necessary. This would enable crackers to listen in on a child's "
+"conversations, and even speak into the toys themselves."
+msgstr ""
+"I giocattoli “smart” My Friend Cayla and i-Que possono essere <a "
+"href=\"https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-"
+"consumer-laws\">controllati da remoto con un telefono cellulare</a>; non è "
+"necessario l'accesso fisico. Questo permetterebbe ai malintenzionati di "
+"ascoltare le conversazioni di un bambino e persino di parlare attraverso i "
+"giocattoli."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This means a burglar could speak into the toys and ask the child to unlock "
+"the front door while Mommy's not looking."
+msgstr ""
+"Ad esempio un ladro potrebbe chiedere a un bambino, attraverso il "
+"giocattolo, di aprire la porta mentre la mamma è distratta."
+
+#. type: Content of: <ul><li><p>
+# | 4G LTE phone networks are drastically insecure. They can be <a
+# |
[-href=\"https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">-]
+# |
{+href=\"https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">+}
+# | taken over by third parties and used for man-in-the-middle attacks</a>.
+#, fuzzy
+#| msgid ""
+#| "4G LTE phone networks are drastically insecure. They can be <a href="
+#| "\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
+#| "uk/2016/10/23/"
+#| "every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
+#| "over by third parties and used for man-in-the-middle attacks</a>."
+msgid ""
+"4G LTE phone networks are drastically insecure. They can be <a href="
+"\"https://www.theregister.co.uk/2016/10/23/"
+"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
+"over by third parties and used for man-in-the-middle attacks</a>."
+msgstr ""
+"Le reti telefoniche cellulari di tipo 4G LTE sono insicure. Possono essere "
+"<a href=\"https://web.archive.org/web/20161027223907/http://www.theregister."
+"co.uk/2016/10/23/"
+"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> "
+"controllate da terze parti</a> e usate per attacchi di tipo \"man in the "
+"middle\"."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Due to weak security, <a href=\"http://jalopnik.com/almost-every-volkswagen-"
+"built-since-1995-is-vulnerable-1785159844\">it is easy to open the doors of "
+"100 million cars built by Volkswagen</a>."
+msgstr ""
+"Per carenze di sicurezza <a href=\"http://jalopnik.com/almost-every-"
+"volkswagen-built-since-1995-is-vulnerable-1785159844\">è facile aprire le "
+"porte di 100 milioni di auto costruite da Volkswagen</a>."
+
+#. type: Content of: <ul><li><p>
+# | Ransomware <a
+# |
[-href=\"https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/\">has-]
+# |
{+href=\"https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/\">
+# | has+} been developed for a thermostat that uses proprietary software</a>.
+#, fuzzy
+#| msgid ""
+#| "Ransomware <a href=\"https://www.pentestpartners.com/blog/thermostat-"
+#| "ransomware-a-lesson-in-iot-security/\">has been developed for a "
+#| "thermostat that uses proprietary software</a>."
+msgid ""
+"Ransomware <a href=\"https://www.pentestpartners.com/security-blog/"
"thermostat-ransomware-a-lesson-in-iot-security/\"> has been developed for a "
"thermostat that uses proprietary software</a>."
msgstr ""
@@ -587,21 +613,19 @@
msgstr "GNU/Linux non ha bisogno di antivirus."
#. type: Content of: <ul><li><p>
-msgid ""
-"Over 70 brands of network-connected surveillance cameras <a href=\"http://"
-"www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
-"\">have security bugs that allow anyone to watch through them</a>."
-msgstr ""
-"Videocamere di sorveglianza connesse in rete prodotte da oltre 70 marche <a "
-"href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-"
-"of.html\">hanno problemi di sicurezza che permettono a tutti di vedere le "
-"immagini</a>."
-
-#. type: Content of: <ul><li><p>
+# | Samsung's “Smart Home” has a big security hole; <a
+# |
href=\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/\">{+
+# | +}unauthorized people can remotely control it</a>.
+#, fuzzy
+#| msgid ""
+#| "Samsung's “Smart Home” has a big security hole; <a href="
+#| "\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-"
+#| "hackers-make-keys-to-front-door/\">unauthorized people can remotely "
+#| "control it</a>."
msgid ""
"Samsung's “Smart Home” has a big security hole; <a href=\"http://"
"arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-"
-"keys-to-front-door/\">unauthorized people can remotely control it</a>."
+"keys-to-front-door/\"> unauthorized people can remotely control it</a>."
msgstr ""
"La “Smart Home” di Samsung ha un grosso problema di sicurezza; "
"<a href=\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-"
@@ -625,45 +649,30 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Nissan Leaf has a built-in cell phone modem which allows effectively "
-"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
-"nissan/\">to access its computers remotely and make changes in various "
-"settings</a>."
-msgstr ""
-"La Nissan Leaf ha un modem che permette a chiunque di <a href=\"https://www."
-"troyhunt.com/controlling-vehicle-features-of-nissan/\">accedere da remoto al "
-"computer di bordo e modificare alcune impostazioni</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"That's easy to do because the system has no authentication when accessed "
-"through the modem. However, even if it asked for authentication, you "
-"couldn't be confident that Nissan has no access. The software in the car is "
-"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
-"\">which means it demands blind faith from its users</a>."
-msgstr ""
-"Ciò è semplice da fare perché il sistema non richiede di autenticarsi
quando "
-"si accede via modem; ma anche se lo facesse, è impossibile essere certi che "
-"la Nissan non possa avere accesso dato che il software nella macchina è "
-"proprietario e quindi impone agli utenti di <a href=\"/philosophy/free-"
-"software-even-more-important.html\">fidarsi alla cieca</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Even if no one connects to the car remotely, the cell phone modem enables "
-"the phone company to track the car's movements all the time; it is possible "
-"to physically remove the cell phone modem though."
+"A bug in the iThings Messages app <a href=\"https://theintercept."
+"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
+"a malicious web site to extract all the user's messaging history</a>."
msgstr ""
-"Anche se nessuno si collega da remoto all'auto, la compagnia telefonica può "
-"seguire i movimenti dell'auto in tempo reale grazie alla presenza del modem; "
-"ma è possibile rimuovere il modem."
+"Un bug nell'applicazione di messaggistica dei vari iGadgets <a href="
+"\"https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-"
+"single-click/\">permetteva a un sito malintenzionato di estrarre tutta la "
+"storia dei messaggi dell'utente</a>."
#. type: Content of: <ul><li><p>
+# | Malware {+was+} found on <a
+# |
href=\"http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html\">{+
+# | +}security cameras available through Amazon</a>.
+#, fuzzy
+#| msgid ""
+#| "Malware found on <a href=\"http://www.slate.com/blogs/"
+#| "future_tense/2016/04/11/"
+#| "security_cameras_sold_through_amazon_have_malware_according_to_security."
+#| "html\">security cameras available through Amazon</a>."
msgid ""
-"Malware found on <a href=\"http://www.slate.com/blogs/"
+"Malware was found on <a href=\"http://www.slate.com/blogs/"
"future_tense/2016/04/11/"
"security_cameras_sold_through_amazon_have_malware_according_to_security.html"
-"\">security cameras available through Amazon</a>."
+"\"> security cameras available through Amazon</a>."
msgstr ""
"È stato trovato malware in alcune <a href=\"http://www.slate.com/"
"blogs/future_tense/2016/04/11/"
@@ -682,21 +691,43 @@
"nella telecamera."
#. type: Content of: <ul><li><p>
-msgid ""
-"A bug in the iThings Messages app <a href=\"https://theintercept."
-"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
-"a malicious web site to extract all the user's messaging history</a>."
+# | Over 70 brands of network-connected surveillance cameras {+have+} <a
+# |
[-href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">have-]
+# |
{+href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">+}
+# | security bugs that allow anyone to watch through them</a>.
+#, fuzzy
+#| msgid ""
+#| "Over 70 brands of network-connected surveillance cameras <a href=\"http://"
+#| "www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
+#| "\">have security bugs that allow anyone to watch through them</a>."
+msgid ""
+"Over 70 brands of network-connected surveillance cameras have <a href="
+"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
+"html\"> security bugs that allow anyone to watch through them</a>."
msgstr ""
-"Un bug nell'applicazione di messaggistica dei vari iGadgets <a href="
-"\"https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-"
-"single-click/\">permetteva a un sito malintenzionato di estrarre tutta la "
-"storia dei messaggi dell'utente</a>."
+"Videocamere di sorveglianza connesse in rete prodotte da oltre 70 marche <a "
+"href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-"
+"of.html\">hanno problemi di sicurezza che permettono a tutti di vedere le "
+"immagini</a>."
#. type: Content of: <ul><li><p>
+# | Many proprietary payment apps <a
+# |
href=\"http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data\">[-
+# | -]transmit personal data in an insecure way</a>. However, the worse aspect
+# | of these apps is that <a
+# | href=\"/philosophy/surveillance-vs-democracy.html\">payment is not
+# | anonymous</a>.
+#, fuzzy
+#| msgid ""
+#| "Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
+#| "articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
+#| "securing-user-data\"> transmit personal data in an insecure way</a>. "
+#| "However, the worse aspect of these apps is that <a href=\"/philosophy/"
+#| "surveillance-vs-democracy.html\">payment is not anonymous</a>."
msgid ""
"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
-"user-data\"> transmit personal data in an insecure way</a>. However, the "
+"user-data\">transmit personal data in an insecure way</a>. However, the "
"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
"democracy.html\">payment is not anonymous</a>."
msgstr ""
@@ -708,9 +739,66 @@
#. type: Content of: <ul><li><p>
msgid ""
-"FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-security/"
-"latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-"
-"trackers/\"> have a Bluetooth vulnerability</a> that allows attackers to "
+"The Nissan Leaf has a built-in cell phone modem which allows effectively "
+"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
+"nissan/\">to access its computers remotely and make changes in various "
+"settings</a>."
+msgstr ""
+"La Nissan Leaf ha un modem che permette a chiunque di <a href=\"https://www."
+"troyhunt.com/controlling-vehicle-features-of-nissan/\">accedere da remoto al "
+"computer di bordo e modificare alcune impostazioni</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"That's easy to do because the system has no authentication when accessed "
+"through the modem. However, even if it asked for authentication, you "
+"couldn't be confident that Nissan has no access. The software in the car is "
+"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
+"\">which means it demands blind faith from its users</a>."
+msgstr ""
+"Ciò è semplice da fare perché il sistema non richiede di autenticarsi
quando "
+"si accede via modem; ma anche se lo facesse, è impossibile essere certi che "
+"la Nissan non possa avere accesso dato che il software nella macchina è "
+"proprietario e quindi impone agli utenti di <a href=\"/philosophy/free-"
+"software-even-more-important.html\">fidarsi alla cieca</a>."
+
+#. type: Content of: <ul><li><p>
+# | Even if no one connects to the car remotely, the cell phone modem enables
+# | the phone company to track the car's movements all the time; it is
+# | possible to physically remove the cell phone modem{+,+} though.
+#, fuzzy
+#| msgid ""
+#| "Even if no one connects to the car remotely, the cell phone modem enables "
+#| "the phone company to track the car's movements all the time; it is "
+#| "possible to physically remove the cell phone modem though."
+msgid ""
+"Even if no one connects to the car remotely, the cell phone modem enables "
+"the phone company to track the car's movements all the time; it is possible "
+"to physically remove the cell phone modem, though."
+msgstr ""
+"Anche se nessuno si collega da remoto all'auto, la compagnia telefonica può "
+"seguire i movimenti dell'auto in tempo reale grazie alla presenza del modem; "
+"ma è possibile rimuovere il modem."
+
+#. type: Content of: <ul><li><p>
+# | FitBit fitness trackers [-<a
+# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">-]
+# | have a {+<a
+# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">+}
+# | Bluetooth vulnerability</a> that allows attackers to send malware to the
+# | devices, which can subsequently spread to computers and other FitBit
+# | trackers that interact with them.
+#, fuzzy
+#| msgid ""
+#| "FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-"
+#| "security/latest-security-news/10-second-hack-delivers-first-ever-malware-"
+#| "to-fitness-trackers/\"> have a Bluetooth vulnerability</a> that allows "
+#| "attackers to send malware to the devices, which can subsequently spread "
+#| "to computers and other FitBit trackers that interact with them."
+msgid ""
+"FitBit fitness trackers have a <a href=\"http://www.tripwire.com/state-of-"
+"security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-"
+"fitness-trackers/\"> Bluetooth vulnerability</a> that allows attackers to "
"send malware to the devices, which can subsequently spread to computers and "
"other FitBit trackers that interact with them."
msgstr ""
@@ -726,8 +814,8 @@
# | proprietary firmware so you can't trust it. Western Digital's “My
# | Passport” drives <a
# |
[-href=\"https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">have-]
-# |
{+href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">have+}
-# | a back door</a>.
+# |
{+href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">
+# | have+} a back door</a>.
#, fuzzy
#| msgid ""
#| "“Self-encrypting” disk drives do the encryption with "
@@ -739,8 +827,8 @@
"“Self-encrypting” disk drives do the encryption with proprietary "
"firmware so you can't trust it. Western Digital's “My Passport” "
"drives <a href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-"
-"popular-self-encrypting-hard-drives-have-really-bad-encryption\">have a back "
-"door</a>."
+"popular-self-encrypting-hard-drives-have-really-bad-encryption\"> have a "
+"back door</a>."
msgstr ""
"Le funzioni di “cifratura nativa” dei dischi usano firmware "
"proprietario per cifrare, e sono pertanto inaffidabili. I dischi “My "
@@ -750,18 +838,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
-"door for 4 years</a>, which could be exploited by attackers to gain root "
-"privileges."
-msgstr ""
-"Mac OS X ha avuto per 4 anni una <a href=\"https://truesecdev.wordpress."
-"com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/\"> "
-"backdoor locale</a> intenzionale, che gli utenti potevano sfruttare per "
-"ottenere privilegi di amministratore."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
@@ -774,10 +850,22 @@
"un camion con un semplice SMS."
#. type: Content of: <ul><li><p>
+# | Crackers were able to <a
+# |
href=\"http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">{+
+# | +}take remote control of the Jeep</a> “connected car”. {+They
+# | could track the car, start or stop the engine, and activate or deactivate
+# | the brakes, and more.+}
+#, fuzzy
+#| msgid ""
+#| "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
+#| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"
+#| "\">take remote control of the Jeep</a> “connected car”."
msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
-"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take "
-"remote control of the Jeep</a> “connected car”."
+"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> take "
+"remote control of the Jeep</a> “connected car”. They could track "
+"the car, start or stop the engine, and activate or deactivate the brakes, "
+"and more."
msgstr ""
"Alcuni cracker sono riusciti a <a href=\"http://arstechnica.com/"
"security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-"
@@ -785,14 +873,6 @@
"Jeep."
#. type: Content of: <ul><li><p>
-msgid ""
-"They could track the car, start or stop the engine, and activate or "
-"deactivate the brakes, and more."
-msgstr ""
-"Hanno dimostrato di essere in grado di conoscere la posizione dell'auto, di "
-"avviare o fermare il motore, di attivare e disattivare i freni e altro."
-
-#. type: Content of: <ul><li><p>
msgid "I expect that Chrysler and the NSA can do this too."
msgstr "Si può ipotizzare che anche Chrysler e la NSA possano fare lo stesso."
@@ -805,6 +885,56 @@
"cellulare, è opportuno considerare se disattivarlo."
#. type: Content of: <ul><li><p>
+# | Due to bad security in a drug pump, crackers could use it to <a
+# |
href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/\">{+
+# | +}kill patients</a>.
+#, fuzzy
+#| msgid ""
+#| "Due to bad security in a drug pump, crackers could use it to <a href="
+#| "\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
+#| "pumps/\">kill patients</a>."
+msgid ""
+"Due to bad security in a drug pump, crackers could use it to <a href="
+"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
+"pumps/\"> kill patients</a>."
+msgstr ""
+"I criminali informatici potrebbero sfruttare problemi di sicurezza in un "
+"erogatore di farmaci per <a href=\"http://www.wired.com/2015/06/hackers-can-"
+"send-fatal-doses-hospital-drug-pumps/\">uccidere pazienti</a>."
+
+#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html\">
+# | Many smartphone apps use insecure authentication methods when storing your
+# | personal data on remote [-servers.</a>-] {+servers</a>.+} This leaves
+# | personal information like email addresses, passwords, and health
+# | information vulnerable. Because many of these apps are proprietary it
+# | makes it hard to impossible to know which apps are at risk.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-"
+#| "millions-users.html\"> Many smartphone apps use insecure authentication "
+#| "methods when storing your personal data on remote servers.</a> This "
+#| "leaves personal information like email addresses, passwords, and health "
+#| "information vulnerable. Because many of these apps are proprietary it "
+#| "makes it hard to impossible to know which apps are at risk."
+msgid ""
+"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
+"users.html\"> Many smartphone apps use insecure authentication methods when "
+"storing your personal data on remote servers</a>. This leaves personal "
+"information like email addresses, passwords, and health information "
+"vulnerable. Because many of these apps are proprietary it makes it hard to "
+"impossible to know which apps are at risk."
+msgstr ""
+"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
+"users.html\"> Molte applicazioni per smartphone usano metodi di "
+"autenticazione insicuri</a> quando memorizzano i dati personali dell'utente "
+"su server remoti rendendo così vulnerabili informazioni come indirizzi e-"
+"mail, password e informazioni sullo stato di salute. Dato che queste "
+"applicazioni sono proprietarie è impossibile sapere di preciso quali siano a
"
+"rischio."
+
+#. type: Content of: <ul><li><p>
msgid ""
"Hospira infusion pumps, which are used to administer drugs to a patient, "
"were rated “<a href=\"https://securityledger.com/2015/05/researcher-"
@@ -827,44 +957,67 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Due to bad security in a drug pump, crackers could use it to <a href="
-"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
-"pumps/\">kill patients</a>."
+"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
+"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
+"door for 4 years</a>, which could be exploited by attackers to gain root "
+"privileges."
msgstr ""
-"I criminali informatici potrebbero sfruttare problemi di sicurezza in un "
-"erogatore di farmaci per <a href=\"http://www.wired.com/2015/06/hackers-can-"
-"send-fatal-doses-hospital-drug-pumps/\">uccidere pazienti</a>."
+"Mac OS X ha avuto per 4 anni una <a href=\"https://truesecdev.wordpress."
+"com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/\"> "
+"backdoor locale</a> intenzionale, che gli utenti potevano sfruttare per "
+"ottenere privilegi di amministratore."
+
+#. type: Content of: <ul><li><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "An app to prevent “identity theft” (access to personal data) "
+#| "by storing users' data on a special server <a href=\"http://arstechnica."
+#| "com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-"
+#| "over-concerns-that-app-isnt-safe/\">was deactivated by its developer</a> "
+#| "which had discovered a security flaw."
+msgid ""
+"An app to prevent “identity theft” (access to personal data) by "
+"storing users' data on a special server <a href=\"http://arstechnica.com/"
+"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
+"concerns-that-app-isnt-safe/\">was deactivated by its developer</a> which "
+"had discovered a security flaw."
+msgstr ""
+"Un'applicazione che per evitare il “furto di identità ” (accesso "
+"a dati personali) caricava i dati degli utenti su un server speciale <a href="
+"\"http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-"
+"deletes-user-data-over-concerns-that-app-isnt-safe/\">è stata disattivata "
+"dal suo sviluppatore</a> dopo aver scoperto una falla di sicurezza."
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
-"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
-"phones, including iPhones, Android, and BlackBerry</a>. While there is not "
-"much detail here, it seems that this does not operate via the universal back "
-"door that we know nearly all portable phones have. It may involve "
-"exploiting various bugs. There are <a href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> lots "
-"of bugs in the phones' radio software</a>."
+"That developer seems to be conscientious about protecting personal data from "
+"third parties in general, but it can't protect that data from the state. "
+"Quite the contrary: confiding your data to someone else's server, if not "
+"first encrypted by you with free software, undermines your rights."
msgstr ""
-"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
-"spy-on-smart-phone-data-a-920971.html\">La NSA può intercettare dati in vari
"
-"smartphone, tra cui iPhone, Android e BlackBerry</a>. Sebbene l'articolo non "
-"sia dettagliato a sufficienza, pare che questo non sia compiuto tramite la "
-"ben nota backdoor universale presente in tutti i telefoni cellulari. "
-"Potrebbe comportare lo sfruttamento di vari bug. Ci sono <a href=\"http://"
-"www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\">molti bug nei "
-"programmi di radiocomunicazione dei telefoni</a>."
+"Quello sviluppatore sembra essere scrupoloso circa la protezione di dati "
+"personali da terze parti in generale, ma non può proteggere quei dati dal "
+"governo. Anzi, il contrario: comunicare i propri dati al server di qualcun "
+"altro senza prima usare del software libero per crittarli mina i propri "
+"diritti."
#. type: Content of: <ul><li><p>
+# | Lots of <a
+# | href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/\">{+
+# | +}hospital equipment has lousy security</a>, and it can be fatal.
+#, fuzzy
+#| msgid ""
+#| "Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-"
+#| "vulnerable/\">hospital equipment has lousy security</a>, and it can be "
+#| "fatal."
msgid ""
-"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
-"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
-"intrusion."
+"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
+"\"> hospital equipment has lousy security</a>, and it can be fatal."
msgstr ""
-"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
-"hack/\">Le “Smart home” (case intelligenti)</a> sono dimostrate "
-"essere estremamente vulnerabili all'effrazione."
+"Molte <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
+"\">attrezzature ospedaliere hanno pessima sicurezza</a>, mettendo a rischio "
+"le vite dei pazienti."
#. type: Content of: <ul><li><p>
msgid ""
@@ -878,80 +1031,49 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\"> The FTC punished a company for making "
-"webcams with bad security so that it was easy for anyone to watch them</a>."
+"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
+"have modifiable software</a>, which makes them vulnerable to viruses."
msgstr ""
-"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\">La FTC (Federal Trade Commission, "
-"l'agenzia di stato americana per la tutela dei consumatori) ha punito una "
-"società per aver creato webcam dalla sicurezza così scarsa da permettere a "
-"chiunque di usarle per spiare</a>."
+"<a href=\"http://www.bunniestudios.com/blog/?p=3554\">Alcune memorie flash "
+"(come chiavette USB) contengono software modificabile</a> che le rende "
+"vulnerabile ai virus."
#. type: Content of: <ul><li><p>
+# | We don't call this a “back door” because it is normal that you
+# | can install a new system in a computer{+,+} given physical access to it.
+# | However, memory sticks and cards should not be modifiable in this way.
+#, fuzzy
+#| msgid ""
+#| "We don't call this a “back door” because it is normal that "
+#| "you can install a new system in a computer given physical access to it. "
+#| "However, memory sticks and cards should not be modifiable in this way."
msgid ""
-"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\"> It is possible to take control "
-"of some car computers through malware in music files</a>. Also <a href="
-"\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">by radio</"
-"a>. Here is <a href=\"http://www.autosec.org/faq.html\">more information</"
-"a>."
+"We don't call this a “back door” because it is normal that you "
+"can install a new system in a computer, given physical access to it. "
+"However, memory sticks and cards should not be modifiable in this way."
msgstr ""
-"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\">Ã possibile prendere il controllo
"
-"dei computer di bordo di alcune automobili inserendo malware all'interno di "
-"file musicali</a>. O anche <a href=\"http://www.nytimes.com/2011/03/10/"
-"business/10hack.html?_r=0\">via radio</a>. <a href=\"http://www.autosec.org/"
-"faq.html\">Ulteriori informazioni</a>."
+"Non chiamiamo questa una “backdoor” perché è normale che si "
+"possa installare un altro sistema operativo in un computer se si ha accesso "
+"fisico a questo. Comunque, chiavette e schede di memoria non dovrebbero "
+"poter essere modificate in questo modo."
#. type: Content of: <ul><li><p>
# | <a
-# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">
-# | It is possible to kill people by taking control of medical implants by
-# | radio</a>. Here is <a
-# | href=\"http://www.bbc.co.uk/news/technology-17631838\">more
-# | information</a>. And <a
-# |
[-href=\"http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">here</a>.-]
-# | {+href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive.co
-# | m/2013/02/broken-hearts-how-plausible-was.html\">here</a>.+}
+# |
href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/\">
+# | Point-of-sale terminals running Windows were taken [-over-] {+over</a>+}
+# | and turned into a botnet for the purpose of collecting customers' credit
+# | card [-numbers</a>.-] {+numbers.+}
#, fuzzy
#| msgid ""
-#| "<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-"
-#| "jack-dies-days-before-scheduled-black-hat-appearance/\"> It is possible "
-#| "to kill people by taking control of medical implants by radio</a>. Here "
-#| "is <a href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
-#| "information</a>. And <a href=\"http://blog.ioactive.com/2013/02/broken-"
-#| "hearts-how-plausible-was.html\">here</a>."
-msgid ""
-"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
-"dies-days-before-scheduled-black-hat-appearance/\"> It is possible to kill "
-"people by taking control of medical implants by radio</a>. Here is <a href="
-"\"http://www.bbc.co.uk/news/technology-17631838\">more information</a>. And "
-"<a href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive."
-"com/2013/02/broken-hearts-how-plausible-was.html\">here</a>."
-msgstr ""
-"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
-"dies-days-before-scheduled-black-hat-appearance/\">Ã possibile uccidere la "
-"gente che fa uso di dispositivi medici prendendone il controllo via radio</"
-"a>. Per ulteriori informazioni, seguire <a href=\"http://www.bbc.co.uk/news/"
-"technology-17631838\">questo link</a> o <a href=\"http://blog.ioactive."
-"com/2013/02/broken-hearts-how-plausible-was.html\">quest'altro</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
-"\">hospital equipment has lousy security</a>, and it can be fatal."
-msgstr ""
-"Molte <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
-"\">attrezzature ospedaliere hanno pessima sicurezza</a>, mettendo a rischio "
-"le vite dei pazienti."
-
-#. type: Content of: <ul><li><p>
+#| "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
+#| "of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
+#| "running Windows were taken over and turned into a botnet for the purpose "
+#| "of collecting customers' credit card numbers</a>."
msgid ""
"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
"age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
-"running Windows were taken over and turned into a botnet for the purpose of "
-"collecting customers' credit card numbers</a>."
+"running Windows were taken over</a> and turned into a botnet for the purpose "
+"of collecting customers' credit card numbers."
msgstr ""
"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
"age-with-first-known-point-of-sale-botnet/\">Alcuni punti di vendita basati "
@@ -959,56 +1081,95 @@
"raccolta di numeri di carta di credito dei clienti</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"An app to prevent “identity theft” (access to personal data) by "
-"storing users' data on a special server <a href=\"http://arstechnica.com/"
-"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
-"concerns-that-app-isnt-safe/\">was deactivated by its developer</a> which "
-"had discovered a security flaw."
-msgstr ""
-"Un'applicazione che per evitare il “furto di identità ” (accesso "
-"a dati personali) caricava i dati degli utenti su un server speciale <a href="
-"\"http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-"
-"deletes-user-data-over-concerns-that-app-isnt-safe/\">è stata disattivata "
-"dal suo sviluppatore</a> dopo aver scoperto una falla di sicurezza."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"That developer seems to be conscientious about protecting personal data from "
-"third parties in general, but it can't protect that data from the state. "
-"Quite the contrary: confiding your data to someone else's server, if not "
-"first encrypted by you with free software, undermines your rights."
+# | <a
+# |
[-href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">-]
+# |
{+href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">+}
+# | The NSA can tap data in smart phones, including iPhones, Android, and
+# | BlackBerry</a>. While there is not much detail here, it seems that this
+# | does not operate via the universal back door that we know nearly all
+# | portable phones have. It may involve exploiting various bugs. There are
+# | <a
+# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# | lots of bugs in the phones' radio software</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#| "smart phones, including iPhones, Android, and BlackBerry</a>. While "
+#| "there is not much detail here, it seems that this does not operate via "
+#| "the universal back door that we know nearly all portable phones have. It "
+#| "may involve exploiting various bugs. There are <a href=\"http://www."
+#| "osnews.com/story/27416/"
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs "
+#| "in the phones' radio software</a>."
+msgid ""
+"<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/"
+"international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971."
+"html\"> The NSA can tap data in smart phones, including iPhones, Android, "
+"and BlackBerry</a>. While there is not much detail here, it seems that this "
+"does not operate via the universal back door that we know nearly all "
+"portable phones have. It may involve exploiting various bugs. There are <a "
+"href=\"http://www.osnews.com/story/27416/"
+"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
+"the phones' radio software</a>."
msgstr ""
-"Quello sviluppatore sembra essere scrupoloso circa la protezione di dati "
-"personali da terze parti in generale, ma non può proteggere quei dati dal "
-"governo. Anzi, il contrario: comunicare i propri dati al server di qualcun "
-"altro senza prima usare del software libero per crittarli mina i propri "
-"diritti."
+"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
+"spy-on-smart-phone-data-a-920971.html\">La NSA può intercettare dati in vari
"
+"smartphone, tra cui iPhone, Android e BlackBerry</a>. Sebbene l'articolo non "
+"sia dettagliato a sufficienza, pare che questo non sia compiuto tramite la "
+"ben nota backdoor universale presente in tutti i telefoni cellulari. "
+"Potrebbe comportare lo sfruttamento di vari bug. Ci sono <a href=\"http://"
+"www.osnews.com/story/27416/"
+"The_second_operating_system_hiding_in_every_mobile_phone\">molti bug nei "
+"programmi di radiocomunicazione dei telefoni</a>."
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
-"have modifiable software</a>, which makes them vulnerable to viruses."
+"<a href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-"
+"codes-security\">The NSA has put back doors into nonfree encryption "
+"software</a>. We don't know which ones they are, but we can be sure they "
+"include some widely used systems. This reinforces the point that you can "
+"never trust the security of nonfree software."
msgstr ""
-"<a href=\"http://www.bunniestudios.com/blog/?p=3554\">Alcune memorie flash "
-"(come chiavette USB) contengono software modificabile</a> che le rende "
-"vulnerabile ai virus."
#. type: Content of: <ul><li><p>
-msgid ""
-"We don't call this a “back door” because it is normal that you "
-"can install a new system in a computer given physical access to it. "
-"However, memory sticks and cards should not be modifiable in this way."
+# | [-<a
+# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">-]The
+# | FTC punished a company for making webcams with {+<a
+# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">+}
+# | bad security so that it was easy for anyone to watch {+through+} them</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-"
+#| "flaw-put-users-lives-on-display.html\"> The FTC punished a company for "
+#| "making webcams with bad security so that it was easy for anyone to watch "
+#| "them</a>."
+msgid ""
+"The FTC punished a company for making webcams with <a href=\"http://www."
+"nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-"
+"display.html\"> bad security so that it was easy for anyone to watch through "
+"them</a>."
msgstr ""
-"Non chiamiamo questa una “backdoor” perché è normale che si "
-"possa installare un altro sistema operativo in un computer se si ha accesso "
-"fisico a questo. Comunque, chiavette e schede di memoria non dovrebbero "
-"poter essere modificate in questo modo."
+"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
+"put-users-lives-on-display.html\">La FTC (Federal Trade Commission, "
+"l'agenzia di stato americana per la tutela dei consumatori) ha punito una "
+"società per aver creato webcam dalla sicurezza così scarsa da permettere a "
+"chiunque di usarle per spiare</a>."
#. type: Content of: <ul><li><p>
+# | <a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable
+# | nonfree software in disk drives can be written by a nonfree
+# | [-program.</a>-] {+program</a>.+} This makes any system vulnerable to
+# | persistent attacks that normal forensics won't detect.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
+#| "nonfree software in disk drives can be written by a nonfree program.</a> "
+#| "This makes any system vulnerable to persistent attacks that normal "
+#| "forensics won't detect."
msgid ""
"<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
-"nonfree software in disk drives can be written by a nonfree program.</a> "
+"nonfree software in disk drives can be written by a nonfree program</a>. "
"This makes any system vulnerable to persistent attacks that normal forensics "
"won't detect."
msgstr ""
@@ -1018,21 +1179,97 @@
"attacchi persistenti e non individuabili tramite i normali metodi forensi."
#. type: Content of: <ul><li><p>
+# | [-<a
+# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">-]It
+# | is possible to {+<a
+# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">+}
+# | kill people by taking control of medical implants by radio</a>. [-Here
+# | is-] {+More information in+} <a
+# | [-href=\"http://www.bbc.co.uk/news/technology-17631838\">more
+# | information</a>. And-]
+# | {+href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a>
+# | and+} <a
+# |
[-href=\"http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">here</a>.-]
+# |
{+href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">
+# | IOActive Labs Research blog</a>.+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-"
+#| "jack-dies-days-before-scheduled-black-hat-appearance/\"> It is possible "
+#| "to kill people by taking control of medical implants by radio</a>. Here "
+#| "is <a href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
+#| "information</a>. And <a href=\"http://blog.ioactive.com/2013/02/broken-"
+#| "hearts-how-plausible-was.html\">here</a>."
msgid ""
-"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
-"users.html\"> Many smartphone apps use insecure authentication methods when "
-"storing your personal data on remote servers.</a> This leaves personal "
-"information like email addresses, passwords, and health information "
-"vulnerable. Because many of these apps are proprietary it makes it hard to "
-"impossible to know which apps are at risk."
+"It is possible to <a href=\"http://siliconangle.com/blog/2013/07/27/famed-"
+"hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\"> kill "
+"people by taking control of medical implants by radio</a>. More information "
+"in <a href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a> "
+"and <a href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-"
+"was.html\"> IOActive Labs Research blog</a>."
msgstr ""
-"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
-"users.html\"> Molte applicazioni per smartphone usano metodi di "
-"autenticazione insicuri</a> quando memorizzano i dati personali dell'utente "
-"su server remoti rendendo così vulnerabili informazioni come indirizzi e-"
-"mail, password e informazioni sullo stato di salute. Dato che queste "
-"applicazioni sono proprietarie è impossibile sapere di preciso quali siano a
"
-"rischio."
+"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
+"dies-days-before-scheduled-black-hat-appearance/\">Ã possibile uccidere la "
+"gente che fa uso di dispositivi medici prendendone il controllo via radio</"
+"a>. Per ulteriori informazioni, seguire <a href=\"http://www.bbc.co.uk/news/"
+"technology-17631838\">questo link</a> o <a href=\"http://blog.ioactive."
+"com/2013/02/broken-hearts-how-plausible-was.html\">quest'altro</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
+"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
+"intrusion."
+msgstr ""
+"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
+"hack/\">Le “Smart home” (case intelligenti)</a> sono dimostrate "
+"essere estremamente vulnerabili all'effrazione."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
+"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
+"microphone-cameras.html\"> Crackers found a way to break security on a "
+"“smart” TV</a> and use its camera to watch the people who are "
+"watching TV."
+msgstr ""
+"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
+"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
+"microphone-cameras.html\"> I \"cracker\" hanno trovato un modo di penetrare "
+"in una “smart” TV</a> e usare la sua telecamera per guardare le "
+"persone che stanno guardando la TV."
+
+#. type: Content of: <ul><li><p>
+# | [-<a
+# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">-]It
+# | is possible to take control of some car computers through {+<a
+# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">+}
+# | malware in music files</a>. Also <a
+# | href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">{+
+# | +}by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html\">more
+# | information</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+#| "hacking_music_can_take_control_your_car/\"> It is possible to take "
+#| "control of some car computers through malware in music files</a>. Also "
+#| "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+#| "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+#| "\">more information</a>."
+msgid ""
+"It is possible to take control of some car computers through <a href="
+"\"http://www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\"> malware in music files</a>. "
+"Also <a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+"_r=0\"> by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+"\">more information</a>."
+msgstr ""
+"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\">Ã possibile prendere il controllo
"
+"dei computer di bordo di alcune automobili inserendo malware all'interno di "
+"file musicali</a>. O anche <a href=\"http://www.nytimes.com/2011/03/10/"
+"business/10hack.html?_r=0\">via radio</a>. <a href=\"http://www.autosec.org/"
+"faq.html\">Ulteriori informazioni</a>."
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -1123,6 +1360,13 @@
msgstr "Ultimo aggiornamento:"
#~ msgid ""
+#~ "They could track the car, start or stop the engine, and activate or "
+#~ "deactivate the brakes, and more."
+#~ msgstr ""
+#~ "Hanno dimostrato di essere in grado di conoscere la posizione dell'auto, "
+#~ "di avviare o fermare il motore, di attivare e disattivare i freni e altro."
+
+#~ msgid ""
#~ "Copyright © 2013, 2015, 2016, 2017 Free Software Foundation, Inc."
#~ msgstr ""
#~ "Copyright © 2013, 2015, 2016, 2017 Free Software Foundation, Inc."
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-insecurity.ja-diff.html 18 Sep 2018 17:27:39 -0000 1.30
+++ proprietary-insecurity.ja-diff.html 26 Sep 2018 14:28:11 -0000 1.31
@@ -11,7 +11,12 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.79</strong></del></span> <span
class="inserted"><ins><em>1.84</em></ins></span> -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.79</strong></del></span> <span
class="inserted"><ins><em>1.84 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</em></ins></span>
+-->
<title>Proprietary Insecurity
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-insecurity.translist"
-->
@@ -37,263 +42,332 @@
examples below show that proprietary software isn't perfect, and
is often quite sloppy.</p>
-<p>It</em></ins></span> would be <span
class="removed"><del><strong>incorrect</strong></del></span> <span
class="inserted"><ins><em>equally incorrect to compare proprietary software with
+<p>It</em></ins></span> would be <span
class="inserted"><ins><em>equally</em></ins></span> incorrect to compare
proprietary software with
a fictitious idea of free software as perfect. Every nontrivial
program has bugs, and any system, free or proprietary, may have
-security flaws. To err is human, and not culpable. But proprietary
+security
+<span class="removed"><del><strong>holes. That in
itself</strong></del></span> <span class="inserted"><ins><em>flaws. To
err</em></ins></span> is <span class="inserted"><ins><em>human,
and</em></ins></span> not culpable. But proprietary
software developers frequently disregard gaping holes, or even
-introduce them deliberately. In any case, they keep users
-<em>helpless to fix any security problems that arise</em>.
Keeping the
-users helpless is what's culpable about proprietary software.</p>
-
-<p>If you know of an example that ought to be in this page but isn't
-here, please write
-to <a href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.</p>
+introduce them
+<span class="removed"><del><strong>deliberately, and
<em>the</strong></del></span> <span
class="inserted"><ins><em>deliberately. In any case, they
keep</em></ins></span> users <span class="removed"><del><strong>are
helpless</strong></del></span>
+<span class="inserted"><ins><em><em>helpless</em></ins></span> to fix
<span class="removed"><del><strong>them</em>.</p>
<ul>
<li>
- <p>Some Samsung phones
- randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
- photos to people in the owner's contact list</a>.</p>
+<p>4G LTE phone networks are drastically insecure. They
can</strong></del></span> <span class="inserted"><ins><em>any security problems
that arise</em>. Keeping the
+users helpless is what's culpable about proprietary software.</p>
+
+<p>If you know of an example that ought to</em></ins></span> be
+<span class="removed"><del><strong><a
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
+taken
+over by third parties and used for man-in-the-middle
attacks</a>.</p>
</li>
+
<li>
- <p>One of the dangers of the “internet of stings” is that,
if
- you lose your internet service, you also <a
-href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control of your house and appliances</a>.</p>
- <p>For your safety, don't use any appliance with a connection to the
real
- internet.</p>
+<p>Due</strong></del></span> <span class="inserted"><ins><em>in this
page but isn't
+here, please write</em></ins></span>
+to <span class="removed"><del><strong>weak security,</strong></del></span>
<a <span
class="removed"><del><strong>href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
+is easy</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a></em></ins></span>
+to <span class="removed"><del><strong>open</strong></del></span> <span
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>doors</strong></del></span> <span
class="inserted"><ins><em>URL</em></ins></span> of <span
class="removed"><del><strong>100 million cars built by
Volkswagen</a>.</p>
</li>
+
<li>
- <p>Amazon recently invited consumers to be suckers and <a
-href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
- allow delivery staff to open their front doors</a>. Wouldn't you
know it,
- the system has a grave security flaw.</p>
+<p>Ransomware <a
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has
+been developed for</strong></del></span> a <span
class="removed"><del><strong>thermostat that uses proprietary
software</a>.</p>
</li>
+
<li>
- <p>Intel's intentional “management engine” back door has
<a
-href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
- unintended back doors</a> too.</p>
+<p>A</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two
+to present the specifics.</p>
+
+<ul class="blurbs">
+ <li id="M201809240">
+ <p>Researchers have discovered how to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands</em></ins></span> in
+<span class="removed"><del><strong>Internet Explorer</strong></del></span>
<span class="inserted"><ins><em>other audio</a>, so that people cannot
hear
+ them, but Alexa</em></ins></span> and <span
class="removed"><del><strong>Edge</a> allows an
attacker</strong></del></span> <span class="inserted"><ins><em>Siri
can.</p>
+ </li>
+
+ <li id="M201808120">
+ <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>retrieve
+Microsoft account credentials, if</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>user is tricked</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,
+ and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it</em></ins></span> into <span
class="removed"><del><strong>visiting</strong></del></span> a
+<span class="removed"><del><strong>malicious link.</p>
</li>
+
<li>
- <p>Bad security in some cars makes it possible
- to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
- remotely activate the airbags</a>.</p>
+<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
+WhatsApp messages</strong></del></span> <span
class="inserted"><ins><em>listening device</a> for them.</p>
+
+ <p>It was very difficult for them to do this. The job would be much
+ easier for Amazon. And if some government such as China or the US
+ told Amazon to do this, or cease to sell the product in that country,
+ do you think Amazon would have the moral fiber to say no?</p>
+
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not entirely deleted</a>.
They</strong></del></span> <span class="inserted"><ins><em>probably hackers
too, but please <a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
+ “hacking” to mean “breaking
security”</a>.</p>
+ </li>
+
+ <li id="M201807100">
+ <p>Siri, Alexa, and all the other voice-control
systems</em></ins></span> can be <span
class="removed"><del><strong>recovered</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
+ hijacked by programs that play commands</em></ins></span> in <span
class="removed"><del><strong>various ways.
+</p></strong></del></span> <span class="inserted"><ins><em>ultrasound
that humans
+ can't hear</a>.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>A vulnerability in Apple's Image I/O API allowed an attacker
to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201807020">
+ <p>Some Samsung phones randomly</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which uses this API</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
+ photos</em></ins></span> to <span class="removed"><del><strong>render a
+ certain kind of image file</a>.</p>
</li>
<li>
- <p>A “smart” intravenous pump designed for
- hospitals is connected to the internet. Naturally <a
-href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+<p>A bug</strong></del></span> <span
class="inserted"><ins><em>people</em></ins></span> in <span
class="removed"><del><strong>a proprietary ASN.1 library,</strong></del></span>
<span class="inserted"><ins><em>the owner's contact list</a>.</p>
+ </li>
+
+ <li id="M201712240">
+ <p>One of the dangers of the “internet of stings”
+ is that, if you lose your internet service, you also <a
+
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ lose control of your house and appliances</a>.</p>
+
+ <p>For your safety, don't use any appliance with a connection to the
+ real internet.</p>
+ </li>
+
+ <li id="M201711204">
+ <p>Intel's intentional “management engine” back door has
<a
+
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
+ unintended back doors</a> too.</p>
+ </li>
+
+ <li id="M201711200">
+ <p>Amazon recently invited consumers to be suckers and <a
+
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff to open their front doors</a>. Wouldn't you know
+ it, the system has a grave security flaw.</p>
+ </li>
+
+ <li id="M201709290">
+ <p>Bad security in some cars makes it possible to <a
+ href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
+ remotely activate the airbags</a>.</p>
+ </li>
+
+ <li id="M201709200">
+ <p>A “smart” intravenous pump
+ designed for hospitals is connected to the internet. Naturally <a
+
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
+
<p>Note that this article misuses the term <a
-href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
+
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
referring to crackers.</p>
-</li>
-<li>
- <p>The bad security in many Internet of Stings devices
- allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ </li>
+
+ <li id="M201708280">
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
to snoop on the people that use them</a>.</p>
+
<p>Don't be a sucker—reject all the stings.</p>
+
<p>It is unfortunate that the article uses the term <a
- href="/philosophy/words-to-avoid.html#Monetize">
- “monetize”</a>.</p>
-</li>
-<li>
- <p>Siri, Alexa, and all the other voice-control systems can be
- <a
-href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
- hijacked by programs that play commands in ultrasound that humans can't
- hear</a>.</p>
-</li>
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ </li>
-<li id="break-security-smarttv">
- <p><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a> and use its camera
- to watch the people who are watching TV.</p>
-</li>
-<li>
+ <li id="M201706201">
<p>Many models of Internet-connected cameras <a
href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
have backdoors</a>.</p>
- <p>That is a malicious functionality, but in addition it is a gross
- insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them to get into
- users' cameras</a>.</p>
-
-</li>
-
-<li>
- <p>
- Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
- pre-installed on 28 models of HP laptops logged the user's
- keystroke to a file in the filesystem. Any process with access to
- the filesystem or the MapViewOfFile API could gain access to the
- log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
- to modzero</a> the “information-leak via Covert Storage
- Channel enables malware authors to capture keystrokes without
- taking the risk of being classified as malicious task by AV
- heuristics”.
- </p>
-</li>
-<li>
-<p>The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p>
-</li>
-
-
-<li>
- <p>Exploits of bugs in Windows, which were developed by the NSA
- and then leaked by the Shadowbrokers group, are now being used to
- <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
- of Windows computers with ransomware</a>.
- </p>
-</li>
-
-<li id="intel-me-10-year-vulnerability">
- <p>Intel's CPU backdoor—the Intel Management Engine—had a
- <a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security
- vulnerability for 10 years</a>.</p>
-
- <p>The vulnerability allowed a cracker to access the computer's Intel
Active
- Management Technology
- (AMT) <a
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
+ <p>That is a malicious functionality, but in addition it
+ is a gross insecurity since anyone, including malicious crackers, <a
+
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
+ find those accounts and use them to get into users'
cameras</a>.</p>
+ </li>
+
+ <li id="M201706050">
+ <p id="intel-me-10-year-vulnerability">Intel's
+ CPU backdoor—the Intel Management Engine—had a <a
+
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
+ security vulnerability for 10 years</a>.</p>
+
+ <p>The vulnerability allowed a cracker to access
+ the computer's Intel Active Management Technology (AMT) <a
+
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
web interface with an empty password and gave administrative
- access</a> to access the computer's keyboard, mouse, monitor
- among other privileges.</p>
+ access</a> to access the computer's keyboard, mouse, monitor among
+ other privileges.</p>
<p>It does not help that in newer Intel processors, it is
impossible
to turn off the Intel Management Engine. Thus, even users who are
proactive about their security can do nothing to protect themselves
besides using machines that don't come with the backdoor.</p>
+ </li>
-</li>
+ <li id="M201705250">
+ <p>The proprietary code that runs pacemakers,
+ insulin pumps, and other medical devices is <a
+ href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
+ security faults</a>.</p>
+ </li>
+
+ <li id="M201705160">
+ <p>Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+ pre-installed on 28 models of HP laptops logged the user's keystroke
+ to a file in the filesystem. Any process with access to the filesystem
+ or the MapViewOfFile API could gain access to the log. Furthermore, <a
+
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
+ to modzero</a> the “information-leak via Covert Storage Channel
+ enables malware authors to capture keystrokes without taking the risk
+ of being classified as malicious task by AV heuristics”.</p>
+ </li>
-<li>
- <p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
+ <li id="M201705120">
+ <p>Exploits of bugs in Windows, which were developed by the NSA
+ and then leaked by the Shadowbrokers group, are now being used to <a
+
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
+ a great number of Windows computers with ransomware</a>.</p>
+ </li>
+
+ <li id="M201704050">
+ <p>Many Android devices <a
+
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because of a bug in
Broadcom's non-free firmware.</p>
-</li>
+ </li>
-<li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
<a
-href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
-connected</em></ins></span> to <span class="removed"><del><strong>compare
proprietary software</strong></del></span> <span class="inserted"><ins><em>the
Internet, its security is crap</a>.</p>
-
-<p>For example, a cracker can gain access to the dishwasher's
filesystem,
-infect it</em></ins></span> with <span class="inserted"><ins><em>malware, and
force the dishwasher to launch attacks on other
-devices in the network. Since these dishwashers are used in hospitals, such
-attacks could potentially put hundreds of lives at risk.</p>
+ <li id="M201703270">
+ <p>When Miele's Internet of
+ Stings hospital disinfectant dishwasher is <a
+
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected to the Internet, its security is crap</a>.</p>
+
+ <p>For example, a cracker can gain access to the dishwasher's
+ filesystem, infect it with malware, and force the dishwasher to launch
+ attacks on other devices in the network. Since these dishwashers are
+ used in hospitals, such attacks could potentially put hundreds of
+ lives at risk.</p>
+ </li>
+
+ <li id="M201702200">
+ <p>If you buy a used “smart”
+ car, house, TV, refrigerator, etc., usually <a
+
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+ previous owners can still remotely control it</a>.</p>
+ </li>
+
+ <li id="M201702170">
+ <p>The mobile apps for communicating <a
+
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
+ a smart but foolish car have very bad security</a>.</p>
+
+ <p>This is in addition to the fact that the car contains a cellular
+ modem that tells big brother all the time where it is. If you own
+ such a car, it would be wise to disconnect the modem so as to turn
+ off the tracking.</p>
+ </li>
+
+ <li id="M201701270">
+ <p>Samsung phones <a
+
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
+ a security hole that allows an SMS message to install
+ ransomware</a>.</p>
+ </li>
+
+ <li id="M201701130">
+ <p>WhatsApp has a feature that <a
+
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
+ has been described as a “back door”</a> because it would
+ enable governments to nullify its encryption.</p>
-</li>
-<li><p>WhatsApp has</em></ins></span> a
-<span class="removed"><del><strong>fictitious idea</strong></del></span> <span
class="inserted"><ins><em>feature that
- <a
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
- has been described as a “back door”</a>
- because it would enable governments to nullify its encryption.</p>
<p>The developers say that it wasn't intended as a back door, and that
- may well be true. But that leaves the crucial question</em></ins></span>
of <span class="removed"><del><strong>free software</strong></del></span> <span
class="inserted"><ins><em>whether it
- functions</em></ins></span> as <span class="removed"><del><strong>perfect.
Every nontrivial</strong></del></span> <span class="inserted"><ins><em>one.
Because the</em></ins></span> program
-<span class="removed"><del><strong>has bugs,</strong></del></span> <span
class="inserted"><ins><em>is nonfree, we cannot check by
- studying it.</p></li>
-
-<li>
-<p>The “smart” toys My Friend Cayla</em></ins></span> and
<span class="removed"><del><strong>any system, free or proprietary, may have
security
-holes. That in itself</strong></del></span> <span
class="inserted"><ins><em>i-Que can be
-<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
controlled with a mobile phone</a>; physical access</em></ins></span>
-is not <span class="removed"><del><strong>culpable. But proprietary software
-developers frequently disregard gaping holes, or</strong></del></span> <span
class="inserted"><ins><em>necessary. This would enable crackers to listen in on
a child's
-conversations, and</em></ins></span> even <span
class="removed"><del><strong>introduce them
-deliberately,</strong></del></span> <span class="inserted"><ins><em>speak into
the toys themselves.</p>
-
-<p>This means a burglar could speak into the toys</em></ins></span> and
<span class="removed"><del><strong><em>the users are
helpless</strong></del></span> <span class="inserted"><ins><em>ask the
child</em></ins></span> to <span class="removed"><del><strong>fix
them</em>.</p>
-
-<ul></strong></del></span>
-<span class="inserted"><ins><em>unlock the front door while Mommy's not
looking.</p>
-</li>
-
-<li>
-<p>The mobile apps for
-communicating <a
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
-a smart but foolish car have very bad security</a>.</p>
-
-<p>This is in addition to the fact that the car contains a cellular
-modem that tells big brother all the time where it is. If you own
-such a car, it would be wise to disconnect the modem so as to turn off
-the tracking.</p>
-</li>
-
-<li>
-<p>If you buy a used “smart” car, house, TV, refrigerator,
-etc.,
-usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
-previous owners can still remotely control it</a>.</p>
-</li>
-
-<li>
-<p>Samsung
-phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
-a security hole that allows an SMS message to install
-ransomware</a>.</p>
-</li></em></ins></span>
-
-<li>
-<p>4G LTE phone networks are drastically insecure. They can be
-<a
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
-taken
-over by third parties and used for man-in-the-middle
attacks</a>.</p>
-</li>
+ may well be true. But that leaves the crucial question of whether it
+ functions as one. Because the program is nonfree, we cannot check by
+ studying it.</p>
+ </li>
+
+ <li id="M201612061">
+ <p>The “smart” toys My Friend Cayla and i-Que can be
<a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
+ controlled with a mobile phone</a>; physical access is not
+ necessary. This would enable crackers to listen in on a child's
+ conversations, and even speak into the toys themselves.</p>
+
+ <p>This means a burglar could speak into the toys and ask the child
+ to unlock the front door while Mommy's not looking.</p>
+ </li>
+
+ <li id="M201610230">
+ <p>4G LTE phone networks are drastically insecure. They can be <a
+
href="https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
+ taken over by third parties and used for man-in-the-middle
+ attacks</a>.</p>
+ </li>
+
+ <li id="M201608110">
+ <p>Due to weak security, <a
+
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
+ is easy to open the doors of 100 million cars built by
+ Volkswagen</a>.</p>
+ </li>
+
+ <li id="M201608080">
+ <p>Ransomware <a
+
href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">
+ has been developed for a thermostat that uses proprietary
+ software</a>.</p>
+ </li>
+
+ <li id="M201608020">
+ <p>A <a
+
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
+ in Internet Explorer and Edge</a> allows an attacker to retrieve
+ Microsoft account credentials, if the user is tricked into visiting
+ a malicious link.</p>
+ </li>
-<li>
-<p>Due to weak security, <a
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
-is easy to open the doors of 100 million cars built by
Volkswagen</a>.</p>
-</li>
-
-<li>
-<p>Ransomware <a <span
class="removed"><del><strong>href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has</strong></del></span>
-<span
class="inserted"><ins><em>href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">
-has</em></ins></span> been developed for a thermostat that uses proprietary
software</a>.</p>
-</li>
-
-<li>
-<p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in
-Internet Explorer and Edge</a> allows an attacker to retrieve
-Microsoft account credentials, if the user is tricked into visiting a
-malicious link.</p>
-</li>
-
-<li>
-<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
-WhatsApp messages are not entirely deleted</a>. They can be recovered
-in various ways.
-</p>
-</li>
-
-<li>
-<p>A vulnerability in Apple's Image I/O API allowed an attacker to
-<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- <span class="removed"><del><strong>malacious</strong></del></span>
- <span class="inserted"><ins><em>malicious</em></ins></span> code from any
application which uses this API to render a
+ <li id="M201607290">
+ <p><a
+
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
+ WhatsApp messages are not entirely deleted</a>. They can be recovered
+ in various ways.</p>
+ </li>
+
+ <li id="M201607220">
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
+
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malicious code from any application which uses this API to render a
certain kind of image file</a>.</p>
-</li>
-<li>
-<p>A bug in a proprietary ASN.1 library, used in cell phone towers as
-well as cell phones and
-routers, <a
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
-taking control of those systems</a>.</p>
-</li>
+ </li>
-<li>
-<p>Antivirus programs have so many errors
- that <a
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
+ <li id="M201607190">
+ <p>A bug in a proprietary ASN.1 library,</em></ins></span> used
+ in cell phone towers as well as cell phones and routers, <a
+
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
+ taking control of those systems</a>.</p>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606290"></em></ins></span>
+ <p>Antivirus programs have so many errors that <a
+
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
may make security worse</a>.</p>
-<p>GNU/Linux does not need antivirus software.</p>
-</li>
-<li>
+ <p>GNU/Linux does not need antivirus software.</p>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>Over 70 brands of network-connected surveillance
cameras <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">have
security bugs that allow anyone to watch through them</a>.</p>
@@ -301,35 +375,74 @@
<li>
<p>
-Samsung's “Smart Home” has a big security
-hole; <a
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">unauthorized
-people can remotely control it</a>.</p>
-
-<p>Samsung claims that this is an “open” platform so the
-problem is partly the fault of app developers. That is clearly true if
-the apps are proprietary software.</p>
-
-<p>Anything whose name is “Smart” is most likely going to
-screw you.</p>
-</li>
-
-<li>
-<p>
-The Nissan Leaf has a built-in cell phone modem which allows
-effectively
-anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
-access its computers remotely and make changes in various
-settings</a>.</p>
+Samsung's</strong></del></span>
-<p>That's easy to do because the system has no authentication when
-accessed through the modem. However, even if it asked for
-authentication, you couldn't be confident that Nissan has no
-access. The software in the car is
-proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
-means it demands blind faith from its users</a>.</p>
+ <span class="inserted"><ins><em><li id="M201605020">
+ <p>Samsung's</em></ins></span> “Smart Home” has a big
security hole; <a <span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">unauthorized</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+ unauthorized</em></ins></span> people can remotely control
it</a>.</p>
+
+ <p>Samsung claims that this is an “open” platform so the
+ problem is partly the fault of app developers. That is clearly true
+ if the apps are proprietary software.</p>
+
+ <p>Anything whose name is “Smart” is most likely going
+ to screw you.</p>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>
+The</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201604120">
+ <p>A bug in the iThings Messages app <a
+
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
+ a malicious web site to extract all the user's messaging
+ history</a>.</p>
+ </li>
+
+ <li id="M201604110">
+ <p>Malware was found on <a
+
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+ security cameras available through Amazon</a>.</p>
+
+ <p>A camera that records locally on physical media, and has no
network
+ connection, does not threaten people with surveillance—neither
+ by watching people through the camera, nor through malware in the
+ camera.</p>
+ </li>
+
+ <li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
+ </li>
+
+ <li id="M201603100">
+ <p>Many proprietary payment apps <a
+
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit
+ personal data in an insecure way</a>. However,
+ the worse aspect of these apps is that <a
+ href="/philosophy/surveillance-vs-democracy.html">payment is not
+ anonymous</a>.</p>
+ </li>
+
+ <li id="M201602240">
+ <p id="nissan-modem">The</em></ins></span> Nissan Leaf has a built-in
+ cell phone modem which allows effectively anyone <a
+
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in the car is proprietary, <a
+ href="/philosophy/free-software-even-more-important.html">which means
+ it demands blind faith from its users</a>.</p>
-<p>Even if no one connects to the car remotely, the cell phone modem
-enables the phone company to track the car's movements all the time;
+ <p>Even if no one connects to the car remotely, the cell phone modem
+ enables the phone company to <span class="removed"><del><strong>track the
car's movements all the time;
it is possible to physically remove the cell phone modem though.</p>
</li>
@@ -358,25 +471,34 @@
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
transmit personal data in an insecure way</a>.
However, the worse aspect of these apps is that
-<a href="/philosophy/surveillance-vs-democracy.html">payment is not
anonymous</a>.
-</p>
-</li>
-
-<li>
-<p>
-FitBit fitness trackers <a
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-have a Bluetooth vulnerability</a> that allows
-attackers to send malware to the devices, which can subsequently spread
-to computers and other FitBit trackers that interact with them.
-</p>
-</li>
-
-<li>
-<p>
-“Self-encrypting” disk drives do the encryption with proprietary
-firmware so you can't trust it. Western Digital's “My Passport”
-drives
-<a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
<span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</em></ins></span>
a back door</a>.
+<a
href="/philosophy/surveillance-vs-democracy.html">payment</strong></del></span>
<span class="inserted"><ins><em>track the car's movements all the time;
+ it</em></ins></span> is <span class="removed"><del><strong>not
anonymous</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>possible to
physically remove the cell phone modem, though.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>
+FitBit</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510210">
+ <p>FitBit</em></ins></span> fitness trackers <span
class="removed"><del><strong><a
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"></strong></del></span>
have a <span class="inserted"><ins><em><a
+
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"></em></ins></span>
+ Bluetooth vulnerability</a> that allows attackers to send malware
+ to the devices, which can subsequently spread to computers and other
+ FitBit trackers that interact with <span class="removed"><del><strong>them.
+</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>
+“Self-encrypting”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510200">
+ <p>“Self-encrypting”</em></ins></span> disk drives
+ do the encryption with proprietary firmware so you
+ can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+ have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
</p>
</li>
@@ -386,64 +508,150 @@
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+ </li>
-<li>
-<p>Security researchers discovered a
-<a
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
-vulnerability in diagnostic dongles used for vehicle tracking and
-insurance</a> that let them take remote control of a car or
-lorry using an SMS.
-</p>
-</li>
+<span class="removed"><del><strong><li></strong></del></span>
-<li>
-<p>
-Crackers were able to
-<a
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">take
remote control of the Jeep</a>
-“connected car”.
-<br/>They could track the car, start or stop the engine, and
-activate or deactivate the brakes, and more.
-</p>
+ <span class="inserted"><ins><em><li id="M201508120"></em></ins></span>
+ <p>Security researchers discovered a <a
+
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
+ vulnerability in diagnostic dongles used for vehicle tracking and
+ insurance</a> that let them take remote control of a car or lorry
+ using an <span class="removed"><del><strong>SMS.
+</p></strong></del></span> <span
class="inserted"><ins><em>SMS.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>
-I expect that Chrysler and the NSA can do this too.
+Crackers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507214">
+ <p>Crackers</em></ins></span> were able to <a <span
class="removed"><del><strong>href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">take</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">
+ take</em></ins></span> remote control of the Jeep</a>
“connected car”.
+<span class="removed"><del><strong><br/>They</strong></del></span> <span
class="inserted"><ins><em>They</em></ins></span>
+ could track the car, start or stop the engine, and activate or
+ deactivate the brakes, and <span class="removed"><del><strong>more.
</p>
<p>
-If I ever own a car, and it contains a portable phone, I will
-deactivate that.
-</p>
-</li>
+I</strong></del></span> <span class="inserted"><ins><em>more.</p>
-<li>
-<p>
-Hospira infusion pumps, which are used to administer drugs to
-a patient, were rated
-“<a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
-secure IP device I've ever seen</a>”
-by a security researcher.
+ <p>I</em></ins></span> expect that Chrysler and the NSA can do this
<span class="removed"><del><strong>too.
</p>
<p>
-Depending on what drug is being infused, the insecurity could
-open the door to murder.
-</p>
-</li>
+If</strong></del></span> <span class="inserted"><ins><em>too.</p>
-<li>
+ <p>If</em></ins></span> I ever own a car, and it contains a portable
phone, I will
+ deactivate <span class="removed"><del><strong>that.
+</p></strong></del></span> <span
class="inserted"><ins><em>that.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>
-Due to bad security in a drug pump, crackers could use it to
-<a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
-</p>
-</li>
+Hospira</strong></del></span>
-<li>
+ <span class="inserted"><ins><em><li id="M201506080">
+ <p>Due to bad security in a drug pump, crackers could use it to <a
+
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
+ kill patients</a>.</p>
+ </li>
+
+ <li id="M201505294">
+ <p><a
+
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
+ Many smartphone apps use insecure authentication methods when storing
+ your personal data on remote servers</a>. This leaves personal
+ information like email addresses, passwords, and health information
+ vulnerable. Because many of these apps are proprietary it makes it
+ hard to impossible to know which apps are at risk.</p>
+ </li>
+
+ <li id="M201505050">
+ <p>Hospira</em></ins></span> infusion pumps, which are used
+ to administer drugs to a patient, were rated “<a
+
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
+ secure IP device I've ever seen</a>” by a security <span
class="removed"><del><strong>researcher.
+</p>
+<p>
+Depending</strong></del></span>
+ <span class="inserted"><ins><em>researcher.</p>
+
+ <p>Depending</em></ins></span> on what drug is being infused, the
insecurity could open
+ the door to <span class="removed"><del><strong>murder.
+</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>
+Due</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201504090">
+ <p>Mac OS X had an <a
+
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+ intentional local back door for 4 years</a>, which could be exploited
+ by attackers to gain root privileges.</p>
+ </li>
+
+ <li id="M201405190">
+ <p>An app to prevent “identity theft”
+ (access to personal data) by storing users' data on a special server <a
+
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
+ deactivated by its developer</a> which had discovered a security
+ flaw.</p>
+
+ <p>That developer seems to be conscientious about protecting personal
+ data from third parties in general, but it can't protect that data
+ from the state. Quite the contrary: confiding your data to someone
+ else's server, if not first encrypted by you with free software,
+ undermines your rights.</p>
+ </li>
+
+ <li id="M201404250">
+ <p>Lots of <a
+ href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+ hospital equipment has lousy security</a>, and it can be
fatal.</p>
+ </li>
+
+ <li id="M201402210">
+ <p>The <a
+
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
+ of WhatsApp</a> makes eavesdropping a snap.</p>
+ </li>
+
+ <li id="M201312290">
+ <p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
+ memories have modifiable software</a>, which makes them
vulnerable</em></ins></span>
+ to <span class="removed"><del><strong>bad security
in</strong></del></span> <span class="inserted"><ins><em>viruses.</p>
+
+ <p>We don't call this</em></ins></span> a <span
class="removed"><del><strong>drug pump, crackers could
use</strong></del></span> <span class="inserted"><ins><em>“back
door” because</em></ins></span> it <span class="inserted"><ins><em>is
normal
+ that you can install a new system in a computer, given physical
access</em></ins></span>
+ to
+<span class="removed"><del><strong><a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>it. However,
memory sticks and cards should not be modifiable in
+ this way.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>
-<a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
-The NSA can tap data in smart phones, including iPhones, Android, and
-BlackBerry</a>. While there is not much detail here, it seems that
-this does not operate via the universal back door that we know nearly
-all portable phones have. It may involve exploiting various bugs.
+<a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312040">
+ <p><a
+
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+ Point-of-sale terminals running Windows were taken over</a> and
+ turned into a botnet for the purpose of collecting customers' credit
+ card numbers.</p>
+ </li>
+
+ <li id="M201311120">
+ <p><a
+
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"></em></ins></span>
+ The NSA can tap data in smart phones, including iPhones,
+ Android, and BlackBerry</a>. While there is not much
+ detail here, it seems that this does not operate via
+ the universal back door that we know nearly all portable
+ phones have. It may involve exploiting <span
class="removed"><del><strong>various bugs.
There
are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
lots of bugs in the phones' radio software</a>.
@@ -484,8 +692,7 @@
It is possible to kill people by taking control of medical implants by
radio</a>. Here
is <a href="http://www.bbc.co.uk/news/technology-17631838">more
-information</a>. And <a <span
class="removed"><del><strong>href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.</strong></del></span>
-<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.</em></ins></span>
+information</a>. And <a
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.
</p>
</li>
@@ -511,41 +718,91 @@
<p>
That developer seems to be conscientious about protecting personal
-data from third parties in general, but it can't protect that data
-from the state. Quite the contrary: confiding your data to someone
+data from third parties</strong></del></span> <span
class="inserted"><ins><em>various bugs. There are <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots of bugs</em></ins></span> in <span
class="removed"><del><strong>general, but it can't protect that data
+from the state. Quite</strong></del></span> the <span
class="removed"><del><strong>contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your rights.
-</p>
-</li>
+</p></strong></del></span> <span class="inserted"><ins><em>phones' radio
software</a>.</p></em></ins></span>
+ </li>
-<li>
-<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some flash
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201309054"></em></ins></span>
+ <p><a <span
class="removed"><del><strong>href="http://www.bunniestudios.com/blog/?p=3554">
Some flash
memories have modifiable software</a>, which makes them vulnerable to
viruses.</p>
-<p>We don't call this a “back door” because it is normal
-that you can install a new system in a computer given physical access
-to it. However, memory sticks and cards should not be modifiable in
-this way.</p>
-</li>
-
-<li>
-<p><a href="http://spritesmods.com/?art=hddhack&page=6">
Replaceable
-nonfree software in disk drives can be written by a nonfree
-program.</a> This makes any system vulnerable to persistent attacks
-that normal forensics won't detect.</p>
-</li>
+<p>We</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">The
+ NSA has put back doors into nonfree encryption software</a>.
We</em></ins></span> don't <span class="removed"><del><strong>call this a
“back door” because it is normal</strong></del></span>
+ <span class="inserted"><ins><em>know which ones they are, but we can be
sure they include some widely
+ used systems. This reinforces the point</em></ins></span> that you can
<span class="removed"><del><strong>install a new system
in</strong></del></span> <span class="inserted"><ins><em>never trust
+ the security of nonfree software.</p>
+ </li>
+
+ <li id="M201309050">
+ <p>The FTC punished</em></ins></span> a <span
class="removed"><del><strong>computer given physical
access</strong></del></span> <span class="inserted"><ins><em>company for making
webcams with <a
+
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+ bad security so that it was easy for anyone</em></ins></span> to <span
class="removed"><del><strong>it. However, memory sticks and cards should not
be modifiable in
+this way.</p></strong></del></span> <span
class="inserted"><ins><em>watch through
+ them</a>.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308060"></em></ins></span>
+ <p><a href="http://spritesmods.com/?art=hddhack&page=6">
+ Replaceable nonfree software in disk drives can be written by a
+ nonfree
+<span class="removed"><del><strong>program.</a></strong></del></span>
<span class="inserted"><ins><em>program</a>.</em></ins></span> This makes
any system vulnerable to persistent
+ attacks that normal forensics won't detect.</p>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p><a
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
Many smartphone apps use insecure authentication methods when storing
your personal data on remote servers.</a>
-This leaves personal information like email addresses, passwords, and health
information vulnerable. Because many
-of these apps are proprietary it makes it hard to impossible to know which
apps are at risk.</p>
-</li>
+This leaves personal</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201307270">
+ <p> It is possible to <a
+
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+ kill people by taking control of medical
+ implants by radio</a>. More</em></ins></span> information <span
class="removed"><del><strong>like email addresses,
passwords,</strong></del></span> <span class="inserted"><ins><em>in <a
+ href="http://www.bbc.co.uk/news/technology-17631838">BBC
+ News</a></em></ins></span> and <span
class="removed"><del><strong>health information vulnerable. Because many
+of these apps are proprietary it makes it hard</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
+ IOActive Labs Research blog</a>.</p>
+ </li>
+
+ <li id="M201307260">
+ <p><a
+
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+ “Smart homes”</a> turn out</em></ins></span> to <span
class="removed"><del><strong>impossible</strong></del></span> <span
class="inserted"><ins><em>be stupidly vulnerable</em></ins></span> to <span
class="removed"><del><strong>know which apps</strong></del></span>
+ <span class="inserted"><ins><em>intrusion.</p>
+ </li>
+
+ <li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who</em></ins></span> are <span
class="removed"><del><strong>at risk.</p></strong></del></span> <span
class="inserted"><ins><em>watching TV.</p>
+ </li>
+
+ <li id="M201103110">
+ <p>It is possible to take control of some car computers through <a
+
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
+ malware in music files</a>. Also <a
+ href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">
+ by radio</a>. Here is <a
href="http://www.autosec.org/faq.html">more
+ information</a>.</p></em></ins></span>
+ </li>
</ul>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -604,7 +861,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/18 17:27:39 $
+$Date: 2018/09/26 14:28:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary-insecurity.ja.po 18 Sep 2018 17:27:39 -0000 1.101
+++ proprietary-insecurity.ja.po 26 Sep 2018 14:28:11 -0000 1.102
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-09-18 17:25+0000\n"
+"POT-Creation-Date: 2018-09-26 14:26+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -102,6 +102,44 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
+"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
+"voice commands in other audio</a>, so that people cannot hear them, but "
+"Alexa and Siri can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Samsung phones randomly <a href=\"https://www.theverge.com/"
"circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"
"\">send photos to people in the owner's contact list</a>."
@@ -123,17 +161,17 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon recently invited consumers to be suckers and <a href=\"https://www."
-"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
-"delivery staff to open their front doors</a>. Wouldn't you know it, the "
-"system has a grave security flaw."
+"Intel's intentional “management engine” back door has <a href="
+"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
+"unintended back doors</a> too."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Intel's intentional “management engine” back door has <a href="
-"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
-"unintended back doors</a> too."
+"Amazon recently invited consumers to be suckers and <a href=\"https://www."
+"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
+"delivery staff to open their front doors</a>. Wouldn't you know it, the "
+"system has a grave security flaw."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -172,24 +210,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"It is unfortunate that the article uses the term <a href=\"/philosophy/words-"
-"to-avoid.html#Monetize\"> “monetize”</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Siri, Alexa, and all the other voice-control systems can be <a href="
-"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
-"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
-"commands in ultrasound that humans can't hear</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
-"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
-"microphone-cameras.html\"> Crackers found a way to break security on a "
-"“smart” TV</a> and use its camera to watch the people who are "
-"watching TV."
+"to-avoid.html#Monetize\">“monetize”</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -209,34 +230,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
-"installed on 28 models of HP laptops logged the user's keystroke to a file "
-"in the filesystem. Any process with access to the filesystem or the "
-"MapViewOfFile API could gain access to the log. Furthermore, <a href="
-"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
-"\">according to modzero</a> the “information-leak via Covert Storage "
-"Channel enables malware authors to capture keystrokes without taking the "
-"risk of being classified as malicious task by AV heuristics”."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The proprietary code that runs pacemakers, insulin pumps, and other medical "
-"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
-"of gross security faults</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
-"by the Shadowbrokers group, are now being used to <a href=\"https://"
-"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
-"computers-around-the-world/\">attack a great number of Windows computers "
-"with ransomware</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Intel's CPU backdoor—the Intel Management Engine—had a <a href="
"\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-"
"execution-bug-that-lurked-in-cpus-for-10-years/\">major security "
@@ -263,6 +256,34 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The proprietary code that runs pacemakers, insulin pumps, and other medical "
+"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
+"of gross security faults</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
+"installed on 28 models of HP laptops logged the user's keystroke to a file "
+"in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a href="
+"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
+"\">according to modzero</a> the “information-leak via Covert Storage "
+"Channel enables malware authors to capture keystrokes without taking the "
+"risk of being classified as malicious task by AV heuristics”."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-"
"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
@@ -287,67 +308,73 @@
#. type: Content of: <ul><li><p>
msgid ""
-"WhatsApp has a feature that <a href=\"https://techcrunch.com/2017/01/13/"
-"encrypted-messaging-platform-whatsapp-denies-backdoor-claim/\"> has been "
-"described as a “back door”</a> because it would enable "
-"governments to nullify its encryption."
+"If you buy a used “smart” car, house, TV, refrigerator, etc., "
+"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
+"used.html\">the previous owners can still remotely control it</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"The developers say that it wasn't intended as a back door, and that may well "
-"be true. But that leaves the crucial question of whether it functions as "
-"one. Because the program is nonfree, we cannot check by studying it."
+"The mobile apps for communicating <a href=\"https://www.bleepingcomputer.com/"
+"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
+"\">with a smart but foolish car have very bad security</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"The “smart” toys My Friend Cayla and i-Que can be <a href="
-"\"https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-"
-"laws\">remotely controlled with a mobile phone</a>; physical access is not "
-"necessary. This would enable crackers to listen in on a child's "
-"conversations, and even speak into the toys themselves."
+"This is in addition to the fact that the car contains a cellular modem that "
+"tells big brother all the time where it is. If you own such a car, it would "
+"be wise to disconnect the modem so as to turn off the tracking."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"This means a burglar could speak into the toys and ask the child to unlock "
-"the front door while Mommy's not looking."
+"Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
+"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
+"\">have a security hole that allows an SMS message to install ransomware</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"The mobile apps for communicating <a href=\"https://www.bleepingcomputer.com/"
-"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
-"\">with a smart but foolish car have very bad security</a>."
+"WhatsApp has a feature that <a href=\"https://techcrunch.com/2017/01/13/"
+"encrypted-messaging-platform-whatsapp-denies-backdoor-claim/\"> has been "
+"described as a “back door”</a> because it would enable "
+"governments to nullify its encryption."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"This is in addition to the fact that the car contains a cellular modem that "
-"tells big brother all the time where it is. If you own such a car, it would "
-"be wise to disconnect the modem so as to turn off the tracking."
+"The developers say that it wasn't intended as a back door, and that may well "
+"be true. But that leaves the crucial question of whether it functions as "
+"one. Because the program is nonfree, we cannot check by studying it."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"If you buy a used “smart” car, house, TV, refrigerator, etc., "
-"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
-"used.html\">the previous owners can still remotely control it</a>."
+"The “smart” toys My Friend Cayla and i-Que can be <a href="
+"\"https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-"
+"laws\">remotely controlled with a mobile phone</a>; physical access is not "
+"necessary. This would enable crackers to listen in on a child's "
+"conversations, and even speak into the toys themselves."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
-"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
-"\">have a security hole that allows an SMS message to install ransomware</a>."
+"This means a burglar could speak into the toys and ask the child to unlock "
+"the front door while Mommy's not looking."
msgstr ""
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "4G LTE phone networks are drastically insecure. They can be <a href="
+#| "\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
+#| "uk/2016/10/23/"
+#| "every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
+#| "over by third parties and used for man-in-the-middle attacks</a>."
msgid ""
"4G LTE phone networks are drastically insecure. They can be <a href="
-"\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
-"uk/2016/10/23/"
+"\"https://www.theregister.co.uk/2016/10/23/"
"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
"over by third parties and used for man-in-the-middle attacks</a>."
msgstr ""
@@ -449,20 +476,16 @@
msgstr "GNU/Linuxã¯ã¢ã³ãã¦ã£ã«ã¹ã®ã½ããã¦ã§ã¢ãå¿
è¦ã¨ãã¾ããã"
#. type: Content of: <ul><li><p>
-msgid ""
-"Over 70 brands of network-connected surveillance cameras <a href=\"http://"
-"www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
-"\">have security bugs that allow anyone to watch through them</a>."
-msgstr ""
-"70ãè¶ãããã©ã³ãã®ãããã¯ã¼ã¯ã«æ¥ç¶ãããç£è¦ã«ã¡ã©ã«<a
href=\"http://www."
-"kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">ã»ãã¥ãª"
-"ãã£ã®ãã°ãããã誰ã§ãè¦ããã¨ãã§ããããã«ãªã£ã¦ãã¾ãã¾ã</a>ã"
-
-#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Samsung's “Smart Home” has a big security hole; <a href="
+#| "\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-"
+#| "hackers-make-keys-to-front-door/\">unauthorized people can remotely "
+#| "control it</a>."
msgid ""
"Samsung's “Smart Home” has a big security hole; <a href=\"http://"
"arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-"
-"keys-to-front-door/\">unauthorized people can remotely control it</a>."
+"keys-to-front-door/\"> unauthorized people can remotely control it</a>."
msgstr ""
"Samsung㮓Smart
Home”ã¯å¤§ããªã»ãã¥ãªãã£ãã¼ã«ãããã<a href="
"\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-"
@@ -488,45 +511,27 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Nissan Leaf has a built-in cell phone modem which allows effectively "
-"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
-"nissan/\">to access its computers remotely and make changes in various "
-"settings</a>."
-msgstr ""
-"æ¥ç£ãªã¼ãã«ã¯ä½ãä»ãã®æºå¸¯é»è©±ã¢ãã
ããããå®å¹çã«èª°ã§ã<a href="
-"\"https://www.troyhunt.com/controlling-vehicle-features-of-nissan/\">é
éãã"
-"ãã®ã³ã³ãã¥ã¼ã¿ã«ã¢ã¯ã»ã¹ããæ§ã
ãªè¨å®ãå¤æ´ãã</a>ãã¨ãå¯è½ã«ãã¾ãã"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"That's easy to do because the system has no authentication when accessed "
-"through the modem. However, even if it asked for authentication, you "
-"couldn't be confident that Nissan has no access. The software in the car is "
-"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
-"\">which means it demands blind faith from its users</a>."
-msgstr ""
-"ã¢ãã ãéãã¦ã¢ã¯ã»ã¹ãããã¨ãã«ãã®ã·ã¹ãã
ã«ã¯ãªãã®èªè¨¼ããªãã®ã§ããã¯"
-"容æã«ã§ãã¾ããããããèªè¨¼ãæ±ããããä»çµã¿ã®å
´åã§ãã£ã¦ããæ¥ç£ããªãã®"
-"ã¢ã¯ã»ã¹ãã§ããªãã¨ã¯ç¢ºä¿¡ãæã¦ã¾ãããèªåè»ã®ã½ããã¦ã§ã¢ã¯ãããã©ã¤ã¨ã¿"
-"ãªã§ã<a
href=\"/philosophy/free-software-even-more-important.html\">ããã¯ã"
-"ã¦ã¼ã¶ã«ç²ç®çãªä¿¡é ¼ãè¦æ±ããã¨ãããã¨ã§ã</a>ã"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Even if no one connects to the car remotely, the cell phone modem enables "
-"the phone company to track the car's movements all the time; it is possible "
-"to physically remove the cell phone modem though."
+"A bug in the iThings Messages app <a href=\"https://theintercept."
+"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
+"a malicious web site to extract all the user's messaging history</a>."
msgstr ""
-"誰ãèªåè»ã«é
éããã¤ãªããªãã¨ãã¦ããæºå¸¯é»è©±ã¢ãã
ã¯æºå¸¯é»è©±ä¼ç¤¾ãèªåè»"
-"ã®åãã常æ追跡ãããã¨ãå¯è½ã«ãã¾ããç©ççã«æºå¸¯é»è©±ã¢ãã
ãé¤å»ãããã¨"
-"ã¯å¯è½ã§ãããã©ãã"
+"iThingsã®ã¡ã¼ãã»ã¼ã¸ã¢ããªã®ãã°ã¯<a
href=\"https://theintercept."
+"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">æªæã®ã"
+"ãã¦ã§ããµã¤ããã¦ã¼ã¶ã®ã¡ãã»ã¼ã¸ã³ã°ã®å±¥æ´ã®ãã¹ã¦ãå¼ãåºããã¨ã許ãã¦ã¾"
+"ãã</a>ã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Malware found on <a href=\"http://www.slate.com/blogs/"
+#| "future_tense/2016/04/11/"
+#| "security_cameras_sold_through_amazon_have_malware_according_to_security."
+#| "html\">security cameras available through Amazon</a>."
msgid ""
-"Malware found on <a href=\"http://www.slate.com/blogs/"
+"Malware was found on <a href=\"http://www.slate.com/blogs/"
"future_tense/2016/04/11/"
"security_cameras_sold_through_amazon_have_malware_according_to_security.html"
-"\">security cameras available through Amazon</a>."
+"\"> security cameras available through Amazon</a>."
msgstr ""
"ãã«ã¦ã§ã¢ã<a
href=\"http://www.slate.com/blogs/future_tense/2016/04/11/"
"security_cameras_sold_through_amazon_have_malware_according_to_security.html"
@@ -543,21 +548,32 @@
"ã®ã©ã¡ãã§ãã"
#. type: Content of: <ul><li><p>
-msgid ""
-"A bug in the iThings Messages app <a href=\"https://theintercept."
-"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
-"a malicious web site to extract all the user's messaging history</a>."
+#, fuzzy
+#| msgid ""
+#| "Over 70 brands of network-connected surveillance cameras <a href=\"http://"
+#| "www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
+#| "\">have security bugs that allow anyone to watch through them</a>."
+msgid ""
+"Over 70 brands of network-connected surveillance cameras have <a href="
+"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
+"html\"> security bugs that allow anyone to watch through them</a>."
msgstr ""
-"iThingsã®ã¡ã¼ãã»ã¼ã¸ã¢ããªã®ãã°ã¯<a
href=\"https://theintercept."
-"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">æªæã®ã"
-"ãã¦ã§ããµã¤ããã¦ã¼ã¶ã®ã¡ãã»ã¼ã¸ã³ã°ã®å±¥æ´ã®ãã¹ã¦ãå¼ãåºããã¨ã許ãã¦ã¾"
-"ãã</a>ã"
+"70ãè¶ãããã©ã³ãã®ãããã¯ã¼ã¯ã«æ¥ç¶ãããç£è¦ã«ã¡ã©ã«<a
href=\"http://www."
+"kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">ã»ãã¥ãª"
+"ãã£ã®ãã°ãããã誰ã§ãè¦ããã¨ãã§ããããã«ãªã£ã¦ãã¾ãã¾ã</a>ã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
+#| "articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
+#| "securing-user-data\"> transmit personal data in an insecure way</a>. "
+#| "However, the worse aspect of these apps is that <a href=\"/philosophy/"
+#| "surveillance-vs-democracy.html\">payment is not anonymous</a>."
msgid ""
"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
-"user-data\"> transmit personal data in an insecure way</a>. However, the "
+"user-data\">transmit personal data in an insecure way</a>. However, the "
"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
"democracy.html\">payment is not anonymous</a>."
msgstr ""
@@ -569,17 +585,64 @@
#. type: Content of: <ul><li><p>
msgid ""
-"FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-security/"
-"latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-"
-"trackers/\"> have a Bluetooth vulnerability</a> that allows attackers to "
-"send malware to the devices, which can subsequently spread to computers and "
-"other FitBit trackers that interact with them."
+"The Nissan Leaf has a built-in cell phone modem which allows effectively "
+"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
+"nissan/\">to access its computers remotely and make changes in various "
+"settings</a>."
msgstr ""
-"FitBitãã£ããã¹ã»ãã©ãã«ã¼<a
href=\"http://www.tripwire.com/state-of-"
-"security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-"
-"fitness-trackers/\">ã¯Bluetoothã®èå¼±æ§ããã</a>ãæ»æè
ããã«ã¦ã§ã¢ãããã¤"
-"ã¹ã«éãããã®ãã«ã¦ã§ã¢ã¯ç¶ãã¦ã³ã³ãã¥ã¼ã¿ã¨ã»ãã®FitBitãã©ãã«ã¼ã¸åºãã£"
-"ã¦éä¿¡ãããã¨ãã§ãã¾ããã"
+"æ¥ç£ãªã¼ãã«ã¯ä½ãä»ãã®æºå¸¯é»è©±ã¢ãã
ããããå®å¹çã«èª°ã§ã<a href="
+"\"https://www.troyhunt.com/controlling-vehicle-features-of-nissan/\">é
éãã"
+"ãã®ã³ã³ãã¥ã¼ã¿ã«ã¢ã¯ã»ã¹ããæ§ã
ãªè¨å®ãå¤æ´ãã</a>ãã¨ãå¯è½ã«ãã¾ãã"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"That's easy to do because the system has no authentication when accessed "
+"through the modem. However, even if it asked for authentication, you "
+"couldn't be confident that Nissan has no access. The software in the car is "
+"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
+"\">which means it demands blind faith from its users</a>."
+msgstr ""
+"ã¢ãã ãéãã¦ã¢ã¯ã»ã¹ãããã¨ãã«ãã®ã·ã¹ãã
ã«ã¯ãªãã®èªè¨¼ããªãã®ã§ããã¯"
+"容æã«ã§ãã¾ããããããèªè¨¼ãæ±ããããä»çµã¿ã®å
´åã§ãã£ã¦ããæ¥ç£ããªãã®"
+"ã¢ã¯ã»ã¹ãã§ããªãã¨ã¯ç¢ºä¿¡ãæã¦ã¾ãããèªåè»ã®ã½ããã¦ã§ã¢ã¯ãããã©ã¤ã¨ã¿"
+"ãªã§ã<a
href=\"/philosophy/free-software-even-more-important.html\">ããã¯ã"
+"ã¦ã¼ã¶ã«ç²ç®çãªä¿¡é ¼ãè¦æ±ããã¨ãããã¨ã§ã</a>ã"
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Even if no one connects to the car remotely, the cell phone modem enables "
+#| "the phone company to track the car's movements all the time; it is "
+#| "possible to physically remove the cell phone modem though."
+msgid ""
+"Even if no one connects to the car remotely, the cell phone modem enables "
+"the phone company to track the car's movements all the time; it is possible "
+"to physically remove the cell phone modem, though."
+msgstr ""
+"誰ãèªåè»ã«é
éããã¤ãªããªãã¨ãã¦ããæºå¸¯é»è©±ã¢ãã
ã¯æºå¸¯é»è©±ä¼ç¤¾ãèªåè»"
+"ã®åãã常æ追跡ãããã¨ãå¯è½ã«ãã¾ããç©ççã«æºå¸¯é»è©±ã¢ãã
ãé¤å»ãããã¨"
+"ã¯å¯è½ã§ãããã©ãã"
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-"
+#| "security/latest-security-news/10-second-hack-delivers-first-ever-malware-"
+#| "to-fitness-trackers/\"> have a Bluetooth vulnerability</a> that allows "
+#| "attackers to send malware to the devices, which can subsequently spread "
+#| "to computers and other FitBit trackers that interact with them."
+msgid ""
+"FitBit fitness trackers have a <a href=\"http://www.tripwire.com/state-of-"
+"security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-"
+"fitness-trackers/\"> Bluetooth vulnerability</a> that allows attackers to "
+"send malware to the devices, which can subsequently spread to computers and "
+"other FitBit trackers that interact with them."
+msgstr ""
+"FitBitãã£ããã¹ã»ãã©ãã«ã¼<a
href=\"http://www.tripwire.com/state-of-"
+"security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-"
+"fitness-trackers/\">ã¯Bluetoothã®èå¼±æ§ããã</a>ãæ»æè
ããã«ã¦ã§ã¢ãããã¤"
+"ã¹ã«éãããã®ãã«ã¦ã§ã¢ã¯ç¶ãã¦ã³ã³ãã¥ã¼ã¿ã¨ã»ãã®FitBitãã©ãã«ã¼ã¸åºãã£"
+"ã¦éä¿¡ãããã¨ãã§ãã¾ããã"
#. type: Content of: <ul><li><p>
#, fuzzy
@@ -593,8 +656,8 @@
"“Self-encrypting” disk drives do the encryption with proprietary "
"firmware so you can't trust it. Western Digital's “My Passport” "
"drives <a href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-"
-"popular-self-encrypting-hard-drives-have-really-bad-encryption\">have a back "
-"door</a>."
+"popular-self-encrypting-hard-drives-have-really-bad-encryption\"> have a "
+"back door</a>."
msgstr ""
"ãèªå·±æå·åããã£ã¹ã¯ãã©ã¤ãã¯ãããã©ã¤ã¨ã¿ãªãªãã¡ã¼ã
ã¦ã§ã¢ã§æå·åãè¡"
"ãã®ã§ãä¿¡é
¼ã§ãã¾ãããã¦ã§ã¹ã¿ã³ã»ãã£ã¸ã¿ã«ã®“My
Passport”ãã©"
@@ -604,17 +667,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
-"door for 4 years</a>, which could be exploited by attackers to gain root "
-"privileges."
-msgstr ""
-"Mac OS Xã¯<a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\">æå³çãªãã¼ã«ã«ãªããã¯ãã¢"
-"ã4å¹´éãã</a>ãæ»æè
ãroot権éãåå¾ããã®ã«æªç¨ããããç¶æ³ã§ããã"
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
@@ -626,24 +678,23 @@
"ãã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
+#| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"
+#| "\">take remote control of the Jeep</a> “connected car”."
msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
-"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take "
-"remote control of the Jeep</a> “connected car”."
+"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> take "
+"remote control of the Jeep</a> “connected car”. They could track "
+"the car, start or stop the engine, and activate or deactivate the brakes, "
+"and more."
msgstr ""
"ã¯ã©ãã«ã¼ã¯ããããã«ã¤ãªããè»ãã¨åä»ãããã<a
href=\"http://arstechnica."
"com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-"
"jeep-remotely/\">ã¸ã¼ãã®é
éæä½ã®ã³ã³ããã¼ã«ã奪ã</a>ãã¨ãã§ãã¾ããã"
#. type: Content of: <ul><li><p>
-msgid ""
-"They could track the car, start or stop the engine, and activate or "
-"deactivate the brakes, and more."
-msgstr ""
-"ãããã¯ããã®è»ã追跡ããã¨ã³ã¸ã³ãããããæ¢ãããããã¬ã¼ããå¹ããããã"
-"ç·©ãããããªã©ãªã©ã§ããã®ã§ãã"
-
-#. type: Content of: <ul><li><p>
msgid "I expect that Chrysler and the NSA can do this too."
msgstr "ã¯ã©ã¤ã¹ã©ã¼ã¨NSAãã§ããã¨ãããã¯èãã¾ãã"
@@ -656,6 +707,45 @@
"ããã§ãããã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Due to bad security in a drug pump, crackers could use it to <a href="
+#| "\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
+#| "pumps/\">kill patients</a>."
+msgid ""
+"Due to bad security in a drug pump, crackers could use it to <a href="
+"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
+"pumps/\"> kill patients</a>."
+msgstr ""
+"è¬ã®ãã³ãã®å£æªãªã»ãã¥ãªãã£ã®ãããã¯ã©ãã«ã¼ã<a
href=\"http://www.wired."
+"com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/\">æ£è
ã殺ã</"
+"a>ããã«ãå©ç¨ã§ããã ããã¨èãããã¾ãã"
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-"
+#| "millions-users.html\"> Many smartphone apps use insecure authentication "
+#| "methods when storing your personal data on remote servers.</a> This "
+#| "leaves personal information like email addresses, passwords, and health "
+#| "information vulnerable. Because many of these apps are proprietary it "
+#| "makes it hard to impossible to know which apps are at risk."
+msgid ""
+"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
+"users.html\"> Many smartphone apps use insecure authentication methods when "
+"storing your personal data on remote servers</a>. This leaves personal "
+"information like email addresses, passwords, and health information "
+"vulnerable. Because many of these apps are proprietary it makes it hard to "
+"impossible to know which apps are at risk."
+msgstr ""
+"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
+"users.html\">å¤ãã®ã¹ãã¼ããã©ã³ã®ã¢ããªã¯é
éã®ãµã¼ãä¸ã«å人ã®ãã¼ã¿ãä¿ç®¡"
+"ããéãã»ãã¥ã¢ã§ãªãèªè¨¼æ¹å¼ã使ã£ã¦ãã¾ãã</a>
ããã¯é»åã¡ã¼ã«ã¢ãã¬ã¹ã"
+"ãã¹ã¯ã¼ããå»çæ
å ±ã®ãããªå人æ
å
±ãèå¼±ã®ã¾ã¾ã«ãã¾ããå¤ãã®ã¢ããªããã"
+"ãã©ã¤ã¨ã¿ãªãªã®ã§ãã©ã®ã¢ããªããªã¹ã¯ãããã®ãã«ã¤ãã¦ç¥ãã®ã¯é£ãããªã£ã¦"
+"ãã¾ãã"
+
+#. type: Content of: <ul><li><p>
msgid ""
"Hospira infusion pumps, which are used to administer drugs to a patient, "
"were rated “<a href=\"https://securityledger.com/2015/05/researcher-"
@@ -677,43 +767,60 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Due to bad security in a drug pump, crackers could use it to <a href="
-"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
-"pumps/\">kill patients</a>."
+"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
+"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
+"door for 4 years</a>, which could be exploited by attackers to gain root "
+"privileges."
msgstr ""
-"è¬ã®ãã³ãã®å£æªãªã»ãã¥ãªãã£ã®ãããã¯ã©ãã«ã¼ã<a
href=\"http://www.wired."
-"com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/\">æ£è
ã殺ã</"
-"a>ããã«ãå©ç¨ã§ããã ããã¨èãããã¾ãã"
+"Mac OS Xã¯<a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
+"backdoor-api-to-root-privileges-in-apple-os-x/\">æå³çãªãã¼ã«ã«ãªããã¯ãã¢"
+"ã4å¹´éãã</a>ãæ»æè
ãroot権éãåå¾ããã®ã«æªç¨ããããç¶æ³ã§ããã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "An app to prevent “identity theft” (access to personal data) "
+#| "by storing users' data on a special server <a href=\"http://arstechnica."
+#| "com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-"
+#| "over-concerns-that-app-isnt-safe/\">was deactivated by its developer</a> "
+#| "which had discovered a security flaw."
msgid ""
-"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
-"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
-"phones, including iPhones, Android, and BlackBerry</a>. While there is not "
-"much detail here, it seems that this does not operate via the universal back "
-"door that we know nearly all portable phones have. It may involve "
-"exploiting various bugs. There are <a href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> lots "
-"of bugs in the phones' radio software</a>."
+"An app to prevent “identity theft” (access to personal data) by "
+"storing users' data on a special server <a href=\"http://arstechnica.com/"
+"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
+"concerns-that-app-isnt-safe/\">was deactivated by its developer</a> which "
+"had discovered a security flaw."
msgstr ""
-"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
-"spy-on-smart-phone-data-a-920971.html\">NSAã¯iPhone,
ã¢ã³ããã¤ããBlackBerry"
-"ã®ãå«ãã¹ãã¼ããã©ã³ã®ãã¼ã¿ãçã¿è¦ããã¨ãã§ãã¾ã</a>ã詳細ã¯ãããã¾ã"
-"ãããã»ã¨ãã©ã®æºå¸¯é»è©±ã«ãããã¨ãããã£ã¦ããä¸è½ããã¯ãã¢ãéãã¦è¡ãã"
-"ãã®ã§ã¯ãªãããã§ããããã¯ããã¾ãã¾ãªãã°ã®å©æ´»ç¨ã«é¢ä¿ããããããã¾ã"
-"ãã<a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\">æºå¸¯é»è©±ã®é»æ³¢ã½ã"
-"ãã¦ã§ã¢ã«ã¯ããããã®ãã°ããã</a>ã®ã§ãã"
+"ç¹å¥ãªãµã¼ãã«ã¦ã¼ã¶ã®ãã¼ã¿ãç½®ããã¨ã«ãã“ã¢ã¤ãã³ãã£ãã£çé£"
+"”(å人æ
å ±ã¸ã®ã¢ã¯ã»ã¹)ãé²ãã¢ããªã<a
href=\"http://arstechnica.com/"
+"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
+"concerns-that-app-isnt-safe/\">ãã®éçºè
ã«ãã£ã¦åæ¢ããã¦ãã¾ãã</a>ããã"
+"èªèº«ã«ã»ãã¥ãªãã£ã®æ¬ é¥ãçºè¦ãããããã§ãã"
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
-"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
-"intrusion."
+"That developer seems to be conscientious about protecting personal data from "
+"third parties in general, but it can't protect that data from the state. "
+"Quite the contrary: confiding your data to someone else's server, if not "
+"first encrypted by you with free software, undermines your rights."
msgstr ""
-"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
-"hack/\">ãã¹ãã¼ããã¼ã ã</a>ã¯ä¾µå
¥ã«å¯¾ãã¦ãã«ããã»ã©èå¼±ã§ãããã¨ãå¤æ"
-"ãã¾ããã"
+"ãã®éçºè
ã¯ãå人æ
å ±ã第ä¸è
ããè·ããã¨ã«ã¤ãã¦ã¯æèçã ã£ãããã§ããã"
+"ããã¯å½å®¶ãããã®ãã¼ã¿ãè·ããã¨ã¯ã§ãã¾ãããã¾ã£ããéãªã®ã§ã:
ã»ãã®èª°"
+"ãã®ãµã¼ãã«ãã¼ã¿ãéãè¾¼ãããã¨ã¯ãæåã«èªç±ã½ããã¦ã§ã¢ã使ã£ã¦ããªãèª"
+"身ãæå·åããã®ã§ãªããã°ãããªãã®æ¨©å©ã害ããã®ã§ãã"
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-"
+#| "vulnerable/\">hospital equipment has lousy security</a>, and it can be "
+#| "fatal."
+msgid ""
+"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
+"\"> hospital equipment has lousy security</a>, and it can be fatal."
+msgstr ""
+"<a
href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/\">å»ç"
+"æ©å¨ã¯ã²ã©ãã»ãã¥ãªãã£ã®ç¶æ
ã§</a>ãè´å½çã«ãªããã¾ãã"
#. type: Content of: <ul><li><p>
msgid ""
@@ -727,68 +834,39 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\"> The FTC punished a company for making "
-"webcams with bad security so that it was easy for anyone to watch them</a>."
-msgstr ""
-"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\">FTCã¯èª°ã§ãç°¡åã«è¦ããã¨ãã§ããæªãã»ãã¥"
-"ãªãã£ã®webcamãä½ã£ãä¼ç¤¾ãç½°ãã¾ãã</a>ã"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\"> It is possible to take control "
-"of some car computers through malware in music files</a>. Also <a href="
-"\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">by radio</"
-"a>. Here is <a href=\"http://www.autosec.org/faq.html\">more information</"
-"a>."
+"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
+"have modifiable software</a>, which makes them vulnerable to viruses."
msgstr ""
-"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\">é³æ¥½ãã¡ã¤ã«ã®ä¸ã®ãã«ã¦ã§ã¢ãéã"
-"ã¦ããè»ã®ã³ã³ãã¥ã¼ã¿ã®ã³ã³ããã¼ã«ã奪ããã¨ãå¯è½ã§ã</a>ãã¾ãã<a
href="
-"\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">ã©ã¸ãªã§ã</"
-"a>ããã¡ãã«<a
href=\"http://www.autosec.org/faq.html\">ãã詳ããæ
å ±ããã"
-"ã¾ã</a>ã"
+"<a
href=\"http://www.bunniestudios.com/blog/?p=3554\">ãããã©ãã·ã¥ã¡ã¢ãªã¯"
+"ä¿®æ£å¯è½ãªã½ããã¦ã§ã¢ãæã</a>ãã¦ã£ã«ã¹ã«å¯¾ãã¦èå¼±ã§ãã"
#. type: Content of: <ul><li><p>
#, fuzzy
#| msgid ""
-#| "<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-"
-#| "jack-dies-days-before-scheduled-black-hat-appearance/\"> It is possible "
-#| "to kill people by taking control of medical implants by radio</a>. Here "
-#| "is <a href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
-#| "information</a>. And <a href=\"http://blog.ioactive.com/2013/02/broken-"
-#| "hearts-how-plausible-was.html\">here</a>."
+#| "We don't call this a “back door” because it is normal that "
+#| "you can install a new system in a computer given physical access to it. "
+#| "However, memory sticks and cards should not be modifiable in this way."
msgid ""
-"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
-"dies-days-before-scheduled-black-hat-appearance/\"> It is possible to kill "
-"people by taking control of medical implants by radio</a>. Here is <a href="
-"\"http://www.bbc.co.uk/news/technology-17631838\">more information</a>. And "
-"<a href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive."
-"com/2013/02/broken-hearts-how-plausible-was.html\">here</a>."
-msgstr ""
-"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
-"dies-days-before-scheduled-black-hat-appearance/\">ã©ã¸ãªã«ãã£ã¦ã¤ã³ãã©ã³ã"
-"ã®å»çæ©å¨ã®ã³ã³ããã¼ã«ã奪ãã人ã殺ããã¨ãå¯è½ã§ã</a>ããã¡ãã«<a
href="
-"\"http://www.bbc.co.uk/news/technology-17631838\">ãã詳ããæ
å
±ãããã¾ã</"
-"a>ãããã¦ã<a
href=\"http://blog.ioactive.com/2013/02/broken-hearts-how-"
-"plausible-was.html\">ãã¡ãã«ã</a>ã"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
-"\">hospital equipment has lousy security</a>, and it can be fatal."
+"We don't call this a “back door” because it is normal that you "
+"can install a new system in a computer, given physical access to it. "
+"However, memory sticks and cards should not be modifiable in this way."
msgstr ""
-"<a
href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/\">å»ç"
-"æ©å¨ã¯ã²ã©ãã»ãã¥ãªãã£ã®ç¶æ
ã§</a>ãè´å½çã«ãªããã¾ãã"
+"ããããã¡ã¯ããããããã¯ãã¢ãã¨ã¯è¨ãã¾ããããªããªããç©ççã¢ã¯ã»ã¹ãå¯"
+"è½ãªã³ã³ãã¥ã¼ã¿ã«æ°ããã·ã¹ãã
ãã¤ã³ã¹ãã¼ã«ã§ããã®ã¯æ®éã ããã§ãããã"
+"ããã¡ã¢ãªã»ã¹ãã£ãã¯ã¨ã«ã¼ãã¯ãã®æ¹å¼ã§ä¿®æ£å¯è½ã§ããã¹ãã§ã¯ããã¾ããã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
+#| "of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
+#| "running Windows were taken over and turned into a botnet for the purpose "
+#| "of collecting customers' credit card numbers</a>."
msgid ""
"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
"age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
-"running Windows were taken over and turned into a botnet for the purpose of "
-"collecting customers' credit card numbers</a>."
+"running Windows were taken over</a> and turned into a botnet for the purpose "
+"of collecting customers' credit card numbers."
msgstr ""
"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
"age-with-first-known-point-of-sale-botnet/\">ã¦ã£ã³ãã¦ãºãèµ°ããã¦ããPOS端"
@@ -796,53 +874,73 @@
"ãããã«ããã¦ãã¾ãã¾ãã</a>ã"
#. type: Content of: <ul><li><p>
-msgid ""
-"An app to prevent “identity theft” (access to personal data) by "
-"storing users' data on a special server <a href=\"http://arstechnica.com/"
-"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
-"concerns-that-app-isnt-safe/\">was deactivated by its developer</a> which "
-"had discovered a security flaw."
-msgstr ""
-"ç¹å¥ãªãµã¼ãã«ã¦ã¼ã¶ã®ãã¼ã¿ãç½®ããã¨ã«ãã“ã¢ã¤ãã³ãã£ãã£çé£"
-"”(å人æ
å ±ã¸ã®ã¢ã¯ã»ã¹)ãé²ãã¢ããªã<a
href=\"http://arstechnica.com/"
-"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
-"concerns-that-app-isnt-safe/\">ãã®éçºè
ã«ãã£ã¦åæ¢ããã¦ãã¾ãã</a>ããã"
-"èªèº«ã«ã»ãã¥ãªãã£ã®æ¬ é¥ãçºè¦ãããããã§ãã"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"That developer seems to be conscientious about protecting personal data from "
-"third parties in general, but it can't protect that data from the state. "
-"Quite the contrary: confiding your data to someone else's server, if not "
-"first encrypted by you with free software, undermines your rights."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#| "smart phones, including iPhones, Android, and BlackBerry</a>. While "
+#| "there is not much detail here, it seems that this does not operate via "
+#| "the universal back door that we know nearly all portable phones have. It "
+#| "may involve exploiting various bugs. There are <a href=\"http://www."
+#| "osnews.com/story/27416/"
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs "
+#| "in the phones' radio software</a>."
+msgid ""
+"<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/"
+"international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971."
+"html\"> The NSA can tap data in smart phones, including iPhones, Android, "
+"and BlackBerry</a>. While there is not much detail here, it seems that this "
+"does not operate via the universal back door that we know nearly all "
+"portable phones have. It may involve exploiting various bugs. There are <a "
+"href=\"http://www.osnews.com/story/27416/"
+"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
+"the phones' radio software</a>."
msgstr ""
-"ãã®éçºè
ã¯ãå人æ
å ±ã第ä¸è
ããè·ããã¨ã«ã¤ãã¦ã¯æèçã ã£ãããã§ããã"
-"ããã¯å½å®¶ãããã®ãã¼ã¿ãè·ããã¨ã¯ã§ãã¾ãããã¾ã£ããéãªã®ã§ã:
ã»ãã®èª°"
-"ãã®ãµã¼ãã«ãã¼ã¿ãéãè¾¼ãããã¨ã¯ãæåã«èªç±ã½ããã¦ã§ã¢ã使ã£ã¦ããªãèª"
-"身ãæå·åããã®ã§ãªããã°ãããªãã®æ¨©å©ã害ããã®ã§ãã"
+"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
+"spy-on-smart-phone-data-a-920971.html\">NSAã¯iPhone,
ã¢ã³ããã¤ããBlackBerry"
+"ã®ãå«ãã¹ãã¼ããã©ã³ã®ãã¼ã¿ãçã¿è¦ããã¨ãã§ãã¾ã</a>ã詳細ã¯ãããã¾ã"
+"ãããã»ã¨ãã©ã®æºå¸¯é»è©±ã«ãããã¨ãããã£ã¦ããä¸è½ããã¯ãã¢ãéãã¦è¡ãã"
+"ãã®ã§ã¯ãªãããã§ããããã¯ããã¾ãã¾ãªãã°ã®å©æ´»ç¨ã«é¢ä¿ããããããã¾ã"
+"ãã<a href=\"http://www.osnews.com/story/27416/"
+"The_second_operating_system_hiding_in_every_mobile_phone\">æºå¸¯é»è©±ã®é»æ³¢ã½ã"
+"ãã¦ã§ã¢ã«ã¯ããããã®ãã°ããã</a>ã®ã§ãã"
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
-"have modifiable software</a>, which makes them vulnerable to viruses."
+"<a href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-"
+"codes-security\">The NSA has put back doors into nonfree encryption "
+"software</a>. We don't know which ones they are, but we can be sure they "
+"include some widely used systems. This reinforces the point that you can "
+"never trust the security of nonfree software."
msgstr ""
-"<a
href=\"http://www.bunniestudios.com/blog/?p=3554\">ãããã©ãã·ã¥ã¡ã¢ãªã¯"
-"ä¿®æ£å¯è½ãªã½ããã¦ã§ã¢ãæã</a>ãã¦ã£ã«ã¹ã«å¯¾ãã¦èå¼±ã§ãã"
#. type: Content of: <ul><li><p>
-msgid ""
-"We don't call this a “back door” because it is normal that you "
-"can install a new system in a computer given physical access to it. "
-"However, memory sticks and cards should not be modifiable in this way."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-"
+#| "flaw-put-users-lives-on-display.html\"> The FTC punished a company for "
+#| "making webcams with bad security so that it was easy for anyone to watch "
+#| "them</a>."
+msgid ""
+"The FTC punished a company for making webcams with <a href=\"http://www."
+"nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-"
+"display.html\"> bad security so that it was easy for anyone to watch through "
+"them</a>."
msgstr ""
-"ããããã¡ã¯ããããããã¯ãã¢ãã¨ã¯è¨ãã¾ããããªããªããç©ççã¢ã¯ã»ã¹ãå¯"
-"è½ãªã³ã³ãã¥ã¼ã¿ã«æ°ããã·ã¹ãã
ãã¤ã³ã¹ãã¼ã«ã§ããã®ã¯æ®éã ããã§ãããã"
-"ããã¡ã¢ãªã»ã¹ãã£ãã¯ã¨ã«ã¼ãã¯ãã®æ¹å¼ã§ä¿®æ£å¯è½ã§ããã¹ãã§ã¯ããã¾ããã"
+"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
+"put-users-lives-on-display.html\">FTCã¯èª°ã§ãç°¡åã«è¦ããã¨ãã§ããæªãã»ãã¥"
+"ãªãã£ã®webcamãä½ã£ãä¼ç¤¾ãç½°ãã¾ãã</a>ã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
+#| "nonfree software in disk drives can be written by a nonfree program.</a> "
+#| "This makes any system vulnerable to persistent attacks that normal "
+#| "forensics won't detect."
msgid ""
"<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
-"nonfree software in disk drives can be written by a nonfree program.</a> "
+"nonfree software in disk drives can be written by a nonfree program</a>. "
"This makes any system vulnerable to persistent attacks that normal forensics "
"won't detect."
msgstr ""
@@ -852,20 +950,71 @@
"ã¯æ¤åºã§ãã¾ããã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-"
+#| "jack-dies-days-before-scheduled-black-hat-appearance/\"> It is possible "
+#| "to kill people by taking control of medical implants by radio</a>. Here "
+#| "is <a href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
+#| "information</a>. And <a href=\"http://blog.ioactive.com/2013/02/broken-"
+#| "hearts-how-plausible-was.html\">here</a>."
msgid ""
-"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
-"users.html\"> Many smartphone apps use insecure authentication methods when "
-"storing your personal data on remote servers.</a> This leaves personal "
-"information like email addresses, passwords, and health information "
-"vulnerable. Because many of these apps are proprietary it makes it hard to "
-"impossible to know which apps are at risk."
+"It is possible to <a href=\"http://siliconangle.com/blog/2013/07/27/famed-"
+"hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\"> kill "
+"people by taking control of medical implants by radio</a>. More information "
+"in <a href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a> "
+"and <a href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-"
+"was.html\"> IOActive Labs Research blog</a>."
msgstr ""
-"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
-"users.html\">å¤ãã®ã¹ãã¼ããã©ã³ã®ã¢ããªã¯é
éã®ãµã¼ãä¸ã«å人ã®ãã¼ã¿ãä¿ç®¡"
-"ããéãã»ãã¥ã¢ã§ãªãèªè¨¼æ¹å¼ã使ã£ã¦ãã¾ãã</a>
ããã¯é»åã¡ã¼ã«ã¢ãã¬ã¹ã"
-"ãã¹ã¯ã¼ããå»çæ
å ±ã®ãããªå人æ
å
±ãèå¼±ã®ã¾ã¾ã«ãã¾ããå¤ãã®ã¢ããªããã"
-"ãã©ã¤ã¨ã¿ãªãªã®ã§ãã©ã®ã¢ããªããªã¹ã¯ãããã®ãã«ã¤ãã¦ç¥ãã®ã¯é£ãããªã£ã¦"
-"ãã¾ãã"
+"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
+"dies-days-before-scheduled-black-hat-appearance/\">ã©ã¸ãªã«ãã£ã¦ã¤ã³ãã©ã³ã"
+"ã®å»çæ©å¨ã®ã³ã³ããã¼ã«ã奪ãã人ã殺ããã¨ãå¯è½ã§ã</a>ããã¡ãã«<a
href="
+"\"http://www.bbc.co.uk/news/technology-17631838\">ãã詳ããæ
å
±ãããã¾ã</"
+"a>ãããã¦ã<a
href=\"http://blog.ioactive.com/2013/02/broken-hearts-how-"
+"plausible-was.html\">ãã¡ãã«ã</a>ã"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
+"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
+"intrusion."
+msgstr ""
+"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
+"hack/\">ãã¹ãã¼ããã¼ã ã</a>ã¯ä¾µå
¥ã«å¯¾ãã¦ãã«ããã»ã©èå¼±ã§ãããã¨ãå¤æ"
+"ãã¾ããã"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
+"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
+"microphone-cameras.html\"> Crackers found a way to break security on a "
+"“smart” TV</a> and use its camera to watch the people who are "
+"watching TV."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+#| "hacking_music_can_take_control_your_car/\"> It is possible to take "
+#| "control of some car computers through malware in music files</a>. Also "
+#| "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+#| "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+#| "\">more information</a>."
+msgid ""
+"It is possible to take control of some car computers through <a href="
+"\"http://www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\"> malware in music files</a>. "
+"Also <a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+"_r=0\"> by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+"\">more information</a>."
+msgstr ""
+"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\">é³æ¥½ãã¡ã¤ã«ã®ä¸ã®ãã«ã¦ã§ã¢ãéã"
+"ã¦ããè»ã®ã³ã³ãã¥ã¼ã¿ã®ã³ã³ããã¼ã«ã奪ããã¨ãå¯è½ã§ã</a>ãã¾ãã<a
href="
+"\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">ã©ã¸ãªã§ã</"
+"a>ããã¡ãã«<a
href=\"http://www.autosec.org/faq.html\">ãã詳ããæ
å ±ããã"
+"ã¾ã</a>ã"
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -941,6 +1090,13 @@
msgid "Updated:"
msgstr "æçµæ´æ°:"
+#~ msgid ""
+#~ "They could track the car, start or stop the engine, and activate or "
+#~ "deactivate the brakes, and more."
+#~ msgstr ""
+#~
"ãããã¯ããã®è»ã追跡ããã¨ã³ã¸ã³ãããããæ¢ãããããã¬ã¼ããå¹ããã"
+#~ "ããç·©ãããããªã©ãªã©ã§ããã®ã§ãã"
+
#, fuzzy
#~| msgid ""
#~| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary-insecurity.pot 18 Sep 2018 17:27:39 -0000 1.71
+++ proprietary-insecurity.pot 26 Sep 2018 14:28:11 -0000 1.72
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-09-18 17:25+0000\n"
+"POT-Creation-Date: 2018-09-26 14:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,6 +77,44 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Researchers have discovered how to <a "
+"href=\"http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\">
"
+"hide voice commands in other audio</a>, so that people cannot hear them, but "
+"Alexa and Siri can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a "
+"href=\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it "
+"into a listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a "
+"href=\"https://stallman.org/articles/on-hacking.html\"> don't use "
+"“hacking” to mean “breaking security”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a "
+"href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\">
"
+"hijacked by programs that play commands in ultrasound that humans can't "
+"hear</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Samsung phones randomly <a "
"href=\"https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages\">send
"
"photos to people in the owner's contact list</a>."
@@ -98,17 +136,17 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon recently invited consumers to be suckers and <a "
-"href=\"https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo\">
"
-"allow delivery staff to open their front doors</a>. Wouldn't you know it, "
-"the system has a grave security flaw."
+"Intel's intentional “management engine” back door has <a "
+"href=\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\">
"
+"unintended back doors</a> too."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Intel's intentional “management engine” back door has <a "
-"href=\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\">
"
-"unintended back doors</a> too."
+"Amazon recently invited consumers to be suckers and <a "
+"href=\"https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo\">
"
+"allow delivery staff to open their front doors</a>. Wouldn't you know it, "
+"the system has a grave security flaw."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -147,24 +185,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"It is unfortunate that the article uses the term <a "
-"href=\"/philosophy/words-to-avoid.html#Monetize\"> "
-"“monetize”</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Siri, Alexa, and all the other voice-control systems can be <a "
-"href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\">
"
-"hijacked by programs that play commands in ultrasound that humans can't "
-"hear</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a "
-"href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html\">
"
-"Crackers found a way to break security on a “smart” TV</a> and "
-"use its camera to watch the people who are watching TV."
+"href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -184,33 +205,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) "
-"pre-installed on 28 models of HP laptops logged the user's keystroke to a "
-"file in the filesystem. Any process with access to the filesystem or the "
-"MapViewOfFile API could gain access to the log. Furthermore, <a "
-"href=\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt\">according
"
-"to modzero</a> the “information-leak via Covert Storage Channel "
-"enables malware authors to capture keystrokes without taking the risk of "
-"being classified as malicious task by AV heuristics”."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The proprietary code that runs pacemakers, insulin pumps, and other medical "
-"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
-"of gross security faults</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
-"by the Shadowbrokers group, are now being used to <a "
-"href=\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/\">attack
"
-"a great number of Windows computers with ransomware</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Intel's CPU backdoor—the Intel Management Engine—had a <a "
"href=\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/\">major
"
"security vulnerability for 10 years</a>."
@@ -235,6 +229,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The proprietary code that runs pacemakers, insulin pumps, and other medical "
+"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
+"of gross security faults</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) "
+"pre-installed on 28 models of HP laptops logged the user's keystroke to a "
+"file in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a "
+"href=\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt\">according
"
+"to modzero</a> the “information-leak via Covert Storage Channel "
+"enables malware authors to capture keystrokes without taking the risk of "
+"being classified as malicious task by AV heuristics”."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a "
+"href=\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/\">attack
"
+"a great number of Windows computers with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android devices <a "
"href=\"https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\">
"
"can be hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's "
@@ -258,67 +279,67 @@
#. type: Content of: <ul><li><p>
msgid ""
-"WhatsApp has a feature that <a "
-"href=\"https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/\">
"
-"has been described as a “back door”</a> because it would enable "
-"governments to nullify its encryption."
+"If you buy a used “smart” car, house, TV, refrigerator, etc., "
+"usually <a "
+"href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-used.html\">the
"
+"previous owners can still remotely control it</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"The developers say that it wasn't intended as a back door, and that may well "
-"be true. But that leaves the crucial question of whether it functions as "
-"one. Because the program is nonfree, we cannot check by studying it."
+"The mobile apps for communicating <a "
+"href=\"https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/\">with
"
+"a smart but foolish car have very bad security</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"The “smart” toys My Friend Cayla and i-Que can be <a "
-"href=\"https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws\">remotely
"
-"controlled with a mobile phone</a>; physical access is not necessary. This "
-"would enable crackers to listen in on a child's conversations, and even "
-"speak into the toys themselves."
+"This is in addition to the fact that the car contains a cellular modem that "
+"tells big brother all the time where it is. If you own such a car, it would "
+"be wise to disconnect the modem so as to turn off the tracking."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"This means a burglar could speak into the toys and ask the child to unlock "
-"the front door while Mommy's not looking."
+"Samsung phones <a "
+"href=\"https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/\">have
"
+"a security hole that allows an SMS message to install ransomware</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"The mobile apps for communicating <a "
-"href=\"https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/\">with
"
-"a smart but foolish car have very bad security</a>."
+"WhatsApp has a feature that <a "
+"href=\"https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/\">
"
+"has been described as a “back door”</a> because it would enable "
+"governments to nullify its encryption."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"This is in addition to the fact that the car contains a cellular modem that "
-"tells big brother all the time where it is. If you own such a car, it would "
-"be wise to disconnect the modem so as to turn off the tracking."
+"The developers say that it wasn't intended as a back door, and that may well "
+"be true. But that leaves the crucial question of whether it functions as "
+"one. Because the program is nonfree, we cannot check by studying it."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"If you buy a used “smart” car, house, TV, refrigerator, etc., "
-"usually <a "
-"href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-used.html\">the
"
-"previous owners can still remotely control it</a>."
+"The “smart” toys My Friend Cayla and i-Que can be <a "
+"href=\"https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws\">remotely
"
+"controlled with a mobile phone</a>; physical access is not necessary. This "
+"would enable crackers to listen in on a child's conversations, and even "
+"speak into the toys themselves."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Samsung phones <a "
-"href=\"https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/\">have
"
-"a security hole that allows an SMS message to install ransomware</a>."
+"This means a burglar could speak into the toys and ask the child to unlock "
+"the front door while Mommy's not looking."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
"4G LTE phone networks are drastically insecure. They can be <a "
-"href=\"https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">
"
+"href=\"https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">
"
"taken over by third parties and used for man-in-the-middle attacks</a>."
msgstr ""
@@ -381,16 +402,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Over 70 brands of network-connected surveillance cameras <a "
-"href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">have
"
-"security bugs that allow anyone to watch through them</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Samsung's “Smart Home” has a big security hole; <a "
-"href=\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/\">unauthorized
"
-"people can remotely control it</a>."
+"href=\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/\">
"
+"unauthorized people can remotely control it</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -408,66 +422,72 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Nissan Leaf has a built-in cell phone modem which allows effectively "
-"anyone <a "
-"href=\"https://www.troyhunt.com/controlling-vehicle-features-of-nissan/\">to "
-"access its computers remotely and make changes in various settings</a>."
+"A bug in the iThings Messages app <a "
+"href=\"https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed
"
+"a malicious web site to extract all the user's messaging history</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"That's easy to do because the system has no authentication when accessed "
-"through the modem. However, even if it asked for authentication, you "
-"couldn't be confident that Nissan has no access. The software in the car is "
-"proprietary, <a "
-"href=\"/philosophy/free-software-even-more-important.html\">which means it "
-"demands blind faith from its users</a>."
+"Malware was found on <a "
+"href=\"http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html\">
"
+"security cameras available through Amazon</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Even if no one connects to the car remotely, the cell phone modem enables "
-"the phone company to track the car's movements all the time; it is possible "
-"to physically remove the cell phone modem though."
+"A camera that records locally on physical media, and has no network "
+"connection, does not threaten people with surveillance—neither by "
+"watching people through the camera, nor through malware in the camera."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Malware found on <a "
-"href=\"http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html\">security
"
-"cameras available through Amazon</a>."
+"Over 70 brands of network-connected surveillance cameras have <a "
+"href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">
"
+"security bugs that allow anyone to watch through them</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"A camera that records locally on physical media, and has no network "
-"connection, does not threaten people with surveillance—neither by "
-"watching people through the camera, nor through malware in the camera."
+"Many proprietary payment apps <a "
+"href=\"http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data\">transmit
"
+"personal data in an insecure way</a>. However, the worse aspect of these "
+"apps is that <a href=\"/philosophy/surveillance-vs-democracy.html\">payment "
+"is not anonymous</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"A bug in the iThings Messages app <a "
-"href=\"https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed
"
-"a malicious web site to extract all the user's messaging history</a>."
+"The Nissan Leaf has a built-in cell phone modem which allows effectively "
+"anyone <a "
+"href=\"https://www.troyhunt.com/controlling-vehicle-features-of-nissan/\">to "
+"access its computers remotely and make changes in various settings</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Many proprietary payment apps <a "
-"href=\"http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data\">
"
-"transmit personal data in an insecure way</a>. However, the worse aspect of "
-"these apps is that <a "
-"href=\"/philosophy/surveillance-vs-democracy.html\">payment is not "
-"anonymous</a>."
+"That's easy to do because the system has no authentication when accessed "
+"through the modem. However, even if it asked for authentication, you "
+"couldn't be confident that Nissan has no access. The software in the car is "
+"proprietary, <a "
+"href=\"/philosophy/free-software-even-more-important.html\">which means it "
+"demands blind faith from its users</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even if no one connects to the car remotely, the cell phone modem enables "
+"the phone company to track the car's movements all the time; it is possible "
+"to physically remove the cell phone modem, though."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"FitBit fitness trackers <a "
+"FitBit fitness trackers have a <a "
"href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">
"
-"have a Bluetooth vulnerability</a> that allows attackers to send malware to "
-"the devices, which can subsequently spread to computers and other FitBit "
+"Bluetooth vulnerability</a> that allows attackers to send malware to the "
+"devices, which can subsequently spread to computers and other FitBit "
"trackers that interact with them."
msgstr ""
@@ -476,16 +496,8 @@
"“Self-encrypting” disk drives do the encryption with proprietary "
"firmware so you can't trust it. Western Digital's “My Passport” "
"drives <a "
-"href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">have
"
-"a back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Mac OS X had an <a "
-"href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/\">
"
-"intentional local back door for 4 years</a>, which could be exploited by "
-"attackers to gain root privileges."
+"href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">
"
+"have a back door</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -500,24 +512,38 @@
#. type: Content of: <ul><li><p>
msgid ""
"Crackers were able to <a "
-"href=\"http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take
"
-"remote control of the Jeep</a> “connected car”."
+"href=\"http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">
"
+"take remote control of the Jeep</a> “connected car”. They could "
+"track the car, start or stop the engine, and activate or deactivate the "
+"brakes, and more."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "I expect that Chrysler and the NSA can do this too."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"They could track the car, start or stop the engine, and activate or "
-"deactivate the brakes, and more."
+"If I ever own a car, and it contains a portable phone, I will deactivate "
+"that."
msgstr ""
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid ""
+"Due to bad security in a drug pump, crackers could use it to <a "
+"href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/\">
"
+"kill patients</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"<a "
+"href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html\">
"
+"Many smartphone apps use insecure authentication methods when storing your "
+"personal data on remote servers</a>. This leaves personal information like "
+"email addresses, passwords, and health information vulnerable. Because many "
+"of these apps are proprietary it makes it hard to impossible to know which "
+"apps are at risk."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -536,29 +562,33 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Due to bad security in a drug pump, crackers could use it to <a "
-"href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/\">kill
"
-"patients</a>."
+"Mac OS X had an <a "
+"href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/\">
"
+"intentional local back door for 4 years</a>, which could be exploited by "
+"attackers to gain root privileges."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"<a "
-"href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">
"
-"The NSA can tap data in smart phones, including iPhones, Android, and "
-"BlackBerry</a>. While there is not much detail here, it seems that this "
-"does not operate via the universal back door that we know nearly all "
-"portable phones have. It may involve exploiting various bugs. There are <a "
-"href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
"
-"lots of bugs in the phones' radio software</a>."
+"An app to prevent “identity theft” (access to personal data) by "
+"storing users' data on a special server <a "
+"href=\"http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/\">was
"
+"deactivated by its developer</a> which had discovered a security flaw."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"<a "
-"href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/\">
"
-"“Smart homes”</a> turn out to be stupidly vulnerable to "
-"intrusion."
+"That developer seems to be conscientious about protecting personal data from "
+"third parties in general, but it can't protect that data from the state. "
+"Quite the contrary: confiding your data to someone else's server, if not "
+"first encrypted by you with free software, undermines your rights."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Lots of <a "
+"href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/\"> "
+"hospital equipment has lousy security</a>, and it can be fatal."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -570,95 +600,97 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a "
-"href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">
"
-"The FTC punished a company for making webcams with bad security so that it "
-"was easy for anyone to watch them</a>."
+"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
+"have modifiable software</a>, which makes them vulnerable to viruses."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"<a "
-"href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">
"
-"It is possible to take control of some car computers through malware in "
-"music files</a>. Also <a "
-"href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">by "
-"radio</a>. Here is <a href=\"http://www.autosec.org/faq.html\">more "
-"information</a>."
+"We don't call this a “back door” because it is normal that you "
+"can install a new system in a computer, given physical access to it. "
+"However, memory sticks and cards should not be modifiable in this way."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
"<a "
-"href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">
"
-"It is possible to kill people by taking control of medical implants by "
-"radio</a>. Here is <a "
-"href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
-"information</a>. And <a "
-"href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">here</a>."
+"href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/\">
"
+"Point-of-sale terminals running Windows were taken over</a> and turned into "
+"a botnet for the purpose of collecting customers' credit card numbers."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Lots of <a "
-"href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/\">hospital
"
-"equipment has lousy security</a>, and it can be fatal."
+"<a "
+"href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">
"
+"The NSA can tap data in smart phones, including iPhones, Android, and "
+"BlackBerry</a>. While there is not much detail here, it seems that this "
+"does not operate via the universal back door that we know nearly all "
+"portable phones have. It may involve exploiting various bugs. There are <a "
+"href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
"
+"lots of bugs in the phones' radio software</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
"<a "
-"href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/\">
"
-"Point-of-sale terminals running Windows were taken over and turned into a "
-"botnet for the purpose of collecting customers' credit card numbers</a>."
+"href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">The
"
+"NSA has put back doors into nonfree encryption software</a>. We don't know "
+"which ones they are, but we can be sure they include some widely used "
+"systems. This reinforces the point that you can never trust the security of "
+"nonfree software."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"An app to prevent “identity theft” (access to personal data) by "
-"storing users' data on a special server <a "
-"href=\"http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/\">was
"
-"deactivated by its developer</a> which had discovered a security flaw."
+"The FTC punished a company for making webcams with <a "
+"href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">
"
+"bad security so that it was easy for anyone to watch through them</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"That developer seems to be conscientious about protecting personal data from "
-"third parties in general, but it can't protect that data from the state. "
-"Quite the contrary: confiding your data to someone else's server, if not "
-"first encrypted by you with free software, undermines your rights."
+"<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
+"nonfree software in disk drives can be written by a nonfree "
+"program</a>. This makes any system vulnerable to persistent attacks that "
+"normal forensics won't detect."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
-"have modifiable software</a>, which makes them vulnerable to viruses."
+"It is possible to <a "
+"href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">
"
+"kill people by taking control of medical implants by radio</a>. More "
+"information in <a href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC "
+"News</a> and <a "
+"href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">
"
+"IOActive Labs Research blog</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"We don't call this a “back door” because it is normal that you "
-"can install a new system in a computer given physical access to it. "
-"However, memory sticks and cards should not be modifiable in this way."
+"<a "
+"href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/\">
"
+"“Smart homes”</a> turn out to be stupidly vulnerable to "
+"intrusion."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
-"nonfree software in disk drives can be written by a nonfree program.</a> "
-"This makes any system vulnerable to persistent attacks that normal forensics "
-"won't detect."
+"<a "
+"href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html\">
"
+"Crackers found a way to break security on a “smart” TV</a> and "
+"use its camera to watch the people who are watching TV."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"<a "
-"href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html\">
"
-"Many smartphone apps use insecure authentication methods when storing your "
-"personal data on remote servers.</a> This leaves personal information like "
-"email addresses, passwords, and health information vulnerable. Because many "
-"of these apps are proprietary it makes it hard to impossible to know which "
-"apps are at risk."
+"It is possible to take control of some car computers through <a "
+"href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">
"
+"malware in music files</a>. Also <a "
+"href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\"> by "
+"radio</a>. Here is <a href=\"http://www.autosec.org/faq.html\">more "
+"information</a>."
msgstr ""
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary-insecurity.ru.po 18 Sep 2018 17:15:13 -0000 1.181
+++ proprietary-insecurity.ru.po 26 Sep 2018 14:28:11 -0000 1.182
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-07-27 02:56+0000\n"
+"POT-Creation-Date: 2018-09-26 14:26+0000\n"
"PO-Revision-Date: 2018-09-18 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-09-26 14:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -107,6 +108,49 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
+"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
+"voice commands in other audio</a>, so that people cannot hear them, but "
+"Alexa and Siri can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+"Siri, Alexa и вÑе дÑÑгие ÑиÑÑÐµÐ¼Ñ Ð³Ð¾Ð»Ð¾Ñового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">взÑÑÑ Ð¿Ð¾Ð´ конÑÑолÑ
пÑогÑаммами, "
+"коÑоÑÑе воÑпÑоизводÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð²
неÑлÑÑимом лÑдÑми ÑлÑÑÑазвÑковом
диапазоне</"
+"a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Samsung phones randomly <a href=\"https://www.theverge.com/"
"circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"
"\">send photos to people in the owner's contact list</a>."
@@ -137,6 +181,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Intel's intentional “management engine” back door has <a href="
+"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
+"unintended back doors</a> too."
+msgstr ""
+"РпÑеднамеÑенном ÑеÑном Ñ
оде в “маÑине
ÑпÑавлениє Intel еÑÑÑ "
+"Ñакже <a href=\"https://www.theregister.co.uk/2017/11/20/"
+"intel_flags_firmware_flaws/\"> непÑеднамеÑеннÑй ÑеÑнÑй
Ñ
од</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -149,16 +203,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Intel's intentional “management engine” back door has <a href="
-"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
-"unintended back doors</a> too."
-msgstr ""
-"РпÑеднамеÑенном ÑеÑном Ñ
оде в “маÑине
ÑпÑавлениє Intel еÑÑÑ "
-"Ñакже <a href=\"https://www.theregister.co.uk/2017/11/20/"
-"intel_flags_firmware_flaws/\"> непÑеднамеÑеннÑй ÑеÑнÑй
Ñ
од</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Bad security in some cars makes it possible to <a href=\"https://cve.mitre."
"org/cgi-bin/cvename.cgi?name=CVE-2017-14937\"> remotely activate the "
"airbags</a>."
@@ -205,42 +249,22 @@
msgstr "Ðе бÑÐ´Ñ Ð¿ÑоÑÑоÑилей — оÑкажиÑÑ
Ð¾Ñ Ð²ÑеÑ
клеÑей."
#. type: Content of: <ul><li><p>
+# | It is unfortunate that the article uses the term <a
+# | href=\"/philosophy/words-to-avoid.html#Monetize\">[-
+# | -]“monetize”</a>.
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\"> “monetize”</a>."
msgid ""
"It is unfortunate that the article uses the term <a href=\"/philosophy/words-"
-"to-avoid.html#Monetize\"> “monetize”</a>."
+"to-avoid.html#Monetize\">“monetize”</a>."
msgstr ""
"ÐÑÐµÐ½Ñ Ð¶Ð°Ð»Ñ, ÑÑо в ÑÑаÑÑе ÑпоÑÑеблÑеÑÑÑ
Ñлово <a href=\"/philosophy/words-to-"
"avoid.html#Monetize\"> “монеÑизиÑоваÑÑ”</a>."
#. type: Content of: <ul><li><p>
msgid ""
-"Siri, Alexa, and all the other voice-control systems can be <a href="
-"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
-"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
-"commands in ultrasound that humans can't hear</a>."
-msgstr ""
-"Siri, Alexa и вÑе дÑÑгие ÑиÑÑÐµÐ¼Ñ Ð³Ð¾Ð»Ð¾Ñового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ <a href="
-"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
-"astoundingly-easy-to-hack-siri-and-alexa\">взÑÑÑ Ð¿Ð¾Ð´ конÑÑолÑ
пÑогÑаммами, "
-"коÑоÑÑе воÑпÑоизводÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð²
неÑлÑÑимом лÑдÑми ÑлÑÑÑазвÑковом
диапазоне</"
-"a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
-"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
-"microphone-cameras.html\"> Crackers found a way to break security on a "
-"“smart” TV</a> and use its camera to watch the people who are "
-"watching TV."
-msgstr ""
-"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
-"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
-"microphone-cameras.html\"> ÐзломÑики наÑли ÑпоÑоб
вÑкÑÑÑÑ Ð·Ð°ÑиÑÑ Ð² “"
-"инÑеллекÑÑалÑном” ÑелевизоÑе</a> и
воÑполÑзоваÑÑÑÑ ÐµÐ³Ð¾ видеокамеÑой, "
-"ÑÑÐ¾Ð±Ñ ÑмоÑÑеÑÑ Ð½Ð° лÑдей, коÑоÑÑе ÑмоÑÑÑÑ
ÑелевизоÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Many models of Internet-connected cameras <a href=\"/proprietary/proprietary-"
"back-doors.html#InternetCameraBackDoor\"> have backdoors</a>."
msgstr ""
@@ -264,52 +288,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
-"installed on 28 models of HP laptops logged the user's keystroke to a file "
-"in the filesystem. Any process with access to the filesystem or the "
-"MapViewOfFile API could gain access to the log. Furthermore, <a href="
-"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
-"\">according to modzero</a> the “information-leak via Covert Storage "
-"Channel enables malware authors to capture keystrokes without taking the "
-"risk of being classified as malicious task by AV heuristics”."
-msgstr ""
-"ÐÐ°ÐºÐµÑ Ð°ÑдиодÑайвеÑов Conexant HD (веÑÑии 1.0.0.46 и
более ÑанниÑ
), "
-"пÑедÑÑÑановленнÑй на 28 моделей
поÑÑаÑивнÑÑ
компÑÑÑеÑов Hewlett-"
-"Packard, запиÑÑвали в Ñайл нажаÑиÑ
полÑзоваÑÐµÐ»Ñ Ð½Ð° клавиÑи. ÐÑбой пÑоÑеÑÑ, Ñ "
-"коÑоÑого бÑл доÑÑÑп к MapViewOfFile, мог ÑиÑаÑÑ
ÑÑÐ¾Ñ Ð¶ÑÑнал. Ðолее Ñого, "
-"ÑоглаÑно modzero, “<a href=\"https://www.modzero.ch/advisories/"
-"MZ-17-01-Conexant-Keylogger.txt\">ÑÑеÑка инÑоÑмаÑии
ÑеÑез ÑкÑÑÑÑй канал "
-"накопиÑÐµÐ»Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÐµÑ Ð°Ð²ÑоÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм пеÑеÑ
ваÑÑваÑÑ Ð½Ð°Ð¶Ð°ÑÐ¸Ñ Ð½Ð° "
-"клавиÑи без ÑиÑка бÑÑÑ
клаÑÑиÑиÑиÑованнÑм алгоÑиÑмами
анÑивиÑÑÑов как "
-"вÑедоноÑÐ½Ð°Ñ Ð·Ð°Ð´Ð°Ñа</a>”."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The proprietary code that runs pacemakers, insulin pumps, and other medical "
-"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
-"of gross security faults</a>."
-msgstr ""
-"РнеÑвободнÑÑ
пÑогÑаммаÑ
, под ÑпÑавлением
коÑоÑÑÑ
ÑабоÑаÑÑ <a href=\"http://"
-"www.bbc.co.uk/news/technology-40042584\">каÑдиоÑÑимÑлÑÑоÑÑ,
ÑпÑиÑÑ Ñ "
-"инÑÑлином и дÑÑгие медиÑинÑкие пÑибоÑÑ</a>,
полнÑм-полно гÑÑбÑÑ
пÑоÑÑеÑов по "
-"ÑаÑÑи безопаÑноÑÑи."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
-"by the Shadowbrokers group, are now being used to <a href=\"https://"
-"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
-"computers-around-the-world/\">attack a great number of Windows computers "
-"with ransomware</a>."
-msgstr ""
-"ÐÑиÑиÑеÑкие оÑибки в Windows, коÑоÑÑе
накапливалиÑÑ Ð² ÐÐРа заÑем бÑли "
-"ÑазглаÑÐµÐ½Ñ Ð³ÑÑппой Shadowbrokers, ÑепеÑÑ
пÑименÑÑÑÑÑ, ÑÑÐ¾Ð±Ñ <a href="
-"\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-"
-"helping-hijack-computers-around-the-world/\">заÑажаÑÑ
компÑÑÑеÑÑ Ð¿Ð¾Ð´ Windows "
-"Ñ ÑелÑÑ Ð¿Ð¾Ð»ÑÑÐµÐ½Ð¸Ñ Ð²ÑкÑпа.</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Intel's CPU backdoor—the Intel Management Engine—had a <a href="
"\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-"
"execution-bug-that-lurked-in-cpus-for-10-years/\">major security "
@@ -349,6 +327,52 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The proprietary code that runs pacemakers, insulin pumps, and other medical "
+"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
+"of gross security faults</a>."
+msgstr ""
+"РнеÑвободнÑÑ
пÑогÑаммаÑ
, под ÑпÑавлением
коÑоÑÑÑ
ÑабоÑаÑÑ <a href=\"http://"
+"www.bbc.co.uk/news/technology-40042584\">каÑдиоÑÑимÑлÑÑоÑÑ,
ÑпÑиÑÑ Ñ "
+"инÑÑлином и дÑÑгие медиÑинÑкие пÑибоÑÑ</a>,
полнÑм-полно гÑÑбÑÑ
пÑоÑÑеÑов по "
+"ÑаÑÑи безопаÑноÑÑи."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
+"installed on 28 models of HP laptops logged the user's keystroke to a file "
+"in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a href="
+"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
+"\">according to modzero</a> the “information-leak via Covert Storage "
+"Channel enables malware authors to capture keystrokes without taking the "
+"risk of being classified as malicious task by AV heuristics”."
+msgstr ""
+"ÐÐ°ÐºÐµÑ Ð°ÑдиодÑайвеÑов Conexant HD (веÑÑии 1.0.0.46 и
более ÑанниÑ
), "
+"пÑедÑÑÑановленнÑй на 28 моделей
поÑÑаÑивнÑÑ
компÑÑÑеÑов Hewlett-"
+"Packard, запиÑÑвали в Ñайл нажаÑиÑ
полÑзоваÑÐµÐ»Ñ Ð½Ð° клавиÑи. ÐÑбой пÑоÑеÑÑ, Ñ "
+"коÑоÑого бÑл доÑÑÑп к MapViewOfFile, мог ÑиÑаÑÑ
ÑÑÐ¾Ñ Ð¶ÑÑнал. Ðолее Ñого, "
+"ÑоглаÑно modzero, “<a href=\"https://www.modzero.ch/advisories/"
+"MZ-17-01-Conexant-Keylogger.txt\">ÑÑеÑка инÑоÑмаÑии
ÑеÑез ÑкÑÑÑÑй канал "
+"накопиÑÐµÐ»Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÐµÑ Ð°Ð²ÑоÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм пеÑеÑ
ваÑÑваÑÑ Ð½Ð°Ð¶Ð°ÑÐ¸Ñ Ð½Ð° "
+"клавиÑи без ÑиÑка бÑÑÑ
клаÑÑиÑиÑиÑованнÑм алгоÑиÑмами
анÑивиÑÑÑов как "
+"вÑедоноÑÐ½Ð°Ñ Ð·Ð°Ð´Ð°Ñа</a>”."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+"ÐÑиÑиÑеÑкие оÑибки в Windows, коÑоÑÑе
накапливалиÑÑ Ð² ÐÐРа заÑем бÑли "
+"ÑазглаÑÐµÐ½Ñ Ð³ÑÑппой Shadowbrokers, ÑепеÑÑ
пÑименÑÑÑÑÑ, ÑÑÐ¾Ð±Ñ <a href="
+"\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-"
+"helping-hijack-computers-around-the-world/\">заÑажаÑÑ
компÑÑÑеÑÑ Ð¿Ð¾Ð´ Windows "
+"Ñ ÑелÑÑ Ð¿Ð¾Ð»ÑÑÐµÐ½Ð¸Ñ Ð²ÑкÑпа.</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-"
"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
@@ -386,6 +410,49 @@
#. type: Content of: <ul><li><p>
msgid ""
+"If you buy a used “smart” car, house, TV, refrigerator, etc., "
+"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
+"used.html\">the previous owners can still remotely control it</a>."
+msgstr ""
+"ÐÑли Ð²Ñ Ð¿Ð¾ÐºÑпаеÑе “ÑмнÑй”
авÑомобилÑ, дом, ÑелевизоÑ, "
+"Ñ
олодилÑник и Ñ.д., обÑÑно <a
href=\"http://boingboing.net/2017/02/20/the-"
+"previous-owners-of-used.html\">пÑедÑдÑÑие владелÑÑÑ
могÑÑ Ð¿Ð¾-пÑÐµÐ¶Ð½ÐµÐ¼Ñ "
+"ÑпÑавлÑÑÑ Ð¸Ð¼ на ÑаÑÑÑоÑнии</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The mobile apps for communicating <a href=\"https://www.bleepingcomputer.com/"
+"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
+"\">with a smart but foolish car have very bad security</a>."
+msgstr ""
+"ÐобилÑнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑвÑзи <a
href=\"https://www.bleepingcomputer.com/"
+"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
+"\">ÑмнÑми, но дÑÑаÑкими авÑомобилÑми
оÑлиÑаÑÑÑÑ Ð¾ÑÐµÐ½Ñ Ñлабой безопаÑноÑÑÑÑ</"
+"a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This is in addition to the fact that the car contains a cellular modem that "
+"tells big brother all the time where it is. If you own such a car, it would "
+"be wise to disconnect the modem so as to turn off the tracking."
+msgstr ""
+"ÐÑо дополнÑÐµÑ ÑÐ¾Ñ ÑакÑ, ÑÑо авÑомобилÑ
ÑодеÑÐ¶Ð¸Ñ Ð¼Ð¾Ð´ÐµÐ¼ ÑоÑовой ÑвÑзи, коÑоÑÑй "
+"вÑе вÑÐµÐ¼Ñ ÑаÑÑказÑваеÑ, где он наÑ
одиÑÑÑ,
СÑаÑÑÐµÐ¼Ñ ÐÑаÑÑ. ÐÑли Ð²Ñ Ð²Ð»Ð°Ð´ÐµÐµÑе "
+"Ñаким авÑомобилем, бÑло Ð±Ñ Ð¼ÑдÑÑм
оÑÑоединиÑÑ Ð¼Ð¾Ð´ÐµÐ¼, ÑÑÐ¾Ð±Ñ Ð²ÑклÑÑиÑÑ ÑлежкÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
+"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
+"\">have a security hole that allows an SMS message to install ransomware</a>."
+msgstr ""
+"Ð ÑелеÑонаÑ
Samsung еÑÑÑ <a
href=\"https://www.bleepingcomputer.com/news/"
+"security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-"
+"ransomware-attacks/\">пÑокол в заÑиÑе, позволÑÑÑий
ÑÑÑанавливаÑÑ Ð¿Ð¾ SMS "
+"пÑогÑаммÑ, ÑÑебÑÑÑие вÑкÑпа</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"WhatsApp has a feature that <a href=\"https://techcrunch.com/2017/01/13/"
"encrypted-messaging-platform-whatsapp-denies-backdoor-claim/\"> has been "
"described as a “back door”</a> because it would enable "
@@ -429,53 +496,20 @@
"пока не Ð²Ð¸Ð´Ð¸Ñ Ð¼Ð°Ð¼Ð°."
#. type: Content of: <ul><li><p>
-msgid ""
-"The mobile apps for communicating <a href=\"https://www.bleepingcomputer.com/"
-"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
-"\">with a smart but foolish car have very bad security</a>."
-msgstr ""
-"ÐобилÑнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑвÑзи <a
href=\"https://www.bleepingcomputer.com/"
-"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
-"\">ÑмнÑми, но дÑÑаÑкими авÑомобилÑми
оÑлиÑаÑÑÑÑ Ð¾ÑÐµÐ½Ñ Ñлабой безопаÑноÑÑÑÑ</"
-"a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is in addition to the fact that the car contains a cellular modem that "
-"tells big brother all the time where it is. If you own such a car, it would "
-"be wise to disconnect the modem so as to turn off the tracking."
-msgstr ""
-"ÐÑо дополнÑÐµÑ ÑÐ¾Ñ ÑакÑ, ÑÑо авÑомобилÑ
ÑодеÑÐ¶Ð¸Ñ Ð¼Ð¾Ð´ÐµÐ¼ ÑоÑовой ÑвÑзи, коÑоÑÑй "
-"вÑе вÑÐµÐ¼Ñ ÑаÑÑказÑваеÑ, где он наÑ
одиÑÑÑ,
СÑаÑÑÐµÐ¼Ñ ÐÑаÑÑ. ÐÑли Ð²Ñ Ð²Ð»Ð°Ð´ÐµÐµÑе "
-"Ñаким авÑомобилем, бÑло Ð±Ñ Ð¼ÑдÑÑм
оÑÑоединиÑÑ Ð¼Ð¾Ð´ÐµÐ¼, ÑÑÐ¾Ð±Ñ Ð²ÑклÑÑиÑÑ ÑлежкÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you buy a used “smart” car, house, TV, refrigerator, etc., "
-"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
-"used.html\">the previous owners can still remotely control it</a>."
-msgstr ""
-"ÐÑли Ð²Ñ Ð¿Ð¾ÐºÑпаеÑе “ÑмнÑй”
авÑомобилÑ, дом, ÑелевизоÑ, "
-"Ñ
олодилÑник и Ñ.д., обÑÑно <a
href=\"http://boingboing.net/2017/02/20/the-"
-"previous-owners-of-used.html\">пÑедÑдÑÑие владелÑÑÑ
могÑÑ Ð¿Ð¾-пÑÐµÐ¶Ð½ÐµÐ¼Ñ "
-"ÑпÑавлÑÑÑ Ð¸Ð¼ на ÑаÑÑÑоÑнии</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
-"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
-"\">have a security hole that allows an SMS message to install ransomware</a>."
-msgstr ""
-"Ð ÑелеÑонаÑ
Samsung еÑÑÑ <a
href=\"https://www.bleepingcomputer.com/news/"
-"security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-"
-"ransomware-attacks/\">пÑокол в заÑиÑе, позволÑÑÑий
ÑÑÑанавливаÑÑ Ð¿Ð¾ SMS "
-"пÑогÑаммÑ, ÑÑебÑÑÑие вÑкÑпа</a>."
-
-#. type: Content of: <ul><li><p>
+# | 4G LTE phone networks are drastically insecure. They can be <a
+# |
[-href=\"https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">-]
+# |
{+href=\"https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">+}
+# | taken over by third parties and used for man-in-the-middle attacks</a>.
+#, fuzzy
+#| msgid ""
+#| "4G LTE phone networks are drastically insecure. They can be <a href="
+#| "\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
+#| "uk/2016/10/23/"
+#| "every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
+#| "over by third parties and used for man-in-the-middle attacks</a>."
msgid ""
"4G LTE phone networks are drastically insecure. They can be <a href="
-"\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
-"uk/2016/10/23/"
+"\"https://www.theregister.co.uk/2016/10/23/"
"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
"over by third parties and used for man-in-the-middle attacks</a>."
msgstr ""
@@ -570,20 +604,19 @@
msgstr "GNU/Linux в анÑивиÑÑÑаÑ
не нÑждаеÑÑÑ."
#. type: Content of: <ul><li><p>
-msgid ""
-"Over 70 brands of network-connected surveillance cameras <a href=\"http://"
-"www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
-"\">have security bugs that allow anyone to watch through them</a>."
-msgstr ""
-"РкамеÑаÑ
наблÑÐ´ÐµÐ½Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ 70 маÑок <a
href=\"http://www.kerneronsec."
-"com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">обнаÑÑженÑ
недоÑеÑÑ "
-"безопаÑноÑÑи, позволÑÑÑие ÐºÐ¾Ð¼Ñ Ñгодно
подглÑдÑваÑÑ ÑеÑез ниÑ
</a>."
-
-#. type: Content of: <ul><li><p>
+# | Samsung's “Smart Home” has a big security hole; <a
+# |
href=\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/\">{+
+# | +}unauthorized people can remotely control it</a>.
+#, fuzzy
+#| msgid ""
+#| "Samsung's “Smart Home” has a big security hole; <a href="
+#| "\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-"
+#| "hackers-make-keys-to-front-door/\">unauthorized people can remotely "
+#| "control it</a>."
msgid ""
"Samsung's “Smart Home” has a big security hole; <a href=\"http://"
"arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-"
-"keys-to-front-door/\">unauthorized people can remotely control it</a>."
+"keys-to-front-door/\"> unauthorized people can remotely control it</a>."
msgstr ""
"Ð “инÑеллекÑÑалÑном доме” компании
Samsung еÑÑÑ Ð±Ð¾Ð»ÑÑÐ°Ñ Ð¿ÑоÑеÑ
а "
"безопаÑноÑÑи; <a
href=\"http://arstechnica.com/security/2016/05/samsung-"
@@ -609,46 +642,29 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Nissan Leaf has a built-in cell phone modem which allows effectively "
-"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
-"nissan/\">to access its computers remotely and make changes in various "
-"settings</a>."
-msgstr ""
-"Ð Nissan Leaf еÑÑÑ Ð²ÑÑÑоеннÑй ÑелеÑоннÑй модем,
позволÑÑÑий ÑакÑиÑеÑки ÐºÐ¾Ð¼Ñ "
-"Ñгодно <a
href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
-"nissan/\">полÑÑаÑÑ ÑдаленнÑй доÑÑÑп к
компÑÑÑеÑам и вноÑиÑÑ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² "
-"ÑазлиÑнÑе наÑÑÑойки</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"That's easy to do because the system has no authentication when accessed "
-"through the modem. However, even if it asked for authentication, you "
-"couldn't be confident that Nissan has no access. The software in the car is "
-"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
-"\">which means it demands blind faith from its users</a>."
-msgstr ""
-"ÐÑо неÑÑÑдно поÑомÑ, ÑÑо в ÑиÑÑеме неÑ
пÑовеÑки подлинноÑÑи полÑзоваÑÐµÐ»Ñ Ð¿Ñи "
-"доÑÑÑпе по модемÑ. Ðднако даже еÑли бÑ
модем пÑоводил пÑовеÑкÑ, нелÑÐ·Ñ Ð±Ñло "
-"Ð±Ñ Ð±ÑÑÑ ÑвеÑеннÑми, ÑÑо Ñ Nissan Ð½ÐµÑ Ð´Ð¾ÑÑÑпа.
ÐÑогÑÐ°Ð¼Ð¼Ñ Ð² авÑомобиле "
-"неÑвободнÑ, <a
href=\"/philosophy/free-software-even-more-important.html"
-"\">ÑÑо знаÑиÑ, они ÑÑебÑÑÑ Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей
Ñлепой веÑÑ</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Even if no one connects to the car remotely, the cell phone modem enables "
-"the phone company to track the car's movements all the time; it is possible "
-"to physically remove the cell phone modem though."
+"A bug in the iThings Messages app <a href=\"https://theintercept."
+"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
+"a malicious web site to extract all the user's messaging history</a>."
msgstr ""
-"Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой "
-"ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ "
-"авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи."
+"ÐÑибка в Messages, пÑиложении Ð´Ð»Ñ Ð°Ð¹-ÑÑÑÑек, <a
href=\"https://theintercept."
+"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\"> "
+"позволила вÑедоноÑÐ½Ð¾Ð¼Ñ ÑайÑÑ Ð¸Ð·Ð²Ð»ÐµÑÑ Ð²ÑÑ
иÑÑоÑÐ¸Ñ ÑообÑений полÑзоваÑелÑ</a>."
#. type: Content of: <ul><li><p>
+# | Malware {+was+} found on <a
+# |
href=\"http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html\">{+
+# | +}security cameras available through Amazon</a>.
+#, fuzzy
+#| msgid ""
+#| "Malware found on <a href=\"http://www.slate.com/blogs/"
+#| "future_tense/2016/04/11/"
+#| "security_cameras_sold_through_amazon_have_malware_according_to_security."
+#| "html\">security cameras available through Amazon</a>."
msgid ""
-"Malware found on <a href=\"http://www.slate.com/blogs/"
+"Malware was found on <a href=\"http://www.slate.com/blogs/"
"future_tense/2016/04/11/"
"security_cameras_sold_through_amazon_have_malware_according_to_security.html"
-"\">security cameras available through Amazon</a>."
+"\"> security cameras available through Amazon</a>."
msgstr ""
"<a href=\"http://www.slate.com/blogs/future_tense/2016/04/11/"
"security_cameras_sold_through_amazon_have_malware_according_to_security.html"
@@ -667,20 +683,42 @@
"оÑноÑении Ñоже не пÑедÑÑавлÑÑÑ ÑгÑозÑ."
#. type: Content of: <ul><li><p>
-msgid ""
-"A bug in the iThings Messages app <a href=\"https://theintercept."
-"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
-"a malicious web site to extract all the user's messaging history</a>."
+# | Over 70 brands of network-connected surveillance cameras {+have+} <a
+# |
[-href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">have-]
+# |
{+href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">+}
+# | security bugs that allow anyone to watch through them</a>.
+#, fuzzy
+#| msgid ""
+#| "Over 70 brands of network-connected surveillance cameras <a href=\"http://"
+#| "www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
+#| "\">have security bugs that allow anyone to watch through them</a>."
+msgid ""
+"Over 70 brands of network-connected surveillance cameras have <a href="
+"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
+"html\"> security bugs that allow anyone to watch through them</a>."
msgstr ""
-"ÐÑибка в Messages, пÑиложении Ð´Ð»Ñ Ð°Ð¹-ÑÑÑÑек, <a
href=\"https://theintercept."
-"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\"> "
-"позволила вÑедоноÑÐ½Ð¾Ð¼Ñ ÑайÑÑ Ð¸Ð·Ð²Ð»ÐµÑÑ Ð²ÑÑ
иÑÑоÑÐ¸Ñ ÑообÑений полÑзоваÑелÑ</a>."
+"РкамеÑаÑ
наблÑÐ´ÐµÐ½Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ 70 маÑок <a
href=\"http://www.kerneronsec."
+"com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">обнаÑÑженÑ
недоÑеÑÑ "
+"безопаÑноÑÑи, позволÑÑÑие ÐºÐ¾Ð¼Ñ Ñгодно
подглÑдÑваÑÑ ÑеÑез ниÑ
</a>."
#. type: Content of: <ul><li><p>
+# | Many proprietary payment apps <a
+# |
href=\"http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data\">[-
+# | -]transmit personal data in an insecure way</a>. However, the worse aspect
+# | of these apps is that <a
+# | href=\"/philosophy/surveillance-vs-democracy.html\">payment is not
+# | anonymous</a>.
+#, fuzzy
+#| msgid ""
+#| "Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
+#| "articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
+#| "securing-user-data\"> transmit personal data in an insecure way</a>. "
+#| "However, the worse aspect of these apps is that <a href=\"/philosophy/"
+#| "surveillance-vs-democracy.html\">payment is not anonymous</a>."
msgid ""
"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
-"user-data\"> transmit personal data in an insecure way</a>. However, the "
+"user-data\">transmit personal data in an insecure way</a>. However, the "
"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
"democracy.html\">payment is not anonymous</a>."
msgstr ""
@@ -692,9 +730,67 @@
#. type: Content of: <ul><li><p>
msgid ""
-"FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-security/"
-"latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-"
-"trackers/\"> have a Bluetooth vulnerability</a> that allows attackers to "
+"The Nissan Leaf has a built-in cell phone modem which allows effectively "
+"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
+"nissan/\">to access its computers remotely and make changes in various "
+"settings</a>."
+msgstr ""
+"Ð Nissan Leaf еÑÑÑ Ð²ÑÑÑоеннÑй ÑелеÑоннÑй модем,
позволÑÑÑий ÑакÑиÑеÑки ÐºÐ¾Ð¼Ñ "
+"Ñгодно <a
href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
+"nissan/\">полÑÑаÑÑ ÑдаленнÑй доÑÑÑп к
компÑÑÑеÑам и вноÑиÑÑ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² "
+"ÑазлиÑнÑе наÑÑÑойки</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"That's easy to do because the system has no authentication when accessed "
+"through the modem. However, even if it asked for authentication, you "
+"couldn't be confident that Nissan has no access. The software in the car is "
+"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
+"\">which means it demands blind faith from its users</a>."
+msgstr ""
+"ÐÑо неÑÑÑдно поÑомÑ, ÑÑо в ÑиÑÑеме неÑ
пÑовеÑки подлинноÑÑи полÑзоваÑÐµÐ»Ñ Ð¿Ñи "
+"доÑÑÑпе по модемÑ. Ðднако даже еÑли бÑ
модем пÑоводил пÑовеÑкÑ, нелÑÐ·Ñ Ð±Ñло "
+"Ð±Ñ Ð±ÑÑÑ ÑвеÑеннÑми, ÑÑо Ñ Nissan Ð½ÐµÑ Ð´Ð¾ÑÑÑпа.
ÐÑогÑÐ°Ð¼Ð¼Ñ Ð² авÑомобиле "
+"неÑвободнÑ, <a
href=\"/philosophy/free-software-even-more-important.html"
+"\">ÑÑо знаÑиÑ, они ÑÑебÑÑÑ Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей
Ñлепой веÑÑ</a>."
+
+#. type: Content of: <ul><li><p>
+# | Even if no one connects to the car remotely, the cell phone modem enables
+# | the phone company to track the car's movements all the time; it is
+# | possible to physically remove the cell phone modem{+,+} though.
+#, fuzzy
+#| msgid ""
+#| "Even if no one connects to the car remotely, the cell phone modem enables "
+#| "the phone company to track the car's movements all the time; it is "
+#| "possible to physically remove the cell phone modem though."
+msgid ""
+"Even if no one connects to the car remotely, the cell phone modem enables "
+"the phone company to track the car's movements all the time; it is possible "
+"to physically remove the cell phone modem, though."
+msgstr ""
+"Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой "
+"ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ "
+"авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи."
+
+#. type: Content of: <ul><li><p>
+# | FitBit fitness trackers [-<a
+# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">-]
+# | have a {+<a
+# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">+}
+# | Bluetooth vulnerability</a> that allows attackers to send malware to the
+# | devices, which can subsequently spread to computers and other FitBit
+# | trackers that interact with them.
+#, fuzzy
+#| msgid ""
+#| "FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-"
+#| "security/latest-security-news/10-second-hack-delivers-first-ever-malware-"
+#| "to-fitness-trackers/\"> have a Bluetooth vulnerability</a> that allows "
+#| "attackers to send malware to the devices, which can subsequently spread "
+#| "to computers and other FitBit trackers that interact with them."
+msgid ""
+"FitBit fitness trackers have a <a href=\"http://www.tripwire.com/state-of-"
+"security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-"
+"fitness-trackers/\"> Bluetooth vulnerability</a> that allows attackers to "
"send malware to the devices, which can subsequently spread to computers and "
"other FitBit trackers that interact with them."
msgstr ""
@@ -705,12 +801,24 @@
"компÑÑÑеÑам и дÑÑгим ÑÑÑÑойÑÑвам FitBit, Ñ
коÑоÑÑми они взаимодейÑÑвÑÑÑ."
#. type: Content of: <ul><li><p>
+# | “Self-encrypting” disk drives do the encryption with
+# | proprietary firmware so you can't trust it. Western Digital's “My
+# | Passport” drives <a
+# |
href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">{+
+# | +}have a back door</a>.
+#, fuzzy
+#| msgid ""
+#| "“Self-encrypting” disk drives do the encryption with "
+#| "proprietary firmware so you can't trust it. Western Digital's “My "
+#| "Passport” drives <a href=\"https://motherboard.vice.com/en_us/"
+#| "article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-"
+#| "encryption\">have a back door</a>."
msgid ""
"“Self-encrypting” disk drives do the encryption with proprietary "
"firmware so you can't trust it. Western Digital's “My Passport” "
"drives <a href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-"
-"popular-self-encrypting-hard-drives-have-really-bad-encryption\">have a back "
-"door</a>."
+"popular-self-encrypting-hard-drives-have-really-bad-encryption\"> have a "
+"back door</a>."
msgstr ""
"“СамоÑиÑÑÑÑÑиеÑÑ” жеÑÑкие диÑки
ÑиÑÑÑÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð½ÐµÑвободнÑÑ
"
"внÑÑÑенниÑ
пÑогÑамм, Ñак ÑÑо Ð²Ñ Ð½Ðµ можеÑе
им довеÑÑÑÑ. У диÑков “My "
@@ -720,18 +828,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
-"door for 4 years</a>, which could be exploited by attackers to gain root "
-"privileges."
-msgstr ""
-"Ð Mac OS X <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\"> в ÑеÑение
4 Ð»ÐµÑ "
-"пÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>,
коÑоÑÑм взломÑики могли "
-"воÑполÑзоваÑÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ Ð¿Ñава
админиÑÑÑаÑоÑа."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
@@ -744,24 +840,28 @@
"авÑомобилÑми поÑÑедÑÑвом SMS."
#. type: Content of: <ul><li><p>
+# | Crackers were able to <a
+# |
href=\"http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">{+
+# | +}take remote control of the Jeep</a> “connected car”. {+They
+# | could track the car, start or stop the engine, and activate or deactivate
+# | the brakes, and more.+}
+#, fuzzy
+#| msgid ""
+#| "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
+#| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"
+#| "\">take remote control of the Jeep</a> “connected car”."
msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
-"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take "
-"remote control of the Jeep</a> “connected car”."
+"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> take "
+"remote control of the Jeep</a> “connected car”. They could track "
+"the car, start or stop the engine, and activate or deactivate the brakes, "
+"and more."
msgstr ""
"ÐзломÑикам ÑдалоÑÑ <a
href=\"http://arstechnica.com/security/2015/07/fiat-"
"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">
полÑÑиÑÑ "
"ÑдаленнÑй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ джипом</a> “Ñ
Ñоединением”."
#. type: Content of: <ul><li><p>
-msgid ""
-"They could track the car, start or stop the engine, and activate or "
-"deactivate the brakes, and more."
-msgstr ""
-"Ðни могли ÑледиÑÑ Ð·Ð° авÑомобилем,
запÑÑкаÑÑ Ð¸ оÑÑанавливаÑÑ Ð´Ð²Ð¸Ð³Ð°ÑелÑ, "
-"вклÑÑаÑÑ Ð¸ вÑклÑÑаÑÑ ÑоÑмоз, а Ñакже
многое дÑÑгое."
-
-#. type: Content of: <ul><li><p>
msgid "I expect that Chrysler and the NSA can do this too."
msgstr "Я дÑмаÑ, ÑÑо ÐÑайÑÐ»ÐµÑ Ð¸ ÐÐÐ Ñоже ÑÑо
могÑÑ."
@@ -774,6 +874,56 @@
"вÑклÑÑÑ."
#. type: Content of: <ul><li><p>
+# | Due to bad security in a drug pump, crackers could use it to <a
+# |
href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/\">{+
+# | +}kill patients</a>.
+#, fuzzy
+#| msgid ""
+#| "Due to bad security in a drug pump, crackers could use it to <a href="
+#| "\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
+#| "pumps/\">kill patients</a>."
+msgid ""
+"Due to bad security in a drug pump, crackers could use it to <a href="
+"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
+"pumps/\"> kill patients</a>."
+msgstr ""
+"Ðз-за плоÑ
ой заÑиÑÑ Ð² инÑÑзионном наÑоÑе
взломÑики могÑÑ Ð¸ÑполÑзоваÑÑ ÐµÐ³Ð¾ "
+"Ð´Ð»Ñ <a href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-"
+"hospital-drug-pumps/\">ÑбийÑÑва паÑиенÑов</a>."
+
+#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html\">
+# | Many smartphone apps use insecure authentication methods when storing your
+# | personal data on remote [-servers.</a>-] {+servers</a>.+} This leaves
+# | personal information like email addresses, passwords, and health
+# | information vulnerable. Because many of these apps are proprietary it
+# | makes it hard to impossible to know which apps are at risk.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-"
+#| "millions-users.html\"> Many smartphone apps use insecure authentication "
+#| "methods when storing your personal data on remote servers.</a> This "
+#| "leaves personal information like email addresses, passwords, and health "
+#| "information vulnerable. Because many of these apps are proprietary it "
+#| "makes it hard to impossible to know which apps are at risk."
+msgid ""
+"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
+"users.html\"> Many smartphone apps use insecure authentication methods when "
+"storing your personal data on remote servers</a>. This leaves personal "
+"information like email addresses, passwords, and health information "
+"vulnerable. Because many of these apps are proprietary it makes it hard to "
+"impossible to know which apps are at risk."
+msgstr ""
+"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
+"users.html\"> Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑмаÑÑÑонов
пÑименÑÑÑ Ð½ÐµÐ±ÐµÐ·Ð¾Ð¿Ð°ÑнÑе меÑÐ¾Ð´Ñ "
+"аÑÑенÑиÑикаÑии пÑи Ñ
Ñанении ваÑиÑ
лиÑнÑÑ
даннÑÑ
на ÑдаленнÑÑ
ÑеÑвеÑаÑ
.</a> "
+"ÐÑо подвеÑÐ³Ð°ÐµÑ Ð¾Ð¿Ð°ÑноÑÑи ÑакÑÑ Ð»Ð¸ÑнÑÑ
инÑоÑмаÑиÑ, как адÑеÑа ÑлекÑÑонной "
+"поÑÑÑ, паÑоли, а Ñакже медиÑинÑкие даннÑе.
ÐоÑколÑÐºÑ Ð¼Ð½Ð¾Ð³Ð¸Ðµ из ÑÑиÑ
"
+"пÑиложений неÑвободнÑ, ÑÑÑдно, еÑли
вообÑе возможно, ÑзнаÑÑ, какие "
+"пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´Ð²ÐµÑÐ¶ÐµÐ½Ñ ÑÑомÑ."
+
+#. type: Content of: <ul><li><p>
msgid ""
"Hospira infusion pumps, which are used to administer drugs to a patient, "
"were rated “<a href=\"https://securityledger.com/2015/05/researcher-"
@@ -796,44 +946,66 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Due to bad security in a drug pump, crackers could use it to <a href="
-"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
-"pumps/\">kill patients</a>."
+"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
+"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
+"door for 4 years</a>, which could be exploited by attackers to gain root "
+"privileges."
msgstr ""
-"Ðз-за плоÑ
ой заÑиÑÑ Ð² инÑÑзионном наÑоÑе
взломÑики могÑÑ Ð¸ÑполÑзоваÑÑ ÐµÐ³Ð¾ "
-"Ð´Ð»Ñ <a href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-"
-"hospital-drug-pumps/\">ÑбийÑÑва паÑиенÑов</a>."
+"Ð Mac OS X <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
+"backdoor-api-to-root-privileges-in-apple-os-x/\"> в ÑеÑение
4 Ð»ÐµÑ "
+"пÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>,
коÑоÑÑм взломÑики могли "
+"воÑполÑзоваÑÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ Ð¿Ñава
админиÑÑÑаÑоÑа."
#. type: Content of: <ul><li><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "An app to prevent “identity theft” (access to personal data) "
+#| "by storing users' data on a special server <a href=\"http://arstechnica."
+#| "com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-"
+#| "over-concerns-that-app-isnt-safe/\">was deactivated by its developer</a> "
+#| "which had discovered a security flaw."
msgid ""
-"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
-"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
-"phones, including iPhones, Android, and BlackBerry</a>. While there is not "
-"much detail here, it seems that this does not operate via the universal back "
-"door that we know nearly all portable phones have. It may involve "
-"exploiting various bugs. There are <a href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> lots "
-"of bugs in the phones' radio software</a>."
+"An app to prevent “identity theft” (access to personal data) by "
+"storing users' data on a special server <a href=\"http://arstechnica.com/"
+"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
+"concerns-that-app-isnt-safe/\">was deactivated by its developer</a> which "
+"had discovered a security flaw."
msgstr ""
-"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
-"spy-on-smart-phone-data-a-920971.html\"> ÐÐРможеÑ
заглÑдÑваÑÑ Ð² даннÑе на "
-"ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone, Android и
BlackBerry</a>. ХоÑÑ "
-"подÑобноÑÑи здеÑÑ Ð½Ðµ пÑиводÑÑÑÑ, поÑ
оже,
ÑÑо ÑабоÑÐ°ÐµÑ Ð½Ðµ как ÑнивеÑÑалÑнÑй "
-"ÑеÑнÑй Ñ
од, коÑоÑÑй, как Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ
поÑÑи во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
. "
-"ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑвÑзано Ñ ÑкÑплÑаÑаÑией
ÑазлиÑнÑÑ
оÑибок. <a href=\"http://"
-"www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> Ð
пÑогÑаммаÑ
"
-"ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво
оÑибок</a>."
+"ÐÑиложение Ð´Ð»Ñ Ð¿ÑедоÑвÑаÑÐµÐ½Ð¸Ñ “кÑажи
лиÑноÑÑи” (доÑÑÑпа к лиÑнÑм "
+"даннÑм), Ñ
ÑанивÑее даннÑе полÑзоваÑÐµÐ»Ñ Ð½Ð°
оÑобом ÑеÑвеÑе, <a href=\"http://"
+"arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-"
+"data-over-concerns-that-app-isnt-safe/\">бÑло вÑклÑÑено
ÑазÑабоÑÑиком ÑÑого "
+"пÑиложениÑ</a>, коÑоÑÑй обнаÑÑжил бÑеÑÑ Ð²
заÑиÑе."
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
-"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
-"intrusion."
+"That developer seems to be conscientious about protecting personal data from "
+"third parties in general, but it can't protect that data from the state. "
+"Quite the contrary: confiding your data to someone else's server, if not "
+"first encrypted by you with free software, undermines your rights."
msgstr ""
-"Ð ÑиÑÑÐµÐ¼Ñ <a
href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-"
-"homes-hack/\"> “инÑеллекÑÑалÑнÑÑ
домов”</a>,
оказÑваеÑÑÑ, до "
-"идиоÑизма легко пÑоникнÑÑÑ."
+"ÐажеÑÑÑ, ÑÑÐ¾Ñ ÑазÑабоÑÑик добÑоÑовеÑÑно
заÑиÑÐ°ÐµÑ Ð»Ð¸ÑнÑе даннÑе Ð¾Ñ ÑÑеÑÑиÑ
"
+"ÑÑоÑон вообÑе, но он не Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°ÑиÑиÑÑ ÑÑи
даннÑе Ð¾Ñ Ð³Ð¾ÑÑдаÑÑÑва. СовÑем "
+"наобоÑоÑ: пеÑедаÑа ваÑиÑ
даннÑÑ
ÑÑжомÑ
ÑеÑвеÑÑ, еÑли Ð²Ñ Ð½Ðµ ÑиÑÑÑеÑе иÑ
"
+"пÑедваÑиÑелÑно Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑвободнÑÑ
пÑогÑамм, подÑÑÐ²Ð°ÐµÑ Ð²Ð°Ñи пÑава."
+
+#. type: Content of: <ul><li><p>
+# | Lots of <a
+# | href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/\">{+
+# | +}hospital equipment has lousy security</a>, and it can be fatal.
+#, fuzzy
+#| msgid ""
+#| "Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-"
+#| "vulnerable/\">hospital equipment has lousy security</a>, and it can be "
+#| "fatal."
+msgid ""
+"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
+"\"> hospital equipment has lousy security</a>, and it can be fatal."
+msgstr ""
+"Ðного <a
href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
+"\">болÑниÑного обоÑÑÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð·Ð°ÑиÑено
паÑÑиво</a>, и ÑÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ "
+"ÑмеÑÑелÑно."
#. type: Content of: <ul><li><p>
msgid ""
@@ -847,64 +1019,49 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\"> The FTC punished a company for making "
-"webcams with bad security so that it was easy for anyone to watch them</a>."
-msgstr ""
-"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\"> ФедеÑалÑÐ½Ð°Ñ ÑоÑговаÑ
комиÑÑÐ¸Ñ Ð½Ð°ÐºÐ°Ð·Ð°Ð»Ð° "
-"ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð·Ð° пÑоизводÑÑво ÑеÑевÑÑ
камеÑ,
безопаÑноÑÑÑ ÐºÐ¾ÑоÑÑÑ
бÑла наÑÑолÑко "
-"плоÑ
а, ÑÑо каждÑй легко мог глÑдеÑÑ ÑеÑез
ниÑ
</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\"> It is possible to take control "
-"of some car computers through malware in music files</a>. Also <a href="
-"\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">by radio</"
-"a>. Here is <a href=\"http://www.autosec.org/faq.html\">more information</"
-"a>."
-msgstr ""
-"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\"> Ðад некоÑоÑÑми
авÑомобилÑнÑми "
-"компÑÑÑеÑÑми можно полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ñ
помоÑÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в ÑайлаÑ
"
-"Ñ Ð¼ÑзÑкой</a>. Ð Ñакже <a
href=\"http://www.nytimes.com/2011/03/10/"
-"business/10hack.html?_r=0\">по Ñадио</a>. ÐÑÑгие
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи <a "
-"href=\"http://www.autosec.org/faq.html\">на ÑайÑе ЦенÑÑа
авÑомобилÑной "
-"безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
-"dies-days-before-scheduled-black-hat-appearance/\"> It is possible to kill "
-"people by taking control of medical implants by radio</a>. Here is <a href="
-"\"http://www.bbc.co.uk/news/technology-17631838\">more information</a>. And "
-"<a href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive."
-"com/2013/02/broken-hearts-how-plausible-was.html\">here</a>."
+"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
+"have modifiable software</a>, which makes them vulnerable to viruses."
msgstr ""
-"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
-"dies-days-before-scheduled-black-hat-appearance/\"> ÐолÑÑив
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ "
-"вживленнÑми медиÑинÑкими ÑÑÑÑойÑÑвами по
Ñадио, можно ÑбиваÑÑ Ð»Ñдей</a>. "
-"ÐодÑобноÑÑи Ñм. <a
href=\"http://www.bbc.co.uk/news/technology-17631838\"> "
-"на ÑайÑе Ðи-Ðи-Си</a> и <a
href=\"https://web.archive.org/web/20180203130244/"
-"http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\"> в "
-"блоге IOActive</a>."
+"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> РнекоÑоÑÑÑ
видаÑ
"
+"поÑÑаÑивной памÑÑи еÑÑÑ Ð¿ÑогÑаммÑ,
коÑоÑÑе можно изменÑÑÑ</a>. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ Ð¸Ñ
"
+"ÑÑзвимÑми Ð´Ð»Ñ Ð²Ð¸ÑÑÑов."
#. type: Content of: <ul><li><p>
+# | We don't call this a “back door” because it is normal that you
+# | can install a new system in a computer{+,+} given physical access to it.
+# | However, memory sticks and cards should not be modifiable in this way.
+#, fuzzy
+#| msgid ""
+#| "We don't call this a “back door” because it is normal that "
+#| "you can install a new system in a computer given physical access to it. "
+#| "However, memory sticks and cards should not be modifiable in this way."
msgid ""
-"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
-"\">hospital equipment has lousy security</a>, and it can be fatal."
+"We don't call this a “back door” because it is normal that you "
+"can install a new system in a computer, given physical access to it. "
+"However, memory sticks and cards should not be modifiable in this way."
msgstr ""
-"Ðного <a
href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
-"\">болÑниÑного обоÑÑÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð·Ð°ÑиÑено
паÑÑиво</a>, и ÑÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ "
-"ÑмеÑÑелÑно."
+"ÐÑ Ð½Ðµ назÑваем ÑÑо “ÑеÑнÑм Ñ
одом”,
поÑÐ¾Ð¼Ñ ÑÑо когда Ð²Ñ Ð¿Ð¾Ð»ÑÑаеÑе "
+"ÑизиÑеÑкий доÑÑÑп к компÑÑÑеÑÑ, вÑ, как
пÑавило, можеÑе ÑÑÑановиÑÑ Ð½Ð° нем "
+"новÑÑ ÑиÑÑемÑ. Ðднако Ñ ÐºÐ°ÑÑ Ð¿Ð°Ð¼ÑÑи и
дÑÑгиÑ
ноÑиÑелей не должно бÑÑÑ "
+"возможноÑÑи ÑакиÑ
изменений."
#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/\">
+# | Point-of-sale terminals running Windows were taken [-over-] {+over</a>+}
+# | and turned into a botnet for the purpose of collecting customers' credit
+# | card [-numbers</a>.-] {+numbers.+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
+#| "of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
+#| "running Windows were taken over and turned into a botnet for the purpose "
+#| "of collecting customers' credit card numbers</a>."
msgid ""
"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
"age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
-"running Windows were taken over and turned into a botnet for the purpose of "
-"collecting customers' credit card numbers</a>."
+"running Windows were taken over</a> and turned into a botnet for the purpose "
+"of collecting customers' credit card numbers."
msgstr ""
"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
"age-with-first-known-point-of-sale-botnet/\"> ТеÑÐ¼Ð¸Ð½Ð°Ð»Ñ Ð²
меÑÑаÑ
пÑодаж, "
@@ -912,55 +1069,94 @@
"ÑбоÑа номеÑов кÑедиÑнÑÑ
каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"An app to prevent “identity theft” (access to personal data) by "
-"storing users' data on a special server <a href=\"http://arstechnica.com/"
-"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
-"concerns-that-app-isnt-safe/\">was deactivated by its developer</a> which "
-"had discovered a security flaw."
-msgstr ""
-"ÐÑиложение Ð´Ð»Ñ Ð¿ÑедоÑвÑаÑÐµÐ½Ð¸Ñ “кÑажи
лиÑноÑÑи” (доÑÑÑпа к лиÑнÑм "
-"даннÑм), Ñ
ÑанивÑее даннÑе полÑзоваÑÐµÐ»Ñ Ð½Ð°
оÑобом ÑеÑвеÑе, <a href=\"http://"
-"arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-"
-"data-over-concerns-that-app-isnt-safe/\">бÑло вÑклÑÑено
ÑазÑабоÑÑиком ÑÑого "
-"пÑиложениÑ</a>, коÑоÑÑй обнаÑÑжил бÑеÑÑ Ð²
заÑиÑе."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"That developer seems to be conscientious about protecting personal data from "
-"third parties in general, but it can't protect that data from the state. "
-"Quite the contrary: confiding your data to someone else's server, if not "
-"first encrypted by you with free software, undermines your rights."
+# | <a
+# |
[-href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">-]
+# |
{+href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">+}
+# | The NSA can tap data in smart phones, including iPhones, Android, and
+# | BlackBerry</a>. While there is not much detail here, it seems that this
+# | does not operate via the universal back door that we know nearly all
+# | portable phones have. It may involve exploiting various bugs. There are
+# | <a
+# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# | lots of bugs in the phones' radio software</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#| "smart phones, including iPhones, Android, and BlackBerry</a>. While "
+#| "there is not much detail here, it seems that this does not operate via "
+#| "the universal back door that we know nearly all portable phones have. It "
+#| "may involve exploiting various bugs. There are <a href=\"http://www."
+#| "osnews.com/story/27416/"
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs "
+#| "in the phones' radio software</a>."
+msgid ""
+"<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/"
+"international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971."
+"html\"> The NSA can tap data in smart phones, including iPhones, Android, "
+"and BlackBerry</a>. While there is not much detail here, it seems that this "
+"does not operate via the universal back door that we know nearly all "
+"portable phones have. It may involve exploiting various bugs. There are <a "
+"href=\"http://www.osnews.com/story/27416/"
+"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
+"the phones' radio software</a>."
msgstr ""
-"ÐажеÑÑÑ, ÑÑÐ¾Ñ ÑазÑабоÑÑик добÑоÑовеÑÑно
заÑиÑÐ°ÐµÑ Ð»Ð¸ÑнÑе даннÑе Ð¾Ñ ÑÑеÑÑиÑ
"
-"ÑÑоÑон вообÑе, но он не Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°ÑиÑиÑÑ ÑÑи
даннÑе Ð¾Ñ Ð³Ð¾ÑÑдаÑÑÑва. СовÑем "
-"наобоÑоÑ: пеÑедаÑа ваÑиÑ
даннÑÑ
ÑÑжомÑ
ÑеÑвеÑÑ, еÑли Ð²Ñ Ð½Ðµ ÑиÑÑÑеÑе иÑ
"
-"пÑедваÑиÑелÑно Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑвободнÑÑ
пÑогÑамм, подÑÑÐ²Ð°ÐµÑ Ð²Ð°Ñи пÑава."
+"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
+"spy-on-smart-phone-data-a-920971.html\"> ÐÐРможеÑ
заглÑдÑваÑÑ Ð² даннÑе на "
+"ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone, Android и
BlackBerry</a>. ХоÑÑ "
+"подÑобноÑÑи здеÑÑ Ð½Ðµ пÑиводÑÑÑÑ, поÑ
оже,
ÑÑо ÑабоÑÐ°ÐµÑ Ð½Ðµ как ÑнивеÑÑалÑнÑй "
+"ÑеÑнÑй Ñ
од, коÑоÑÑй, как Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ
поÑÑи во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
. "
+"ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑвÑзано Ñ ÑкÑплÑаÑаÑией
ÑазлиÑнÑÑ
оÑибок. <a href=\"http://"
+"www.osnews.com/story/27416/"
+"The_second_operating_system_hiding_in_every_mobile_phone\"> Ð
пÑогÑаммаÑ
"
+"ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво
оÑибок</a>."
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
-"have modifiable software</a>, which makes them vulnerable to viruses."
+"<a href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-"
+"codes-security\">The NSA has put back doors into nonfree encryption "
+"software</a>. We don't know which ones they are, but we can be sure they "
+"include some widely used systems. This reinforces the point that you can "
+"never trust the security of nonfree software."
msgstr ""
-"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> РнекоÑоÑÑÑ
видаÑ
"
-"поÑÑаÑивной памÑÑи еÑÑÑ Ð¿ÑогÑаммÑ,
коÑоÑÑе можно изменÑÑÑ</a>. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ Ð¸Ñ
"
-"ÑÑзвимÑми Ð´Ð»Ñ Ð²Ð¸ÑÑÑов."
#. type: Content of: <ul><li><p>
-msgid ""
-"We don't call this a “back door” because it is normal that you "
-"can install a new system in a computer given physical access to it. "
-"However, memory sticks and cards should not be modifiable in this way."
+# | [-<a
+# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">-]The
+# | FTC punished a company for making webcams with {+<a
+# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">+}
+# | bad security so that it was easy for anyone to watch {+through+} them</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-"
+#| "flaw-put-users-lives-on-display.html\"> The FTC punished a company for "
+#| "making webcams with bad security so that it was easy for anyone to watch "
+#| "them</a>."
+msgid ""
+"The FTC punished a company for making webcams with <a href=\"http://www."
+"nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-"
+"display.html\"> bad security so that it was easy for anyone to watch through "
+"them</a>."
msgstr ""
-"ÐÑ Ð½Ðµ назÑваем ÑÑо “ÑеÑнÑм Ñ
одом”,
поÑÐ¾Ð¼Ñ ÑÑо когда Ð²Ñ Ð¿Ð¾Ð»ÑÑаеÑе "
-"ÑизиÑеÑкий доÑÑÑп к компÑÑÑеÑÑ, вÑ, как
пÑавило, можеÑе ÑÑÑановиÑÑ Ð½Ð° нем "
-"новÑÑ ÑиÑÑемÑ. Ðднако Ñ ÐºÐ°ÑÑ Ð¿Ð°Ð¼ÑÑи и
дÑÑгиÑ
ноÑиÑелей не должно бÑÑÑ "
-"возможноÑÑи ÑакиÑ
изменений."
+"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
+"put-users-lives-on-display.html\"> ФедеÑалÑÐ½Ð°Ñ ÑоÑговаÑ
комиÑÑÐ¸Ñ Ð½Ð°ÐºÐ°Ð·Ð°Ð»Ð° "
+"ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð·Ð° пÑоизводÑÑво ÑеÑевÑÑ
камеÑ,
безопаÑноÑÑÑ ÐºÐ¾ÑоÑÑÑ
бÑла наÑÑолÑко "
+"плоÑ
а, ÑÑо каждÑй легко мог глÑдеÑÑ ÑеÑез
ниÑ
</a>."
#. type: Content of: <ul><li><p>
+# | <a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable
+# | nonfree software in disk drives can be written by a nonfree
+# | [-program.</a>-] {+program</a>.+} This makes any system vulnerable to
+# | persistent attacks that normal forensics won't detect.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
+#| "nonfree software in disk drives can be written by a nonfree program.</a> "
+#| "This makes any system vulnerable to persistent attacks that normal "
+#| "forensics won't detect."
msgid ""
"<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
-"nonfree software in disk drives can be written by a nonfree program.</a> "
+"nonfree software in disk drives can be written by a nonfree program</a>. "
"This makes any system vulnerable to persistent attacks that normal forensics "
"won't detect."
msgstr ""
@@ -970,21 +1166,100 @@
"необнаÑÑжимÑÑ
обÑÑнÑми ÑÑедÑÑвами."
#. type: Content of: <ul><li><p>
+# | [-<a
+# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">-]It
+# | is possible to {+<a
+# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">+}
+# | kill people by taking control of medical implants by radio</a>. [-Here
+# | is-] {+More information in+} <a
+# | [-href=\"http://www.bbc.co.uk/news/technology-17631838\">more
+# | information</a>. And-]
+# | {+href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a>
+# | and+} <a
+# |
[-href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">here</a>.-]
+# |
{+href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">
+# | IOActive Labs Research blog</a>.+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-"
+#| "jack-dies-days-before-scheduled-black-hat-appearance/\"> It is possible "
+#| "to kill people by taking control of medical implants by radio</a>. Here "
+#| "is <a href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
+#| "information</a>. And <a href=\"https://web.archive.org/"
+#| "web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-"
+#| "plausible-was.html\">here</a>."
+msgid ""
+"It is possible to <a href=\"http://siliconangle.com/blog/2013/07/27/famed-"
+"hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\"> kill "
+"people by taking control of medical implants by radio</a>. More information "
+"in <a href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a> "
+"and <a href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-"
+"was.html\"> IOActive Labs Research blog</a>."
+msgstr ""
+"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
+"dies-days-before-scheduled-black-hat-appearance/\"> ÐолÑÑив
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ "
+"вживленнÑми медиÑинÑкими ÑÑÑÑойÑÑвами по
Ñадио, можно ÑбиваÑÑ Ð»Ñдей</a>. "
+"ÐодÑобноÑÑи Ñм. <a
href=\"http://www.bbc.co.uk/news/technology-17631838\"> "
+"на ÑайÑе Ðи-Ðи-Си</a> и <a
href=\"https://web.archive.org/web/20180203130244/"
+"http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\"> в "
+"блоге IOActive</a>."
+
+#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
-"users.html\"> Many smartphone apps use insecure authentication methods when "
-"storing your personal data on remote servers.</a> This leaves personal "
-"information like email addresses, passwords, and health information "
-"vulnerable. Because many of these apps are proprietary it makes it hard to "
-"impossible to know which apps are at risk."
+"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
+"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
+"intrusion."
msgstr ""
-"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
-"users.html\"> Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑмаÑÑÑонов
пÑименÑÑÑ Ð½ÐµÐ±ÐµÐ·Ð¾Ð¿Ð°ÑнÑе меÑÐ¾Ð´Ñ "
-"аÑÑенÑиÑикаÑии пÑи Ñ
Ñанении ваÑиÑ
лиÑнÑÑ
даннÑÑ
на ÑдаленнÑÑ
ÑеÑвеÑаÑ
.</a> "
-"ÐÑо подвеÑÐ³Ð°ÐµÑ Ð¾Ð¿Ð°ÑноÑÑи ÑакÑÑ Ð»Ð¸ÑнÑÑ
инÑоÑмаÑиÑ, как адÑеÑа ÑлекÑÑонной "
-"поÑÑÑ, паÑоли, а Ñакже медиÑинÑкие даннÑе.
ÐоÑколÑÐºÑ Ð¼Ð½Ð¾Ð³Ð¸Ðµ из ÑÑиÑ
"
-"пÑиложений неÑвободнÑ, ÑÑÑдно, еÑли
вообÑе возможно, ÑзнаÑÑ, какие "
-"пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´Ð²ÐµÑÐ¶ÐµÐ½Ñ ÑÑомÑ."
+"Ð ÑиÑÑÐµÐ¼Ñ <a
href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-"
+"homes-hack/\"> “инÑеллекÑÑалÑнÑÑ
домов”</a>,
оказÑваеÑÑÑ, до "
+"идиоÑизма легко пÑоникнÑÑÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
+"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
+"microphone-cameras.html\"> Crackers found a way to break security on a "
+"“smart” TV</a> and use its camera to watch the people who are "
+"watching TV."
+msgstr ""
+"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
+"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
+"microphone-cameras.html\"> ÐзломÑики наÑли ÑпоÑоб
вÑкÑÑÑÑ Ð·Ð°ÑиÑÑ Ð² “"
+"инÑеллекÑÑалÑном” ÑелевизоÑе</a> и
воÑполÑзоваÑÑÑÑ ÐµÐ³Ð¾ видеокамеÑой, "
+"ÑÑÐ¾Ð±Ñ ÑмоÑÑеÑÑ Ð½Ð° лÑдей, коÑоÑÑе ÑмоÑÑÑÑ
ÑелевизоÑ."
+
+#. type: Content of: <ul><li><p>
+# | [-<a
+# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">-]It
+# | is possible to take control of some car computers through {+<a
+# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">+}
+# | malware in music files</a>. Also <a
+# | href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">{+
+# | +}by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html\">more
+# | information</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+#| "hacking_music_can_take_control_your_car/\"> It is possible to take "
+#| "control of some car computers through malware in music files</a>. Also "
+#| "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+#| "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+#| "\">more information</a>."
+msgid ""
+"It is possible to take control of some car computers through <a href="
+"\"http://www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\"> malware in music files</a>. "
+"Also <a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+"_r=0\"> by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+"\">more information</a>."
+msgstr ""
+"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\"> Ðад некоÑоÑÑми
авÑомобилÑнÑми "
+"компÑÑÑеÑÑми можно полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ñ
помоÑÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в ÑайлаÑ
"
+"Ñ Ð¼ÑзÑкой</a>. Ð Ñакже <a
href=\"http://www.nytimes.com/2011/03/10/"
+"business/10hack.html?_r=0\">по Ñадио</a>. ÐÑÑгие
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи <a "
+"href=\"http://www.autosec.org/faq.html\">на ÑайÑе ЦенÑÑа
авÑомобилÑной "
+"безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>."
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
@@ -1062,6 +1337,13 @@
msgid "Updated:"
msgstr "Ðбновлено:"
+#~ msgid ""
+#~ "They could track the car, start or stop the engine, and activate or "
+#~ "deactivate the brakes, and more."
+#~ msgstr ""
+#~ "Ðни могли ÑледиÑÑ Ð·Ð° авÑомобилем,
запÑÑкаÑÑ Ð¸ оÑÑанавливаÑÑ Ð´Ð²Ð¸Ð³Ð°ÑелÑ, "
+#~ "вклÑÑаÑÑ Ð¸ вÑклÑÑаÑÑ ÑоÑмоз, а Ñакже
многое дÑÑгое."
+
# type: Content of: <div><p>
#~ msgid ""
#~ "Copyright © 2013, 2015, 2016, 2017 Free Software Foundation, Inc."
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary/po proprietary-insecurity.de.po...,
GNUN <=