[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-appliances.ru.html po/m...
From: |
GNUN |
Subject: |
www/proprietary malware-appliances.ru.html po/m... |
Date: |
Wed, 26 Sep 2018 10:58:03 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/09/26 10:58:03
Modified files:
proprietary : malware-appliances.ru.html
proprietary/po : malware-appliances.ru-en.html
malware-appliances.ru.po
proprietary-insecurity.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.ru.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.183&r2=1.184
Patches:
Index: malware-appliances.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.ru.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- malware-appliances.ru.html 25 Jul 2018 16:30:35 -0000 1.37
+++ malware-appliances.ru.html 26 Sep 2018 14:58:02 -0000 1.38
@@ -2,6 +2,11 @@
<!--#include virtual="/server/header.ru.html" -->
<!-- Parent-Version: 1.84 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² ÑеÑ
нике -
ÐÑÐ¾ÐµÐºÑ GNU - Фонд Ñвободного пÑогÑаммного
@@ -40,109 +45,251 @@
<p>ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в
бÑÑовой ÑеÑ
нике.</p>
-<ul>
- <li id="nest-thermometers">
- <p>ТеÑмомеÑÑÑ Nest <a
-href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">вÑÑÑлаÑÑ
много
-даннÑÑ
о полÑзоваÑеле</a>.</p>
+<ul class="blurbs">
+ <li id="M201809240">
+ <p>ÐÑÑледоваÑели оÑкÑÑли ÑпоÑоб <a
+href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ÑкÑÑваÑÑ Ð³Ð¾Ð»Ð¾ÑовÑе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² дÑÑгиÑ
звÑкозапиÑÑÑ
</a>, Ñак ÑÑо лÑди ÑÑи
+ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð½Ðµ ÑлÑÑаÑ, но иÑ
ÑлÑÑÐ°Ñ Alexa и Siri.</p>
+ </li>
+
+ <li id="M201807050">
+ <p>ФизкÑлÑÑÑÑное ÑÑÑÑойÑÑво Jawbone бÑло
пÑивÑзано к неÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð¾Ð¼Ñ ÑелеÑонномÑ
+пÑиложениÑ. Ð 2017 Ð³Ð¾Ð´Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ
закÑÑлаÑÑ Ð¸ пÑекÑаÑила ÑабоÑÑ
+пÑиложениÑ. <a
+href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">ÐÑе
+ÑÑÑеÑÑвÑÑÑие ÑÑÑÑойÑÑва навÑегда
пÑекÑаÑили ÑабоÑÑ.</a></p>
+
+ <p>СÑаÑÑÑ Ð¾Ð±ÑÑÐ¶Ð´Ð°ÐµÑ Ð¿Ñодолжение ÑÑой
ÑквеÑной иÑÑоÑии — Ñо, ÑÑо
+неÑабоÑаÑÑие ÑÑÑÑойÑÑва пÑодолжали
пÑодаваÑÑ. Ðо Ñ Ð´ÑмаÑ, Ñо вÑоÑоÑÑепеннаÑ
+пÑоблема; из-за ÑÑого поÑледÑÑвиÑ
ÑаÑпÑоÑÑÑанилиÑÑ ÐµÑе на какиÑ
-Ñо
+лÑдей. ÐÑинÑипиалÑÐ½Ð°Ñ Ð½ÐµÑпÑаведливоÑÑÑ
бÑла в Ñом, ÑÑо ÑÑи ÑÑÑÑойÑÑва бÑли
+ÑпÑоекÑиÑÐ¾Ð²Ð°Ð½Ñ Ñак, ÑÑÐ¾Ð±Ñ Ð·Ð°Ð²Ð¸ÑеÑÑ Ð¾Ñ
Ñего-Ñо еÑе, ÑÑо не ÑÐ²Ð°Ð¶Ð°ÐµÑ ÑвободÑ
+полÑзоваÑелей.</p>
+ </li>
+
+ <li id="M201804140">
+ <p>ÐедиÑинÑÐºÐ°Ñ ÑÑÑаÑ
Ð¾Ð²Ð°Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ <a
+href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð±ÐµÑплаÑнÑÑ ÑлекÑÑоннÑÑ Ð·ÑбнÑÑ
ÑеÑкÑ, коÑоÑÐ°Ñ Ð¿Ð¾Ð´Ð³Ð»ÑдÑÐ²Ð°ÐµÑ Ð·Ð°
+полÑзоваÑелем, вÑÑÑÐ»Ð°Ñ ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾
полÑзовании по ÐнÑеÑнеÑÑ</a>.</p>
+ </li>
+
+ <li id="M201804010">
+ <p>ÐекоÑоÑÑе “инÑеллекÑÑалÑнÑе”
ÑелевизоÑÑ Ð°Ð²ÑомаÑиÑеÑки <a
+href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+загÑÑжаÑÑ ÑÑÑаÑениÑ, коÑоÑÑе
ÑÑÑанавливаÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ñлежки</a>.</p>
+
+ <p>ÐÑ ÑÑÑлаемÑÑ Ð½Ð° ÑÑаÑÑÑ Ð² подÑвеÑждение
ÑакÑов, коÑоÑÑе в ней пÑедÑÑавленÑ. Ð
+ÑожалениÑ, она заканÑиваеÑÑÑ ÑлабоÑ
аÑакÑеÑной ÑекомендаÑией ÑÑÑÑпиÑÑ
+Netflix. ÐÑиложение <a
+href="/proprietary/malware-google.html#netflix-app-geolocation-drm">Netflix
+Ñоже вÑедоноÑно</a>.</p>
+ </li>
+
+ <li id="M201802120">
+ <p>УÑÑÑойÑÑва Apple замÑкаÑÑ Ð¿Ð¾Ð»ÑзоваÑелей
<a
+href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+иÑклÑÑиÑелÑно на ÑлÑжбаÑ
Apple</a>, бÑдÑÑи
ÑпÑоекÑиÑÐ¾Ð²Ð°Ð½Ñ Ð½ÐµÑовмеÑÑимÑми Ñ
+лÑбÑми дÑÑгими ваÑианÑами, как ÑÑиÑнÑми,
Ñак и неÑÑиÑнÑми.</p>
+ </li>
+
+ <li id="M201712240">
+ <p>Ðдна из опаÑноÑÑей “ÐнÑеÑнеÑа
клеÑей” заклÑÑаеÑÑÑ Ð² Ñом, ÑÑо
+еÑли Ñ Ð²Ð°Ñ Ð¿ÑекÑаÑаеÑÑÑ Ð¾Ð±ÑлÑживание
ÐнÑеÑнеÑом, Ð²Ñ Ñакже <a
+href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ÑÑÑаÑиваеÑе конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ Ñвоим домом и
бÑÑовой ÑеÑ
никой</a>.</p>
+
+ <p>Ð ÑелÑÑ
Ñвоей безопаÑноÑÑи не
полÑзÑйÑеÑÑ Ð½Ð¸ÐºÐ°ÐºÐ¾Ð¹ бÑÑовой ÑеÑ
никой,
+подклÑÑаÑÑейÑÑ Ðº наÑÑоÑÑÐµÐ¼Ñ ÐнÑеÑнеÑÑ.</p>
+ </li>
+
+ <li id="M201711200">
+ <p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Amazon недавно пÑиглаÑила
поÑÑебиÑелей бÑÑÑ Ð¿ÑоÑÑоÑилÑми и <a
+href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+позволиÑÑ ÑоÑÑÑдникам ÑлÑжб доÑÑавки
оÑкÑÑваÑÑ Ð¸Ñ
вÑ
однÑе двеÑи</a>. ÐÐ¾Ñ Ð²Ð°Ð¼
+ÑеÑÑÐµÐ·Ð½Ð°Ñ Ð¿ÑоÑеÑ
а в заÑиÑе ÑиÑÑемÑ.</p>
</li>
- <li>
+ <li id="M201711100">
<p>ÐÑÑÑнилоÑÑ, ÑÑо игÑÑÑка Ð´Ð»Ñ Ð²Ð·ÑоÑлÑÑ
Ñ
диÑÑанÑионнÑм ÑпÑавлением пÑÐ¾Ð²Ð¾Ð´Ð¸Ñ <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">звÑкозапиÑÑ
ÑазговоÑа Ð¼ÐµÐ¶Ð´Ñ Ð´Ð²ÑÐ¼Ñ Ð¿Ð¾Ð»ÑзоваÑелÑми</a>.</p>
</li>
- <li>
+ <li id="M201711080">
+ <p>Logitech бÑÐ´ÐµÑ ÑабоÑиÑоваÑÑ Ð²Ñе домаÑние
ÑÑÑÑойÑÑва ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Harmony Link,
+<a
+href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
+вÑклÑÑив ÑеÑвеÑ, ÑеÑез коÑоÑÑй Ñе, кÑо
ÑÐºÐ¾Ð±Ñ ÑвлÑÑÑÑÑ Ð²Ð»Ð°Ð´ÐµÐ»ÑÑами пÑодÑкÑов,
+ÑвÑзÑваÑÑÑÑ Ñ Ð½Ð¸Ð¼Ð¸</a>.</p>
+
+ <p>ÐладелÑÑÑ Ð¿Ð¾Ð´Ð¾Ð·ÑеваÑÑ, ÑÑо ÑÑо Ñделано
Ñ ÑелÑÑ Ð²ÑнÑдиÑÑ Ð¸Ñ
кÑпиÑÑ Ð½Ð¾Ð²ÑÑ
+моделÑ. ÐÑли они неглÑпÑ, они, наобоÑоÑ,
наÑÑаÑÑÑ Ð½Ðµ довеÑÑÑÑ Ð»ÑбомÑ
+пÑодÑкÑÑ, коÑоÑÑй ÑÑебÑеÑ, ÑÑобÑ
полÑзоваÑели обÑалиÑÑ Ñ Ð½Ð¸Ð¼ ÑеÑез какÑÑ-Ñо
+ÑпеÑиализиÑованнÑÑ ÑлÑжбÑ.</p>
+ </li>
+
+ <li id="M201710040">
<p>ÐÐ°Ð¶Ð´Ð°Ñ ÐºÐ°Ð¼ÐµÑа “домаÑней
безопаÑноÑÑи”, еÑли ее изгоÑовиÑелÑ
Ð¼Ð¾Ð¶ÐµÑ Ñ Ð½ÐµÐ¹ ÑвÑзÑваÑÑÑÑ, пÑедÑÑавлÑеÑ
ÑÑÑÑойÑÑво Ñлежки. <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
ÐапÑимеÑ, камеÑа Canary</a>.</p>
+
<p>СÑаÑÑÑ Ð¾Ð¿Ð¸ÑÑÐ²Ð°ÐµÑ Ð·Ð»Ð¾Ð´ÐµÑние Ñо ÑÑоÑонÑ
изгоÑовиÑелÑ, обÑаÑÐ°Ñ Ð²Ð½Ð¸Ð¼Ð°Ð½Ð¸Ðµ на ÑоÑ
ÑакÑ, ÑÑо ÑÑÑÑойÑÑво пÑивÑзано к ÑеÑвеÑÑ.</p>
+
<p><a href="/proprietary/proprietary-tethers.html">ÐÑÑгие
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ пÑивÑзке в
неÑвободнÑÑ
пÑогÑаммаÑ
</a>.</p>
+
<p>Ðднако ÑÑо показÑÐ²Ð°ÐµÑ Ñакже, ÑÑо
ÑÑÑÑойÑÑво Ð´Ð°ÐµÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸ возможноÑÑÑ
Ñлежки.</p>
-</li>
+ </li>
-<li>
+ <li id="M201709200">
<p>“ÐнÑеллекÑÑалÑнÑй” ÑпÑÐ¸Ñ Ð´Ð»Ñ
внÑÑÑивеннÑÑ
инÑекÑий в болÑниÑаÑ
подклÑÑен к ÐнÑеÑнеÑÑ. ÐÑÑеÑÑвенно, <a
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">его
заÑиÑа бÑла взломана</a>.</p>
+
<p>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href="/philosophy/words-to-avoid.html#Hacker">“Ñ
акеÑÑ”</a>
невеÑно иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑениÑ
взломÑиков.</p>
-</li>
+ </li>
-<li>
+ <li id="M201708280">
<p>ÐÑвÑаÑиÑелÑÐ½Ð°Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑÑ Ð²Ð¾ многиÑ
ÑÑÑÑойÑÑваÑ
ÐнÑеÑнеÑа клеÑей позволÑеÑ
<a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">опеÑаÑоÑам
ÑвÑзи подглÑдÑваÑÑ Ð·Ð° лÑдÑми, коÑоÑÑе ими
полÑзÑÑÑÑÑ</a>.</p>
+
<p>Ðе бÑÐ´Ñ Ð¿ÑоÑÑоÑилей — оÑкажиÑÑ Ð¾Ñ
вÑеÑ
клеÑей.</p>
+
<p>ÐÑÐµÐ½Ñ Ð¶Ð°Ð»Ñ, ÑÑо в ÑÑаÑÑе ÑпоÑÑеблÑеÑÑÑ
Ñлово <a
href="/philosophy/words-to-avoid.html#Monetize">
“монеÑизиÑоваÑÑ”</a>.</p>
-</li>
+ </li>
-<li>
+ <li id="M201708230">
+ <p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Sonos велела вÑем Ñвоим
клиенÑам <a
+href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">“ÑоглаÑиÑÑÑÑ”
+на поглÑдÑвание, в пÑоÑивном ÑлÑÑае
пÑодÑÐºÑ Ð¿ÐµÑеÑÑÐ°Ð½ÐµÑ ÑабоÑаÑÑ</a>. Ð
+дÑÑгой ÑÑаÑÑе говоÑиÑÑÑ, ÑÑо <a
+href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321">они
+не менÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð¿ÑинÑдиÑелÑно, но лÑди
не бÑдÑÑ Ð¿Ð¾Ð»ÑÑаÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ</a>
+и когда-нибÑÐ´Ñ ÑÑо пеÑеÑÑÐ°Ð½ÐµÑ ÑабоÑаÑÑ.</p>
+ </li>
+
+ <li id="M201708040">
+ <p>Ðока Ð²Ñ Ð¿Ð¾Ð»ÑзÑеÑеÑÑ Ð±ÐµÑпилоÑником DJI,
ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð´Ð³Ð»ÑдÑваÑÑ Ð·Ð° дÑÑгими, <a
+href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">DJI
+во многиÑ
ÑлÑÑаÑÑ
подглÑдÑÐ²Ð°ÐµÑ Ð·Ð°
вами</a>.</p>
+ </li>
+
+ <li id="M201706200">
<p>Ðногие модели Ð²Ð¸Ð´ÐµÐ¾ÐºÐ°Ð¼ÐµÑ Ñ
подклÑÑением к ÐнÑеÑнеÑÑ ÑжаÑаÑÑе ÑÑзвимÑ.
РниÑ
еÑÑÑ ÑÑеÑнÑе запиÑи Ñ Ð¿ÑопиÑаннÑми в
пÑогÑамме паÑолÑми, коÑоÑÑе невозможно
измениÑÑ, и <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">ÑдалиÑÑ
ÑÑи ÑÑеÑнÑе запиÑи Ñоже невозможно</a>.</p>
-</li>
+ </li>
-<li>
-<p>РнеÑвободнÑÑ
пÑогÑаммаÑ
, под
ÑпÑавлением коÑоÑÑÑ
ÑабоÑаÑÑ <a
+ <li id="M201705250">
+ <p>РнеÑвободнÑÑ
пÑогÑаммаÑ
, под
ÑпÑавлением коÑоÑÑÑ
ÑабоÑаÑÑ <a
href="http://www.bbc.co.uk/news/technology-40042584">каÑдиоÑÑимÑлÑÑоÑÑ,
ÑпÑиÑÑ Ñ Ð¸Ð½ÑÑлином и дÑÑгие медиÑинÑкие
пÑибоÑÑ</a>, полнÑм-полно гÑÑбÑÑ
пÑоÑÑеÑов по ÑаÑÑи безопаÑноÑÑи.</p>
-</li>
+ </li>
-<li><p>ÐолÑзоваÑели ÑÑдÑÑÑÑ Ñ Bose за <a
+ <li id="M201705180">
+ <p>Ðдна ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ñеализовала домаÑниÑ
пÑÐ¸Ñ Ð¸ кÑоликов Ð´Ð»Ñ Second Life; иÑ
коÑм
+бÑл пÑивÑзана к Ð¾Ð´Ð½Ð¾Ð¼Ñ ÑеÑвеÑÑ. <a
+href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
+ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð²ÑклÑÑила ÑеÑвеÑ, и домаÑние
живоÑнÑе более или менее погибли</a>.</p>
+ </li>
+
+ <li id="M201704190">
+ <p>ÐолÑзоваÑели ÑÑдÑÑÑÑ Ñ Bose за <a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
ÑаÑпÑоÑÑÑанение ÑпионÑкой пÑогÑÐ°Ð¼Ð¼Ñ Ð²
наÑÑникаÑ
</a>. ÐонкÑеÑно, пÑиложение
запиÑÑÐ²Ð°ÐµÑ Ð¸Ð¼ÐµÐ½Ð° звÑковÑÑ
Ñайлов, коÑоÑÑе
пÑоÑлÑÑиваÑÑ Ð¿Ð¾Ð»ÑзоваÑели, а Ñакже
-ÑникалÑнÑй ÑеÑийнÑй Ð½Ð¾Ð¼ÐµÑ Ð½Ð°ÑÑников.
-</p>
+ÑникалÑнÑй ÑеÑийнÑй Ð½Ð¾Ð¼ÐµÑ Ð½Ð°ÑÑников.</p>
-<p>Ð ÑÑде пÑедÑÑвлено обвинение, ÑÑо ÑÑо
делаеÑÑÑ Ð±ÐµÐ· ÑоглаÑиÑ
+ <p>Ð ÑÑде пÑедÑÑвлено обвинение, ÑÑо ÑÑо
делаеÑÑÑ Ð±ÐµÐ· ÑоглаÑиÑ
полÑзоваÑелÑ. ÐÑли Ð±Ñ Ð¿Ñиложение пиÑало
мелким ÑÑиÑÑом, ÑÑо полÑзоваÑели на
ÑÑо ÑоглаÑаÑÑÑÑ, бÑло ли Ð±Ñ ÑÑо пÑиемлемо?
Ðи в коем ÑлÑÑае! Ðакон должен
однознаÑно <a href="/philosophy/surveillance-vs-democracy.html">
запÑеÑаÑÑ
-закладÑваÑÑ Ð² пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð»ÑбÑÑ ÑлежкÑ</a>.
-</p>
-</li>
+закладÑваÑÑ Ð² пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð»ÑбÑÑ ÑлежкÑ</a>.</p>
+ </li>
-<li id="anova">
+ <li id="M201704120">
<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Anova ÑабоÑиÑовала кÑÑ
оннÑе
ÑÑÑÑойÑÑва полÑзоваÑелей, заменой
пÑогÑамм, коÑоÑÐ°Ñ Ð¿ÑивÑзала иÑ
к
ÑÐ´Ð°Ð»ÐµÐ½Ð½Ð¾Ð¼Ñ ÑеÑвеÑÑ. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">ÐÑли
полÑзоваÑели не ÑоздадÑÑ ÑÑеÑнÑÑ Ð·Ð°Ð¿Ð¸ÑÑ
на ÑеÑвеÑаÑ
Anova, иÑ
обоÑÑдование
не бÑÐ´ÐµÑ ÑабоÑаÑÑ</a>.</p>
-</li>
+ </li>
-<li>
-<p>Ðогда <a
+ <li id="M201703270">
+ <p>Ðогда <a
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
дезинÑиÑиÑÑÑÑÐ°Ñ Ð¿Ð¾ÑÑдомоеÑÐ½Ð°Ñ Ð¼Ð°Ñина Miele
из ÐнÑеÑнеÑа клеÑей</a> в
болÑниÑе подклÑÑаеÑÑÑ Ðº ÑеÑи, ее заÑиÑа
никÑда не годиÑÑÑ.</p>
-<p>ÐапÑимеÑ, взломÑик Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð»ÑÑиÑÑ Ð´Ð¾ÑÑÑп
к Ñайловой ÑиÑÑеме маÑинÑ, заÑазиÑÑ
+
+ <p>ÐапÑимеÑ, взломÑик Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð»ÑÑиÑÑ
доÑÑÑп к Ñайловой ÑиÑÑеме маÑинÑ, заÑазиÑÑ
ее вÑедоноÑнÑми пÑогÑаммами и
полÑзоваÑÑÑÑ ÐµÑ ÐºÐ°Ðº плаÑдаÑмом Ð´Ð»Ñ Ð°Ñак на
дÑÑгие ÑÑÑÑойÑÑва в Ñой же ÑеÑи. ÐоÑколÑкÑ
ÑÑи маÑÐ¸Ð½Ñ Ð¿ÑименÑÑÑÑÑ Ð²
болÑниÑаÑ
, ÑÑо Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾ÑÑавиÑÑ Ð¿Ð¾Ð´ ÑгÑозÑ
ÑоÑни жизней.</p>
+ </li>
+
+ <li id="M201703140">
+ <p><a
+href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">ÐомпÑÑÑеÑизованнÑй
+вибÑаÑÐ¾Ñ Ð¿Ð¾Ð´Ð³Ð»ÑдÑвал за полÑзоваÑелÑми</a>
поÑÑедÑÑвом неÑвободного
+ÑпÑавлÑÑÑего пÑиложениÑ.</p>
+
+ <p>ÐÑиложение поминÑÑно ÑообÑало
ÑемпеÑаÑÑÑÑ Ð²Ð¸Ð±ÑаÑоÑа (Ñаким обÑазом,
коÑвенно
+докладÑвал о Ñом, окÑÑжен ли вибÑаÑоÑ
ÑеловеÑеÑким Ñелом) и ÑаÑÑоÑÑ
+вибÑаÑий.</p>
+
+ <p>ÐбÑаÑиÑе внимание на Ñо, наÑколÑко
неадекваÑное пÑедлагаеÑÑÑ ÑеÑение:
+ÑÑандаÑÑ Ð¼Ð°ÑкиÑовки, Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÐºÐ¾ÑоÑой
изгоÑовиÑели делали Ð±Ñ ÑÐ²ÐµÐ´Ð¾Ð¼Ð»ÐµÐ½Ð¸Ñ Ð¾
+ÑвоиÑ
пÑодÑкÑаÑ
— вмеÑÑо ÑвободнÑÑ
пÑогÑамм, коÑоÑÑе могли бÑ
+пÑовеÑÑÑÑÑÑ Ð¸ модиÑиÑиÑоваÑÑÑÑ
полÑзоваÑелÑми.</p>
+
+ <p>Ðа компаниÑ-пÑоизводиÑÐµÐ»Ñ ÑпÑавлÑемÑÑ
по ÐнÑеÑнеÑÑ Ð²Ð¸Ð±ÑаÑоÑов <a
+href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">подали
+в ÑÑд за ÑÐ±Ð¾Ñ Ð¼Ð°ÑÑÑ Ð¿ÐµÑÑоналÑнÑÑ
даннÑÑ
о
Ñом, как полÑзоваÑели пÑименÑли иÑ
+изделиÑ</a>.</p>
+
+ <p>Ðозможно, даннÑе дейÑÑвиÑелÑно
анонимизиÑовалиÑÑ, как заÑвлÑÐµÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ,
но
+дело не в ÑÑом. ÐÑли она пÑодавала даннÑе
бÑокеÑÑ, Ñо бÑÐ¾ÐºÐµÑ Ð¼Ð¾Ð³ вÑÑиÑлÑÑÑ,
+ÑÑи именно ÑÑо даннÑе.</p>
+
+ <p>Ðо ÑеÑÐµÐ½Ð¸Ñ ÑÑда ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ <a
+href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+вÑплаÑила в обÑей ÑложноÑÑи 4 миллиона
доллаÑов пени</a> Ñвоим клиенÑам.</p>
+ </li>
-</li>
-<li>
-<p>ÐÑли Ð²Ñ Ð¿Ð¾ÐºÑпаеÑе “ÑмнÑй”
авÑомобилÑ, дом, ÑелевизоÑ,
+ <li id="M201702280">
+ <p>ÐгÑÑÑки Ñ Ð¼Ð¸ÐºÑоÑонами “CloudPets” <a
+href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ÑаÑкÑÑваÑÑ ÑазговоÑÑ Ð´ÐµÑей
изгоÑовиÑелÑ</a>. РзнаеÑе ÑÑо? <a
+href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">ÐзломÑики
+наÑли ÑпоÑоб полÑÑаÑÑ Ð´Ð°Ð½Ð½Ñе</a>,
ÑобиÑаемÑе пÑи подÑлÑÑивании
+изгоÑовиÑелем.</p>
+
+ <p>ÐедопÑÑÑимо Ñже Ñо, ÑÑо изгоÑовиÑÐµÐ»Ñ Ð¸
ФÐРмогли пÑоÑлÑÑиваÑÑ ÑÑи ÑазговоÑÑ.</p>
+ </li>
+
+ <li id="M201702200">
+ <p>ÐÑли Ð²Ñ Ð¿Ð¾ÐºÑпаеÑе “ÑмнÑй”
авÑомобилÑ, дом, ÑелевизоÑ,
Ñ
олодилÑник и Ñ.д., обÑÑно <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">пÑедÑдÑÑие
владелÑÑÑ Ð¼Ð¾Ð³ÑÑ Ð¿Ð¾-пÑÐµÐ¶Ð½ÐµÐ¼Ñ ÑпÑавлÑÑÑ Ð¸Ð¼
на ÑаÑÑÑоÑнии</a>.</p>
-</li>
-<li>
+ </li>
+
+ <li id="M201702060">
<p>“ÐнÑеллекÑÑалÑнÑе” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">ÑелевизоÑÑ
Visio докладÑваÑÑ Ð¾Ð±Ð¾ вÑем, ÑÑо на ниÑ
пÑоÑмаÑÑиваеÑÑÑ, а не ÑолÑко о Ñом,
@@ -150,379 +297,433 @@
из ÑобÑÑвенного компÑÑÑеÑа полÑзоваÑелÑ,
ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð¾ нем
докладÑваеÑ. СÑÑеÑÑвование ÑпоÑоба
оÑклÑÑиÑÑ ÑлежкÑ, даже еÑли Ð±Ñ Ð¾Ð½ не бÑл
ÑкÑÑÑ, как в ÑÑиÑ
ÑелевизоÑаÑ
, не можеÑ
опÑавдÑваÑÑ ÑÑÑ ÑлежкÑ.</p>
-</li>
-<li>
-<p>Ðолее или менее вÑе “ÑмнÑе”
ÑелевизоÑÑ <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">ÑпионÑÑ
-за Ñвоими полÑзоваÑелÑми</a>.</p>
+ </li>
-<p>ÐÑо ÑообÑение 2014 года, но Ð¼Ñ Ð½Ðµ ожидаем,
ÑÑо положение ÑлÑÑÑилоÑÑ.</p>
+ <li id="M201612230">
+ <p>ÐбоÑÑдование Ð´Ð»Ñ Ð²Ð¸ÑÑÑалÑной
ÑеалÑноÑÑи, измеÑÑÑÑее ÑамÑе неболÑÑие
+движениÑ, ÑÐ¾Ð·Ð´Ð°ÐµÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑ Ð´Ð»Ñ
беÑпÑеÑеденÑно ÑÑÑогой Ñлежки за
+полÑзоваÑелем. ÐÑе, ÑÑо нÑжно длÑ
ÑеализаÑии ÑÑой возможноÑÑи —
+<a
+href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">пÑогÑаммÑ,
+вÑедоноÑнÑе в Ñакой же ÑÑепени, как многие
дÑÑгие пÑогÑаммÑ, пеÑеÑиÑленнÑе
+на ÑÑой ÑÑÑаниÑе</a>.</p>
+
+ <p>Ðожно бÑÑÑ ÑвеÑеннÑм, ÑÑо Facebook
ÑеализÑÐµÑ Ð¼Ð°ÐºÑималÑно возможнÑÑ ÑÐ»ÐµÐ¶ÐºÑ Ð²
+ÑÑÑÑойÑÑваÑ
Oculus Rift. ÐоÑалÑ: никогда не
довеÑÑйÑе ÑиÑÑеме виÑÑÑалÑной
+ÑеалÑноÑÑи, пÑогÑÐ°Ð¼Ð¼Ñ Ð² коÑоÑой
неÑвободнÑ.</p>
+ </li>
-<p>ÐÑо показÑваеÑ, ÑÑо когда Ð·Ð°ÐºÐ¾Ð½Ñ ÑÑебÑÑÑ,
ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели пÑодÑкÑов
-ÑоÑмалÑно давали ÑоглаÑие на ÑбоÑ
пеÑÑоналÑнÑÑ
даннÑÑ
, ÑÑого ÑовеÑÑенно не
-доÑÑаÑоÑно. Ð ÑÑо пÑоиÑÑ
одиÑ, когда
полÑзоваÑÐµÐ»Ñ Ð½Ðµ Ð´Ð°ÐµÑ ÑоглаÑиÑ? ÐавеÑное,
-ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð¾ÑвеÑиÑ: “Ðез ваÑего ÑоглаÑиÑ
на ÑÐ»ÐµÐ¶ÐºÑ ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð½Ðµ бÑдеÑ
-ÑабоÑаÑÑ”.</p>
+ <li id="M201612200">
+ <p>РазÑабоÑÑик Ham Radio Deluxe <a
+href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">ÑабоÑиÑовал
+ÑÑÑÐ°Ð½Ð¾Ð²ÐºÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ»Ð¸ÐµÐ½Ñом в наказание
за оÑÑиÑаÑелÑнÑй оÑзÑв</a>.</p>
+
+ <p>ÐолÑÑинÑÑво компаний, занимаÑÑиÑ
ÑÑ
неÑвободнÑми пÑогÑаммами, не пÑименÑÑÑ
+ÑÐ²Ð¾Ñ Ð²Ð»Ð°ÑÑÑ Ñак жеÑÑко, но неÑпÑаведливо
Ñже Ñо, ÑÑо Ñ Ð½Ð¸Ñ
<em>еÑÑÑ</em>
+ÑÐ°ÐºÐ°Ñ Ð²Ð»Ð°ÑÑÑ.</p>
+ </li>
-<p>РадекваÑнÑÑ
законаÑ
говоÑилоÑÑ Ð±Ñ, ÑÑо
ÑелевизоÑÑ Ð½Ðµ Ð´Ð¾Ð»Ð¶Ð½Ñ ÑообÑаÑÑ Ð¾ Ñом,
-ÑÑо пÑоÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ —
безо вÑÑкиÑ
иÑклÑÑений!</p>
-</li>
-<li>
-<p>ÐекоÑоÑÑе <a
-href="http://openlgtv.org.ru/wiki/index.php/Achievements">ÑелевизоÑÑ
LG
-ÑвлÑÑÑÑÑ ÑиÑанами</a>.</p>
-</li>
+ <li id="M201612061">
+ <p>“УмнÑе” игÑÑÑки “Ðой дÑÑг
Ðейла” и i-Que <a
+href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">можно
+конÑÑолиÑоваÑÑ Ð¿Ð¾ ÑоÑÐ¾Ð²Ð¾Ð¼Ñ ÑелеÑонÑ</a>;
ÑизиÑеÑкий доÑÑÑп Ð´Ð»Ñ ÑÑого не
+нÑжен. ÐÑо позволÑÐµÑ Ð²Ð·Ð»Ð¾Ð¼Ñикам
пÑоÑлÑÑиваÑÑ ÑеÑÑ Ñебенка и даже говоÑиÑÑ
+голоÑом ÑамиÑ
игÑÑÑек.</p>
-<li><a
-href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
-“ÐнÑеллекÑÑалÑнÑе” ÑелевизоÑÑ Samsung
обÑаÑили Linux в Ð±Ð°Ð·Ñ Ð´Ð»Ñ
-ÑиÑаниÑеÑкой ÑиÑÑемÑ</a>, ÑÑÐ¾Ð±Ñ Ð½Ð°Ð²ÑзÑваÑÑ
ÑиÑÑовое ÑпÑавление
-огÑаниÑениÑми.Samsung Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾ÑÑÑпаÑÑ Ñак
благодаÑÑ ÑомÑ, ÑÑо Linux
-вÑпÑÑкаеÑÑÑ Ð¿Ð¾Ð´ GNU GPL веÑÑии 2 <a
-href="/licenses/rms-why-gplv3.html">а не веÑÑии 3</a>, а
Ñакже
-оÑÐ»Ð°Ð±Ð»ÐµÐ½Ð½Ð¾Ð¼Ñ ÑÐ¾Ð»ÐºÐ¾Ð²Ð°Ð½Ð¸Ñ GPL веÑÑии 2.
-</li>
+ <p>ÐÑо знаÑиÑ, ÑÑо Ð²Ð¾Ñ Ð¼Ð¾Ð¶ÐµÑ Ð³Ð¾Ð»Ð¾Ñом
игÑÑÑки попÑоÑиÑÑ Ñебенка оÑкÑÑÑÑ Ð´Ð²ÐµÑÑ,
+пока не Ð²Ð¸Ð´Ð¸Ñ Ð¼Ð°Ð¼Ð°.</p>
+ </li>
-<li>
-<p>Ðа компаниÑ-пÑоизводиÑÐµÐ»Ñ ÑпÑавлÑемÑÑ
по ÐнÑеÑнеÑÑ Ð²Ð¸Ð±ÑаÑоÑов <a
-href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">подали
-в ÑÑд за ÑÐ±Ð¾Ñ Ð¼Ð°ÑÑÑ Ð¿ÐµÑÑоналÑнÑÑ
даннÑÑ
о
Ñом, как полÑзоваÑели пÑименÑÑÑ Ð¸Ñ
-изделиÑ</a>.</p>
+ <li id="M201608080">
+ <p><a
+href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">ÐлÑ
+ÑеÑмоÑÑаÑа Ñ Ð½ÐµÑвободнÑми пÑогÑаммами</a>
бÑли ÑазÑабоÑÐ°Ð½Ñ Ð²ÑмогаÑелÑÑкие
+пÑогÑаммÑ.</p>
+ </li>
-<p>Ðозможно, даннÑе дейÑÑвиÑелÑно
анонимизиÑÑÑÑÑÑ, как заÑвлÑÐµÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ, но
-дело не в ÑÑом. ÐÑли она пÑÐ¾Ð´Ð°ÐµÑ Ð´Ð°Ð½Ð½Ñе
бÑокеÑÑ, Ñо бÑÐ¾ÐºÐµÑ Ð¼Ð¾Ð¶ÐµÑ Ð²ÑÑиÑлÑÑÑ,
-ÑÑи именно ÑÑо даннÑе.</p>
-</li>
+ <li id="M201605020">
+ <p>Ð “инÑеллекÑÑалÑном доме”
компании Samsung еÑÑÑ Ð±Ð¾Ð»ÑÑÐ°Ñ Ð¿ÑоÑеÑ
а
+безопаÑноÑÑи; <a
+href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">лÑди
+могÑÑ Ð¿Ð¾Ð»ÑÑаÑÑ Ð½ÐµÑанкÑиониÑованнÑй
ÑдаленнÑй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ним</a>.</p>
-<li>
-<p>Google/Alphabet <a
-href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
-пÑеднамеÑенно вÑвели из ÑÑÑÐ¾Ñ Ð¿ÑодÑкÑÑ
авÑомаÑиÑеÑкого ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð´Ð¾Ð¼Ð¾Ð¼
-Revolv, ÑабоÑа коÑоÑÑÑ
завиÑила Ð¾Ñ ÑеÑвеÑа</a>.
ÐоÑалÑ: не ÑеÑпиÑе Ñакого!
-ÐаÑÑаивайÑе на ÑамоÑÑоÑÑелÑнÑÑ
компÑÑÑеÑаÑ
, коÑоÑÑе ÑабоÑаÑÑ Ð¿Ð¾Ð´
ÑпÑавлением
-ÑвободнÑÑ
пÑогÑамм!</p>
-</li>
+ <p>Samsung заÑвлÑеÑ, ÑÑо ÑÑо “оÑкÑÑÑає
плаÑÑоÑма, Ñак ÑÑо за
+пÑÐ¾Ð±Ð»ÐµÐ¼Ñ ÑаÑÑиÑно оÑвеÑÑÑвеннÑ
ÑазÑабоÑÑики пÑиложений. ÐÑо, ÑазÑмееÑÑÑ,
+веÑно, еÑли ÑÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð½ÐµÑвободнÑ.</p>
-<li>
-<p>У кабелÑного модема ARRIS еÑÑÑ <a
-href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
-ÑеÑнÑй Ñ
од в ÑеÑном Ñ
оде</a>.</p>
-</li>
+ <p>ÐÑе, ÑÑо назÑваеÑÑÑ
“инÑеллекÑÑалÑнÑм”, ÑкоÑее вÑего,
бÑдеÑ
+водиÑÑ Ð²Ð°Ñ Ð·Ð° ноÑ.</p>
+ </li>
-<li>
-<p>Ð “пÑиложениÑÑ
Ð´Ð»Ñ Ñ
ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð´Ð°Ð½Ð½ÑÑ
” Hewlett-Packard, в коÑоÑÑÑ
-пÑименÑеÑÑÑ Ð½ÐµÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑионнаÑ
ÑиÑÑема “Left Hand”, еÑÑÑ
-ÑеÑнÑе Ñ
одÑ, коÑоÑÑе даÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸ <a
-href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
-ÑÑеÑнÑÑ Ð·Ð°Ð¿Ð¸ÑÑ Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа по ÑеÑи</a>.
ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑÑвеÑждаеÑ, ÑÑо ÑÑо не даеÑ
-ей доÑÑÑпа к даннÑм клиенÑа, но Ñаз ÑеÑнÑй Ñ
од позволÑÐµÑ Ð¸Ð·Ð¼ÐµÐ½ÑÑÑ
-ÑÑÑановленнÑе пÑогÑаммÑ, Ñо иÑ
можно
измениÑÑ Ñак, ÑÑÐ¾Ð±Ñ Ð¿ÑогÑаммÑ
-пÑедоÑÑавлÑли доÑÑÑп к даннÑм клиенÑа.
-</p>
-</li>
+ <li id="M201604110">
+ <p><a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">Ð
+видеокамеÑаÑ
ÑиÑÑем безопаÑноÑÑи,
пÑодаваемÑÑ
ÑеÑез Amazon</a>, найденÑ
+вÑедоноÑнÑе пÑогÑаммÑ.</p>
-<li>
-<p><a
-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">Ð
-некоÑоÑÑÑ
маÑÑÑÑÑизаÑоÑаÑ
D-Link</a> еÑÑÑ
ÑеÑнÑй Ñ
од Ð´Ð»Ñ Ð¼Ð¾Ð¼ÐµÐ½ÑалÑного
-Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð½Ð°ÑÑÑоек.</p>
+ <p>ÐамеÑа, коÑоÑÐ°Ñ Ð·Ð°Ð¿Ð¸ÑÑÐ²Ð°ÐµÑ Ð½Ð° Ñвой
ÑизиÑеÑкий ноÑиÑÐµÐ»Ñ Ð¸ Ñ ÐºÐ¾ÑоÑой неÑ
+ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ñ ÑеÑÑÑ, не ÑгÑÐ¾Ð¶Ð°ÐµÑ Ð»ÑдÑм
Ñлежкой — ÑеÑез нее за
+лÑдÑми не бÑдÑÑ Ð¿Ð¾Ð³Ð»ÑдÑваÑÑ, и вÑедоноÑнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð² камеÑе в ÑÑом
+оÑноÑении Ñоже не пÑедÑÑавлÑÑÑ ÑгÑозÑ.</p>
+ </li>
-<p>
-<a href="https://github.com/elvanderb/TCP-32764"> Ðо многиÑ
моделÑÑ
-маÑÑÑÑÑизаÑоÑов еÑÑÑ ÑеÑнÑе Ñ
одÑ</a>.</p>
-</li>
+ <li id="M201604050">
+ <p>Google/Alphabet <a
+href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
+пÑеднамеÑенно вÑвели из ÑÑÑÐ¾Ñ Ð¿ÑодÑкÑÑ
авÑомаÑиÑеÑкого ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð´Ð¾Ð¼Ð¾Ð¼
+Revolv, ÑабоÑа коÑоÑÑÑ
завиÑила Ð¾Ñ ÑеÑвеÑа</a>,
вÑклÑÑив ÑеÑвеÑ. ÐоÑалÑ:
+оÑвеÑгайÑе вÑе Ñакие пÑодÑкÑÑ.
ÐаÑÑаивайÑе на ÑамоÑÑоÑÑелÑнÑÑ
компÑÑÑеÑаÑ
,
+коÑоÑÑе ÑабоÑаÑÑ Ð¿Ð¾Ð´ ÑпÑавлением
ÑвободнÑÑ
пÑогÑамм!</p>
+ </li>
-<li>
-<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> Ð
маÑÑÑÑÑизаÑоÑе
-TP-Link еÑÑÑ ÑеÑнÑй Ñ
од</a>.</p>
-</li>
+ <li id="M201603220">
+ <p>РкамеÑаÑ
наблÑÐ´ÐµÐ½Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ 70 маÑок
обнаÑÑÐ¶ÐµÐ½Ñ <a
+href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">недоÑеÑÑ
+безопаÑноÑÑи, позволÑÑÑие ÐºÐ¾Ð¼Ñ Ñгодно
подглÑдÑваÑÑ ÑеÑез ниÑ
</a>.</p>
+ </li>
-<li>
-<p><a href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+ <li id="M201601100">
+ <p><a href="http://michaelweinberg.org/post/137045828005/free-the-cube">
ТÑеÑ
меÑнÑй пÑинÑÐµÑ Cube ÑпÑоекÑиÑован Ñ
ÑиÑÑовÑм ÑпÑавлением
огÑаниÑениÑми</a>: он не пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑаÑÑ
однÑе маÑеÑÐ¸Ð°Ð»Ñ ÑÑеÑÑиÑ
ÑÑоÑон. ÐÑо
как Keurig, но Ð´Ð»Ñ Ð¿ÑинÑеÑов. СейÑÐ°Ñ ÐµÐ³Ð¾
поддеÑÐ¶ÐºÑ Ð¿ÑекÑаÑаÑÑ, а ÑÑо знаÑиÑ,
ÑÑо Ñо вÑеменем ÑанкÑиониÑованнÑе
маÑеÑÐ¸Ð°Ð»Ñ Ð±ÑдÑÑ Ð½ÐµÐ´Ð¾ÑÑÑÐ¿Ð½Ñ Ð¸ пÑинÑеÑами,
веÑоÑÑно, ÑÑÐ°Ð½ÐµÑ Ð½ÐµÐ²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾
полÑзоваÑÑÑÑ.</p>
-<p>ÐÑли <a
+ <p>ÐÑли <a
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">пÑинÑеÑ
ÑеÑÑиÑиÑиÑован по пÑогÑамме “УважаеÑ
ваÑÑ Ñвободє</a>, об ÑÑой
пÑоблеме не Ð¼Ð¾Ð¶ÐµÑ Ð´Ð°Ð¶Ðµ идÑи ÑеÑи.</p>
-<p>Ðак жалÑ, ÑÑо авÑÐ¾Ñ ÑÑаÑÑи пиÑеÑ, бÑдÑо
Ð½ÐµÑ “ниÑего плоÑ
ого” в
+ <p>Ðак жалÑ, ÑÑо авÑÐ¾Ñ ÑÑаÑÑи пиÑеÑ, бÑдÑо
Ð½ÐµÑ “ниÑего плоÑ
ого” в
Ñом, ÑÑо ÑÑÑÑойÑÑво ÑпÑоекÑиÑовано пÑежде
вÑего Ð´Ð»Ñ Ð¾Ð³ÑаниÑениÑ
полÑзоваÑелей. ÐÑо вÑе Ñавно ÑÑо напиÑаÑÑ
Ñебе на Ð»Ð±Ñ “надÑвайÑе и
обижайÑе менє. ÐÑ Ð½Ðµ должнÑ
обманÑваÑÑÑÑ: нÑжно оÑÑждаÑÑ Ð²Ñе
компании, наживаÑÑиеÑÑ Ð½Ð° ÑакиÑ
лÑдÑÑ
.
Ðменно пÑимиÑение Ñ Ñакой
неÑпÑаведливой пÑакÑикой пÑиÑÑÐ°ÐµÑ Ð»Ñдей к
ÑомÑ, ÑÑÐ¾Ð±Ñ Ð¾Ð± ниÑ
вÑÑиÑали ноги.</p>
-</li>
+ </li>
-<li>
-<p>“ÐнÑеллекÑÑалÑнÑе” Ð»Ð°Ð¼Ð¿Ñ Philips <a
+ <li id="M201512140">
+ <p>“ÐнÑеллекÑÑалÑнÑе” Ð»Ð°Ð¼Ð¿Ñ Phillips
пеÑвонаÑалÑно пÑоекÑиÑовалиÑÑ
+Ð´Ð»Ñ Ð²Ð·Ð°Ð¸Ð¼Ð¾Ð´ÐµÐ¹ÑÑÐ²Ð¸Ñ Ñ Ð¸Ð½ÑеллекÑÑалÑнÑми
лампами дÑÑгиÑ
ÑиÑм, но <a
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
-ÑпÑоекÑиÑÐ¾Ð²Ð°Ð½Ñ Ñак, ÑÑÐ¾Ð±Ñ Ð½Ðµ
взаимодейÑÑвоваÑÑ Ñ Ð¸Ð½ÑеллекÑÑалÑнÑми
лампами
-дÑÑгиÑ
ÑиÑм</a>.</p>
+заÑем ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð¾Ð±Ð½Ð¾Ð²Ð¸Ð»Ð° пÑогÑаммÑ, ÑÑобÑ
запÑеÑиÑÑ Ð²Ð·Ð°Ð¸Ð¼Ð¾Ð´ÐµÐ¹ÑÑвие</a>.</p>
-<p>ÐÑли пÑодÑÐºÑ “инÑеллекÑÑален” и
его Ñделали не вÑ, он иÑкÑÑно
+ <p>ÐÑли пÑодÑÐºÑ “инÑеллекÑÑален” и
его Ñделали не вÑ, он иÑкÑÑно
ÑлÑÐ¶Ð¸Ñ ÑÐ²Ð¾ÐµÐ¼Ñ Ð¿ÑоизводиÑÐµÐ»Ñ <em>пÑоÑив
ваÑ</em>.</p>
-</li>
+ </li>
-<li>
-<p><a
-href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
-ЦиÑÑовое ÑпÑавление огÑаниÑениÑми еÑÑÑ Ð½Ð°
DVD и диÑкаÑ
Bluray</a>.
-</p>
+ <li id="M201512074">
+ <p><a
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">Ð
+некоÑоÑÑÑ
маÑÑÑÑÑизаÑоÑаÑ
D-Link</a> еÑÑÑ
ÑеÑнÑй Ñ
од Ð´Ð»Ñ Ð¼Ð¾Ð¼ÐµÐ½ÑалÑного
+Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð½Ð°ÑÑÑоек.</p>
-<p>Ðа Ñой ÑÑÑаниÑе ÑпоÑÑеблÑÑÑÑÑ
вÑвеÑнÑÑÑе вÑÑажениÑ, благопÑиÑÑнÑе длÑ
-ÑиÑÑового ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми, в Ñом
ÑиÑле <a
-href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
ÑиÑÑовое
-ÑпÑавление “пÑавами”</a> и <a
-href="/philosophy/words-to-avoid.html#Protection">
“заÑиÑа”</a>,
-на ÑÑÑаниÑе ÑÑвеÑждаеÑÑÑ, ÑÑо за наложение
ÑиÑÑового ÑпÑавлениÑ
-огÑаниÑениÑми на ÑÑи диÑки оÑвеÑÑÑÐ²ÐµÐ½Ð½Ñ Ð²
пеÑвÑÑ Ð¾ÑеÑедÑ
-“аÑÑиÑÑÑ”, а не компании. Ðак Ð±Ñ Ñо ни
бÑло, ÑÑаÑÑÑ ÑлÑжиÑ
-иÑÑоÑником ÑакÑиÑеÑкиÑ
Ñведений.
-</p>
+ <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> Ð
маÑÑÑÑÑизаÑоÑе
+TP-Link еÑÑÑ ÑеÑнÑй Ñ
од</a>.</p>
-<p>Ðа каждом диÑке Bluray (за немногими Ñедкими
иÑклÑÑениÑми) еÑÑÑ ÑиÑÑовое
-ÑпÑавление огÑаниÑениÑми; Ñак ÑÑо не
полÑзÑйÑеÑÑ Ð´Ð¸Ñками Bluray!</p>
-</li>
+ <p><a href="https://github.com/elvanderb/TCP-32764"> Ðо многиÑ
моделÑÑ
+маÑÑÑÑÑизаÑоÑов еÑÑÑ ÑеÑнÑе Ñ
одÑ</a>.</p>
+ </li>
-<li id="cameras-bugs">
-<p>РкамеÑаÑ
наблÑÐ´ÐµÐ½Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ 70 маÑок
обнаÑÑÐ¶ÐµÐ½Ñ <a
-href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">недоÑеÑÑ
-безопаÑноÑÑи, позволÑÑÑие ÐºÐ¾Ð¼Ñ Ñгодно
подглÑдÑваÑÑ ÑеÑез ниÑ
</a>.</p>
-</li>
+ <li id="M201511250">
+ <p><a
+href="http://www.bbc.com/news/technology-34922712">“ÐнÑеллекÑÑалÑнає
+камеÑа Nest Cam ÑмоÑÑÐ¸Ñ Ð²Ñегда</a>, даже когда
“владелеє еe
+“вÑклÑÑаеє.</p>
-<li>
-<p>Ð “инÑеллекÑÑалÑном доме” компании
Samsung еÑÑÑ Ð±Ð¾Ð»ÑÑÐ°Ñ Ð¿ÑоÑеÑ
а
-безопаÑноÑÑи; <a
-href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">лÑди
-могÑÑ Ð¿Ð¾Ð»ÑÑаÑÑ Ð½ÐµÑанкÑиониÑованнÑй
ÑдаленнÑй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ним</a>.</p>
+ <p>“ÐнÑеллекÑÑалÑное” ÑÑÑÑойÑÑво
ознаÑаеÑ, ÑÑо пÑоизводиÑелÑ
+полÑзÑеÑÑÑ Ð¸Ð¼, ÑÑÐ¾Ð±Ñ Ð¸Ð½ÑеллекÑÑалÑно ваÑ
надÑÑÑ.</p>
+ </li>
-<p>Samsung заÑвлÑеÑ, ÑÑо ÑÑо “оÑкÑÑÑає
плаÑÑоÑма, Ñак ÑÑо за
-пÑÐ¾Ð±Ð»ÐµÐ¼Ñ ÑаÑÑиÑно оÑвеÑÑÑвеннÑ
ÑазÑабоÑÑики пÑиложений. ÐÑо, ÑазÑмееÑÑÑ,
-веÑно, еÑли ÑÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð½ÐµÑвободнÑ.</p>
+ <li id="M201511198">
+ <p>У кабелÑного модема ARRIS еÑÑÑ <a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ÑеÑнÑй Ñ
од в ÑеÑном Ñ
оде</a>.</p>
+ </li>
-<p>ÐÑе, ÑÑо назÑваеÑÑÑ
“инÑеллекÑÑалÑнÑм”, ÑкоÑее вÑего,
бÑдеÑ
-водиÑÑ Ð²Ð°Ñ Ð·Ð° ноÑ.</p>
-</li>
+ <li id="M201511130">
+ <p>ÐекоÑоÑÑе ÑекламнÑе обÑÑÐ²Ð»ÐµÐ½Ð¸Ñ Ð²
ÐнÑеÑнеÑе и на Ñелевидении пеÑедаÑÑ
+неÑлÑÑнÑе звÑки Ð´Ð»Ñ Ð¿Ñиема неÑвободнÑми
вÑедоноÑнÑми пÑогÑаммами,
+ÑабоÑаÑÑими ÑÑдом на дÑÑгиÑ
ÑÑÑÑойÑÑваÑ
,
ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделÑÑÑ, ÑÑо они
+неподалекÑ. Ðогда подклÑÑеннÑе к
ÐнÑеÑнеÑÑ ÑÑÑÑойÑÑва ÑвÑÐ·Ð°Ð½Ñ Ñ
ÑелевизоÑом,
+ÑекламодаÑели могÑÑ ÑÑаÑиÑÑиÑеÑки
оÑениваÑÑ ÑвÑÐ·Ñ ÑÐµÐºÐ»Ð°Ð¼Ñ Ñ Ð°ÐºÑивноÑÑÑÑ Ð²
+ÐнÑеÑнеÑе, а Ñакже пÑоводиÑÑ Ð´ÑÑгÑÑ <a
+href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">ÑлежкÑ
+на ÑвÑзаннÑÑ
ÑÑÑÑойÑÑваÑ
</a>.</p>
+ </li>
-<li>
-<p>
-<a
-href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">Ð
-видеокамеÑаÑ
ÑиÑÑем безопаÑноÑÑи,
пÑодаваемÑÑ
ÑеÑез Amazon</a>, найденÑ
-вÑедоноÑнÑе пÑогÑаммÑ.
-</p>
+ <li id="M201511060">
+ <p>Vizio Ð¸Ð´ÐµÑ Ð½Ð° Ñаг далÑÑе дÑÑгиÑ
пÑоизводиÑелей ÑелевизоÑов, ÑÐ¿Ð¸Ð¾Ð½Ñ Ð·Ð°
Ñвоими
+полÑзоваÑелÑми: иÑ
<a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+“инÑеллекÑÑалÑнÑе” ÑелевизоÑÑ
подÑобно анализиÑÑÑÑ Ð²Ð°Ñи пÑивÑÑки
+пÑоÑмоÑÑа и ÑвÑзÑваÑÑ Ð¸Ñ
Ñ Ð²Ð°Ñим адÑеÑом
IP</a>, ÑÑÐ¾Ð±Ñ ÑекламодаÑели могли
+оÑÑлеживаÑÑ Ð²Ð°Ñ Ð½Ð° ÑазлиÑнÑÑ
ÑÑÑÑойÑÑваÑ
.</p>
-<p>ÐамеÑа, коÑоÑÐ°Ñ Ð·Ð°Ð¿Ð¸ÑÑÐ²Ð°ÐµÑ Ð½Ð° Ñвой
ÑизиÑеÑкий ноÑиÑÐµÐ»Ñ Ð¸ Ñ ÐºÐ¾ÑоÑой неÑ
-ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ñ ÑеÑÑÑ, не ÑгÑÐ¾Ð¶Ð°ÐµÑ Ð»ÑдÑм
Ñлежкой — ÑеÑез нее за
-лÑдÑми не бÑдÑÑ Ð¿Ð¾Ð³Ð»ÑдÑваÑÑ, и вÑедоноÑнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð² камеÑе в ÑÑом
-оÑноÑении Ñоже не пÑедÑÑавлÑÑÑ ÑгÑозÑ.</p>
-</li>
+ <p>ÐÑо можно вÑклÑÑиÑÑ, но неÑпÑаведливо
Ñже Ñо, ÑÑо по ÑмолÑÐ°Ð½Ð¸Ñ ÑÑо вклÑÑено.</p>
+ </li>
+
+ <li id="M201511020">
+ <p>ÐÐ¾Ð³Ð¾Ð²Ð¾Ñ Tivo Ñ Viacom добавлÑÐµÑ 2,3 миллиона
кваÑÑÐ¸Ñ Ðº 600 миллионам
+пÑоÑилей ÑоÑиалÑнÑÑ
ÑеÑей, за коÑоÑÑми ÑÑа
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ñже наблÑдаеÑ. ÐлиенÑÑ
+Tivo не знаÑÑ, ÑÑо на ниÑ
ÑмоÑÑÑÑ
ÑекламодаÑели. ÐомбиниÑÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
+пÑоÑмоÑÑе ÑелепеÑÐµÐ´Ð°Ñ Ñ ÑÑаÑÑием в
ÑоÑиалÑнÑÑ
ÑеÑÑÑ
, Tivo Ð¼Ð¾Ð¶ÐµÑ ÑепеÑÑ <a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">ÑвÑзÑваÑÑ
+ÑелеÑÐµÐºÐ»Ð°Ð¼Ñ Ñ Ð¿Ð¾ÐºÑпками, ÑовеÑÑаемÑми по
ÑеÑи</a>, подÑÑавлÑÑ Ð¿Ð¾ ÑмолÑаниÑ
+вÑеÑ
полÑзоваÑелей под новÑй
комбиниÑованнÑй вид Ñлежки.</p>
+ </li>
-<li>
-<p> <a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">Ð
-ÑизкÑлÑÑÑÑнÑÑ
ÑÑÑÑойÑÑваÑ
FitBit еÑÑÑ
ÑÑзвимоÑÑÑ Bluetooth</a>, позволÑÑÑаÑ
-поÑÑлаÑÑ Ð² ÑÑÑÑойÑÑва вÑедоноÑнÑе
пÑогÑаммÑ, коÑоÑÑе заÑем могÑÑ
-ÑаÑпÑоÑÑÑанÑÑÑÑÑ Ð¿Ð¾ компÑÑÑеÑам и дÑÑгим
ÑÑÑÑойÑÑвам FitBit, Ñ ÐºÐ¾ÑоÑÑми они
-взаимодейÑÑвÑÑÑ.</p>
-</li>
+ <li id="M201510210">
+ <p><a
+href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">ÑÑзвимоÑÑÑ
+Bluetooth</a>, позволÑÑÑÐ°Ñ Ð¿Ð¾ÑÑлаÑÑ Ð² ÑÑÑÑойÑÑва
вÑедоноÑнÑе пÑогÑаммÑ,
+коÑоÑÑе заÑем могÑÑ ÑаÑпÑоÑÑÑанÑÑÑÑÑ Ð¿Ð¾
компÑÑÑеÑам и дÑÑгим ÑÑÑÑойÑÑвам
+FitBit, Ñ ÐºÐ¾ÑоÑÑми они взаимодейÑÑвÑÑÑ.</p>
+ </li>
-<li>
-<p> “СамоÑиÑÑÑÑÑиеÑÑ” жеÑÑкие диÑки
ÑиÑÑÑÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð½ÐµÑвободнÑÑ
+ <li id="M201510200">
+ <p>“СамоÑиÑÑÑÑÑиеÑÑ” жеÑÑкие диÑки
ÑиÑÑÑÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð½ÐµÑвободнÑÑ
внÑÑÑенниÑ
пÑогÑамм, Ñак ÑÑо Ð²Ñ Ð½Ðµ можеÑе
им довеÑÑÑÑ. <a
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">У
диÑков “My Passport” компании Western Digital
еÑÑÑ ÑеÑнÑй
Ñ
од</a>.</p>
-</li>
+ </li>
-<li>
-<p>
-ÐнÑÑзионнÑе наÑоÑÑ Hospira, пÑименÑемÑе длÑ
ввода болÑнÑм лекаÑÑÑв, бÑли
+ <li id="M201507240">
+ <p>“УмнÑе” ÑелевизоÑÑ Vizio
ÑаÑпознаÑÑ Ð¸ <a
+href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">оÑÑлеживаÑÑ
+Ñо, ÑÑо ÑмоÑÑÑÑ Ð»Ñди</a>, даже еÑли ÑÑо не
ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¸Ð¾Ð½Ð½Ð°Ñ Ð¿ÐµÑедаÑа.</p>
+ </li>
+
+ <li id="M201506080">
+ <p>Ðз-за плоÑ
ой заÑиÑÑ Ð² инÑÑзионном
наÑоÑе взломÑики могÑÑ Ð¸ÑполÑзоваÑÑ ÐµÐ³Ð¾
+Ð´Ð»Ñ <a
+href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">ÑбийÑÑва
+паÑиенÑов</a>.</p>
+ </li>
+
+ <li id="M201505290">
+ <p>ÐабелÑное Ñелевидение Verizon <a
+href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">подглÑдÑваеÑ
+за Ñем, какие ÑилÑÐ¼Ñ Ð»Ñди ÑмоÑÑÑÑ Ð¸ даже
какие они заÑ
оÑели запиÑаÑÑ</a>.</p>
+ </li>
+
+ <li id="M201505050">
+ <p>ÐнÑÑзионнÑе наÑоÑÑ Hospira, пÑименÑемÑе
Ð´Ð»Ñ Ð²Ð²Ð¾Ð´Ð° болÑнÑм лекаÑÑÑв, бÑли
оÑмеÑÐµÐ½Ñ ÑпеÑиалиÑÑом по безопаÑноÑÑи как
“<a
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">ÑамÑе
плоÑ
о заÑиÑеннÑе ÑеÑевÑе ÑÑÑÑойÑÑва из
вÑеÑ
, какие Ñ ÐºÐ¾Ð³Ð´Ð°-либо
видел</a>”.</p>
-<p>Ð ÑлÑÑае некоÑоÑÑÑ
пÑепаÑаÑов ÑÑо даеÑ
злоÑмÑÑÐ»ÐµÐ½Ð½Ð¸ÐºÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ Ð²Ð²ÐµÑÑи
+ <p>Ð ÑлÑÑае некоÑоÑÑÑ
пÑепаÑаÑов ÑÑо даеÑ
злоÑмÑÑÐ»ÐµÐ½Ð½Ð¸ÐºÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ Ð²Ð²ÐµÑÑи
паÑиенÑÑ ÑмеÑÑелÑнÑÑ Ð´Ð¾Ð·Ñ.</p>
-</li>
+ </li>
-<li>
-<p>Ðз-за плоÑ
ой заÑиÑÑ Ð² инÑÑзионном наÑоÑе
взломÑики могÑÑ Ð¸ÑполÑзоваÑÑ ÐµÐ³Ð¾
-Ð´Ð»Ñ <a
-href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">ÑбийÑÑва
-паÑиенÑов</a>.</p>
-</li>
+ <li id="M201504300">
+ <p>Vizio <a
+href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+воÑполÑзовалаÑÑ “обновлением”
пÑогÑамм в ÑÑÑÑойÑÑваÑ
, ÑÑобÑ
+заÑÑавиÑÑ ÑелевизоÑÑ Ð¿Ð¾Ð´Ð³Ð»ÑдÑваÑÑ Ð·Ð° Ñем,
ÑÑо ÑмоÑÑÑÑ
+полÑзоваÑели</a>. Ðогда ÑелевизоÑÑ
пÑодавали, они ÑÑого еÑе не делали.</p>
+ </li>
-<li>
-<p>Ð ÑиÑÑÐµÐ¼Ñ <a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
-“инÑеллекÑÑалÑнÑÑ
домов”</a>,
оказÑваеÑÑÑ, до идиоÑизма легко
-пÑоникнÑÑÑ.</p>
-</li>
+ <li id="M201502180">
+ <p>ÐаÑби <a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">ÑобиÑаеÑÑÑ
+ÑпиониÑÑ Ð·Ð° деÑÑми и взÑоÑлÑми</a>.</p>
+ </li>
-<li>
-<p><a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-ФедеÑалÑÐ½Ð°Ñ ÑоÑÐ³Ð¾Ð²Ð°Ñ ÐºÐ¾Ð¼Ð¸ÑÑÐ¸Ñ Ð½Ð°ÐºÐ°Ð·Ð°Ð»Ð°
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð·Ð° пÑоизводÑÑво ÑеÑевÑÑ
-ÐºÐ°Ð¼ÐµÑ Ñо Ñлабой заÑиÑой</a>, Ñак ÑÑо каждÑй
мог легко глÑдеÑÑ ÑеÑез ниÑ
.</p>
-</li>
+ <li id="M201502090">
+ <p>“УмнÑе” ÑелевизоÑÑ Samsung <a
+href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">пеÑедаÑÑ
+по ÐнÑеÑнеÑÑ ÑеÑÑ Ð¿Ð¾Ð»ÑзоваÑелей в дÑÑгÑÑ
компаниÑ, Nuance</a>. Nuance можеÑ
+ее ÑоÑ
ÑанÑÑÑ, а заÑем компании пÑиÑ
одиÑÑÑ
пеÑедаваÑÑ ÐµÐµ в гоÑÑдаÑÑÑвеннÑе
+оÑÐ³Ð°Ð½Ñ Ð¡Ð¨Ð Ð¸Ð»Ð¸ дÑÑгой ÑÑÑанÑ.</p>
-<li>
-<p><a
-href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
-ÐолÑÑив конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ вживленнÑми
медиÑинÑкими ÑÑÑÑойÑÑвами по Ñадио, можно
-ÑбиваÑÑ Ð»Ñдей</a>. ÐодÑобноÑÑи Ñм. <a
-href="http://www.bbc.co.uk/news/technology-17631838"> на ÑайÑе
Ðи-Ðи-Си</a>
-и <a
-href="https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
-в блоге IOActive</a>.</p>
-</li>
+ <p>РаÑÐ¿Ð¾Ð·Ð½Ð°Ð²Ð°Ð½Ð¸Ñ ÑеÑи не ÑледÑеÑ
довеÑÑÑÑ, еÑли ÑолÑко оно не пÑоводиÑÑÑ
+ÑвободнÑми пÑогÑаммами на ваÑем
ÑобÑÑвенном компÑÑÑеÑе.</p>
-<li>
-<p>Ðного <a
-href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">болÑниÑного
-обоÑÑÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð·Ð°ÑиÑено паÑÑиво</a>, и ÑÑо
Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑмеÑÑелÑно.</p>
-</li>
+ <p>Ð Ñвоей полиÑике пÑиваÑноÑÑи Samsung
ÑвнÑм обÑазом подÑвеÑждаеÑ, ÑÑо <a
+href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">голоÑовÑе
+даннÑе, ÑодеÑжаÑие конÑиденÑиалÑнÑÑ
инÑоÑмаÑиÑ, бÑдÑÑ Ð¿ÐµÑедаваÑÑÑÑ ÑÑеÑÑим
+ÑÑоÑонам</a>.</p>
+ </li>
-<li>
-<p><a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
-ТеÑÐ¼Ð¸Ð½Ð°Ð»Ñ Ð² меÑÑаÑ
пÑодаж, ÑабоÑаÑÑие под
ÑпÑавлением Windows, бÑли взÑÑÑ
-злоÑмÑÑленниками под конÑÑолÑ</a> и
обÑаÑÐµÐ½Ñ Ð² ÑеÑÑ ÑбоÑа номеÑов кÑедиÑнÑÑ
-каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов.</p>
-</li>
+ <li id="M201411090">
+ <p>“УмнÑй” ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Amazon <a
+href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ Ð²Ñе вÑемÑ</a>.</p>
+ </li>
-<li id="vizio-snoop">
-<p>Vizio <a
-href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
-воÑполÑзовалаÑÑ “обновлением”
пÑогÑамм в ÑÑÑÑойÑÑваÑ
, ÑÑобÑ
-заÑÑавиÑÑ ÑелевизоÑÑ Ð¿Ð¾Ð´Ð³Ð»ÑдÑваÑÑ Ð·Ð° Ñем,
ÑÑо ÑмоÑÑÑÑ
-полÑзоваÑели</a>. Ðогда ÑелевизоÑÑ
пÑодавали, они ÑÑого еÑе не делали.</p>
-</li>
+ <li id="M201409290">
+ <p>Ðолее или менее вÑе “ÑмнÑе”
ÑелевизоÑÑ <a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">ÑпионÑÑ
+за Ñвоими полÑзоваÑелÑми</a>.</p>
-<li>
-<p>LG <a
+ <p>ÐÑо ÑообÑение 2014 года, но Ð¼Ñ Ð½Ðµ ожидаем,
ÑÑо положение ÑлÑÑÑилоÑÑ.</p>
+
+ <p>ÐÑо показÑваеÑ, ÑÑо когда законÑ
ÑÑебÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели пÑодÑкÑов
+ÑоÑмалÑно давали ÑоглаÑие на ÑбоÑ
пеÑÑоналÑнÑÑ
даннÑÑ
, ÑÑого ÑовеÑÑенно не
+доÑÑаÑоÑно. Ð ÑÑо пÑоиÑÑ
одиÑ, когда
полÑзоваÑÐµÐ»Ñ Ð½Ðµ Ð´Ð°ÐµÑ ÑоглаÑиÑ? ÐавеÑное,
+ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð¾ÑвеÑиÑ: “Ðез ваÑего ÑоглаÑиÑ
на ÑÐ»ÐµÐ¶ÐºÑ ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð½Ðµ бÑдеÑ
+ÑабоÑаÑÑ”.</p>
+
+ <p>РадекваÑнÑÑ
законаÑ
говоÑилоÑÑ Ð±Ñ,
ÑÑо ÑелевизоÑÑ Ð½Ðµ Ð´Ð¾Ð»Ð¶Ð½Ñ ÑообÑаÑÑ Ð¾ Ñом,
+ÑÑо пÑоÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ —
безо вÑÑкиÑ
иÑклÑÑений!</p>
+ </li>
+
+ <li id="M201407170">
+ <p id="nest-thermometers">ТеÑмомеÑÑÑ Nest <a
+href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">вÑÑÑлаÑÑ
много
+даннÑÑ
о полÑзоваÑеле</a>.</p>
+ </li>
+
+ <li id="M201405201">
+ <p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
оÑклÑÑала ÑеÑевÑе ÑÑнкÑии</a> в <em>кÑпленнÑÑ
до ÑÑого</em>
“инÑеллекÑÑалÑнÑÑ
” ÑелевизоÑаÑ
,
еÑли покÑпаÑели бÑли не
ÑоглаÑнÑ, ÑÑÐ¾Ð±Ñ LG ÑÑала подглÑдÑваÑÑ Ð·Ð°
ними и ÑаÑпÑоÑÑÑанÑÑÑ Ð¸Ñ
лиÑнÑе
даннÑе.</p>
-</li>
+ </li>
-<li>
-<p><a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">ÐаÑби
-ÑобиÑаеÑÑÑ ÑпиониÑÑ</a> за деÑÑми и
взÑоÑлÑми.</p>
-</li>
+ <li id="M201404250">
+ <p>Ðного <a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">болÑниÑного
+обоÑÑÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð·Ð°ÑиÑено паÑÑиво</a>, и ÑÑо
Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑмеÑÑелÑно.</p>
+ </li>
-<li>
-<p><a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">СеÑевÑе
-ÑелеÑÐ¾Ð½Ñ TNP Cisco ÑпионÑÑ</a>.</p>
-</li>
+ <li id="M201312290">
+ <p><a href="http://www.bunniestudios.com/blog/?p=3554"> Ð
некоÑоÑÑÑ
видаÑ
+поÑÑаÑивной памÑÑи еÑÑÑ Ð¿ÑогÑаммÑ,
коÑоÑÑе можно изменÑÑÑ</a>. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ Ð¸Ñ
+ÑÑзвимÑми Ð´Ð»Ñ Ð²Ð¸ÑÑÑов.</p>
+
+ <p>ÐÑ Ð½Ðµ назÑваем ÑÑо “ÑеÑнÑм Ñ
одом”, Ð²ÐµÐ´Ñ Ñо, ÑÑо Ð²Ñ Ð¼Ð¾Ð¶ÐµÑе
+ÑÑÑановиÑÑ Ð½Ð¾Ð²ÑÑ ÑиÑÑÐµÐ¼Ñ Ð½Ð° компÑÑÑеÑ, к
коÑоÑÐ¾Ð¼Ñ Ñ Ð²Ð°Ñ ÐµÑÑÑ ÑизиÑеÑкий
+доÑÑÑп — ÑÑо ноÑмалÑно. Ðднако Ñ ÐºÐ°ÑÑ
памÑÑи не должно бÑÑÑ
+возможноÑÑи ÑакиÑ
изменений.</p>
+ </li>
-<li>
-<p><a
-href="http://www.bbc.com/news/technology-34922712">“ÐнÑеллекÑÑалÑнає
-камеÑа Nest Cam ÑмоÑÑÐ¸Ñ Ð²Ñегда</a>, даже когда
“владелеє еe
-“вÑклÑÑаеє.</p>
+ <li id="M201312040">
+ <p><a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+ТеÑÐ¼Ð¸Ð½Ð°Ð»Ñ Ð² меÑÑаÑ
пÑодаж, ÑабоÑаÑÑие под
ÑпÑавлением Windows, бÑли взÑÑÑ
+злоÑмÑÑленниками под конÑÑолÑ</a> и
обÑаÑÐµÐ½Ñ Ð² ÑеÑÑ ÑбоÑа номеÑов кÑедиÑнÑÑ
+каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов.</p>
+ </li>
-<p>“ÐнÑеллекÑÑалÑное” ÑÑÑÑойÑÑво
ознаÑаеÑ, ÑÑо пÑоизводиÑелÑ
-полÑзÑеÑÑÑ Ð¸Ð¼, ÑÑÐ¾Ð±Ñ Ð¸Ð½ÑеллекÑÑалÑно ваÑ
надÑÑÑ.</p>
-</li>
+ <li id="M201311210">
+ <p> ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² “ÑмнÑÑ
”
ÑелевизоÑаÑ
LG<a
+href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+докладÑваÑÑ Ð¾ Ñом, ÑÑо ÑмоÑÑиÑ
полÑзоваÑелÑ, незавиÑимо Ð¾Ñ Ñого, ÑазÑеÑено
+ли ÑÑо в наÑÑÑойкаÑ
ÑелевизоÑа</a> (даже
когда ÑеÑÐ²ÐµÑ Ð¾ÑвеÑÐ°ÐµÑ ÐºÐ²Ð¸ÑанÑией
+“ÑÑÑаниÑа не найдена” на вÑÑланнÑе
даннÑе, ÑÑо ниÑего не знаÑиÑ;
+ÑÑи даннÑе вÑе Ñавно могÑÑ ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð°
ÑеÑвеÑе LG).</p>
-<li>
-<p>Vizio Ð¸Ð´ÐµÑ Ð½Ð° Ñаг далÑÑе дÑÑгиÑ
пÑоизводиÑелей ÑелевизоÑов, ÑÐ¿Ð¸Ð¾Ð½Ñ Ð·Ð°
Ñвоими
-полÑзоваÑелÑми: иÑ
<a
-href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
-“инÑеллекÑÑалÑнÑе” ÑелевизоÑÑ
подÑобно анализиÑÑÑÑ Ð²Ð°Ñи пÑивÑÑки
-пÑоÑмоÑÑа и ÑвÑзÑваÑÑ Ð¸Ñ
Ñ Ð²Ð°Ñим адÑеÑом
IP</a>, ÑÑÐ¾Ð±Ñ ÑекламодаÑели могли
-оÑÑлеживаÑÑ Ð²Ð°Ñ Ð½Ð° ÑазлиÑнÑÑ
ÑÑÑÑойÑÑваÑ
.</p>
+ <p>Ð¥Ñже Ñого: <a
+href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð¿Ð¾Ð´ÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð·Ð° дÑÑгими
ÑÑÑÑойÑÑвами по локалÑной ÑеÑи
+полÑзоваÑелÑ</a>.</p>
-<p>ÐÑо можно вÑклÑÑиÑÑ, но неÑпÑаведливо
Ñже Ñо, ÑÑо по ÑмолÑÐ°Ð½Ð¸Ñ ÑÑо вклÑÑено.</p>
-</li>
+ <p>ÐпоÑледÑÑвии LG заÑвила, ÑÑо обновила
пÑогÑаммÑ, ÑÑÐ¾Ð±Ñ Ð¿ÑекÑаÑиÑÑ ÑÑо, но
+ÑпиониÑÑ Ñаким обÑазом Ð¼Ð¾Ð¶ÐµÑ Ð»Ñбой
пÑодÑкÑ.</p>
+ </li>
-<li>
-<p>ÐÐ¾Ð³Ð¾Ð²Ð¾Ñ Tivo Ñ Viacom добавлÑÐµÑ 2,3 миллиона
кваÑÑÐ¸Ñ Ðº 600 миллионам
-пÑоÑилей ÑоÑиалÑнÑÑ
ÑеÑей, за коÑоÑÑми ÑÑа
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ñже наблÑдаеÑ. ÐлиенÑÑ
-Tivo не знаÑÑ, ÑÑо на ниÑ
ÑмоÑÑÑÑ
ÑекламодаÑели. ÐомбиниÑÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
-пÑоÑмоÑÑе ÑелепеÑÐµÐ´Ð°Ñ Ñ ÑÑаÑÑием в
ÑоÑиалÑнÑÑ
ÑеÑÑÑ
, Tivo Ð¼Ð¾Ð¶ÐµÑ ÑепеÑÑ <a
-href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">ÑвÑзÑваÑÑ
-ÑелеÑÐµÐºÐ»Ð°Ð¼Ñ Ñ Ð¿Ð¾ÐºÑпками, ÑовеÑÑаемÑми по
ÑеÑи</a>, подÑÑавлÑÑ Ð¿Ð¾ ÑмолÑаниÑ
-вÑеÑ
полÑзоваÑелей под новÑй
комбиниÑованнÑй вид Ñлежки.</p>
-</li>
+ <li id="M201310070">
+ <p id="bluray"><a
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
+ЦиÑÑовое ÑпÑавление огÑаниÑениÑми еÑÑÑ Ð½Ð°
DVD и диÑкаÑ
Bluray</a>.</p>
-<li>
-<p>ÐекоÑоÑÑе ÑекламнÑе обÑÑÐ²Ð»ÐµÐ½Ð¸Ñ Ð²
ÐнÑеÑнеÑе и на Ñелевидении пеÑедаÑÑ
-неÑлÑÑнÑе звÑки Ð´Ð»Ñ Ð¿Ñиема неÑвободнÑми
вÑедоноÑнÑми пÑогÑаммами,
-ÑабоÑаÑÑими ÑÑдом на дÑÑгиÑ
ÑÑÑÑойÑÑваÑ
,
ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделÑÑÑ, ÑÑо они
-неподалекÑ. Ðогда подклÑÑеннÑе к
ÐнÑеÑнеÑÑ ÑÑÑÑойÑÑва ÑвÑÐ·Ð°Ð½Ñ Ñ
ÑелевизоÑом,
-ÑекламодаÑели могÑÑ ÑÑаÑиÑÑиÑеÑки
оÑениваÑÑ ÑвÑÐ·Ñ ÑÐµÐºÐ»Ð°Ð¼Ñ Ñ Ð°ÐºÑивноÑÑÑÑ Ð²
-ÐнÑеÑнеÑе, а Ñакже пÑоводиÑÑ Ð´ÑÑгÑÑ <a
-href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">ÑлежкÑ
-на ÑвÑзаннÑÑ
ÑÑÑÑойÑÑваÑ
</a>.</p>
-</li>
+ <p>Ðа Ñой ÑÑÑаниÑе ÑпоÑÑеблÑÑÑÑÑ
вÑвеÑнÑÑÑе вÑÑажениÑ, благопÑиÑÑнÑе длÑ
+ÑиÑÑового ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми, в Ñом
ÑиÑле <a
+href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
ÑиÑÑовое
+ÑпÑавление “пÑавами”</a> и <a
+href="/philosophy/words-to-avoid.html#Protection">
“заÑиÑа”</a>,
+на ÑÑÑаниÑе ÑÑвеÑждаеÑÑÑ, ÑÑо за наложение
ÑиÑÑового ÑпÑавлениÑ
+огÑаниÑениÑми на ÑÑи диÑки оÑвеÑÑÑÐ²ÐµÐ½Ð½Ñ Ð²
пеÑвÑÑ Ð¾ÑеÑедÑ
+“аÑÑиÑÑÑ”, а не компании. Ðак Ð±Ñ Ñо ни
бÑло, ÑÑаÑÑÑ ÑлÑжиÑ
+иÑÑоÑником ÑакÑиÑеÑкиÑ
Ñведений.</p>
-<li>
-<p>“УмнÑе” ÑелевизоÑÑ Vizio ÑаÑпознаÑÑ Ð¸
<a
-href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">оÑÑлеживаÑÑ
-Ñо, ÑÑо ÑмоÑÑÑÑ Ð»Ñди</a>, даже еÑли ÑÑо не
ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¸Ð¾Ð½Ð½Ð°Ñ Ð¿ÐµÑедаÑа.</p>
-</li>
+ <p>Ðа каждом диÑке Bluray (за немногими
Ñедкими иÑклÑÑениÑми) еÑÑÑ ÑиÑÑовое
+ÑпÑавление огÑаниÑениÑми; Ñак ÑÑо не
полÑзÑйÑеÑÑ Ð´Ð¸Ñками Bluray!</p>
+ </li>
-<li>
-<p>“УмнÑй” ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Amazon <a
-href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
-ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ Ð²Ñе вÑемÑ</a>.</p>
-</li>
+ <li id="M201309050">
+ <p>ФедеÑалÑÐ½Ð°Ñ ÑоÑÐ³Ð¾Ð²Ð°Ñ ÐºÐ¾Ð¼Ð¸ÑÑиÑ
наказала ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð·Ð° пÑоизводÑÑво ÑеÑевÑÑ
+ÐºÐ°Ð¼ÐµÑ Ñ Ñакой Ñлабой заÑиÑой, <a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+ÑÑо каждÑй мог легко глÑдеÑÑ ÑеÑез ниÑ
</a>.</p>
+ </li>
-<li>
-<p>“УмнÑе” ÑелевизоÑÑ Samsung <a
-href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">пеÑедаÑÑ
-по ÐнÑеÑнеÑÑ ÑеÑÑ Ð¿Ð¾Ð»ÑзоваÑелей в дÑÑгÑÑ
компаниÑ, Nuance</a>. Nuance можеÑ
-ее ÑоÑ
ÑанÑÑÑ, а заÑем компании пÑиÑ
одиÑÑÑ
пеÑедаваÑÑ ÐµÐµ в гоÑÑдаÑÑÑвеннÑе
-оÑÐ³Ð°Ð½Ñ Ð¡Ð¨Ð Ð¸Ð»Ð¸ дÑÑгой ÑÑÑанÑ.</p>
+ <li id="M201308060">
+ <p><a href="http://spritesmods.com/?art=hddhack&page=6">
ÐеÑезапиÑÑваемÑе
+неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² конÑÑоллеÑаÑ
диÑков могÑÑ Ð·Ð°Ð¼ÐµÐ½ÑÑÑÑÑ Ð½ÐµÑвободной
+пÑогÑаммой</a>. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ Ð»ÑбÑÑ ÑиÑÑемÑ
ÑÑзвимой по оÑноÑÐµÐ½Ð¸Ñ Ðº
+неÑÑÑÑанÑемÑм аÑакам, коÑоÑÑе не
обнаÑÑживаÑÑÑÑ Ð¾Ð±ÑÑнÑм анализом.</p>
+ </li>
-<p>РаÑÐ¿Ð¾Ð·Ð½Ð°Ð²Ð°Ð½Ð¸Ñ ÑеÑи не ÑледÑÐµÑ Ð´Ð¾Ð²ÐµÑÑÑÑ,
еÑли ÑолÑко оно не пÑоводиÑÑÑ
-ÑвободнÑми пÑогÑаммами на ваÑем
ÑобÑÑвенном компÑÑÑеÑе.</p>
+ <li id="M201307270">
+ <p> <a
+href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+ÐолÑÑив конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ вживленнÑми
медиÑинÑкими ÑÑÑÑойÑÑвами по Ñадио, можно
+ÑбиваÑÑ Ð»Ñдей</a>. ÐодÑобноÑÑи Ñм. <a
+href="http://www.bbc.co.uk/news/technology-17631838"> на ÑайÑе
Ðи-Ðи-Си</a>
+и <a
+href="https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
+в блоге лабоÑаÑоÑии IOActive</a>.</p>
+ </li>
-<p>Ð Ñвоей полиÑике пÑиваÑноÑÑи Samsung ÑвнÑм
обÑазом подÑвеÑждаеÑ, ÑÑо <a
-href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">голоÑовÑе
-даннÑе, ÑодеÑжаÑие конÑиденÑиалÑнÑÑ
инÑоÑмаÑиÑ, бÑдÑÑ Ð¿ÐµÑедаваÑÑÑÑ ÑÑеÑÑим
-ÑÑоÑонам</a>.</p>
-</li>
+ <li id="M201307260">
+ <p>Ð ÑиÑÑÐµÐ¼Ñ <a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+“инÑеллекÑÑалÑнÑÑ
домов”</a>,
оказÑваеÑÑÑ, до идиоÑизма легко
+пÑоникнÑÑÑ.</p>
+ </li>
-<li>
-<p><a
-href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
-ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² “ÑмнÑÑ
”
ÑелевизоÑаÑ
LG</a> докладÑваÑÑ Ð¾ Ñом,
-ÑÑо ÑмоÑÑÐ¸Ñ Ð¿Ð¾Ð»ÑзоваÑелÑ, незавиÑимо оÑ
Ñого, ÑазÑеÑено ли ÑÑо в наÑÑÑойкаÑ
-ÑелевизоÑа (даже когда ÑеÑÐ²ÐµÑ Ð¾ÑвеÑаеÑ
квиÑанÑией “ÑÑÑаниÑа не
-найдена” на вÑÑланнÑе даннÑе, ÑÑо
ниÑего не знаÑиÑ; ÑÑи даннÑе вÑе
-Ñавно могÑÑ ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð° ÑеÑвеÑе LG).</p>
+ <li id="M201307114">
+ <p>Ð “пÑиложениÑÑ
Ð´Ð»Ñ Ñ
ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð´Ð°Ð½Ð½ÑÑ
” Hewlett-Packard, в коÑоÑÑÑ
+пÑименÑеÑÑÑ Ð½ÐµÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑионнаÑ
ÑиÑÑема “Left Hand”, еÑÑÑ
+ÑеÑнÑе Ñ
одÑ, коÑоÑÑе даÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸ <a
+href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+ÑÑеÑнÑÑ Ð·Ð°Ð¿Ð¸ÑÑ Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа по ÑеÑи</a>.
ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑÑвеÑждаеÑ, ÑÑо ÑÑо не даеÑ
+ей доÑÑÑпа к даннÑм клиенÑа, но Ñаз ÑеÑнÑй Ñ
од позволÑÐµÑ Ð¸Ð·Ð¼ÐµÐ½ÑÑÑ
+ÑÑÑановленнÑе пÑогÑаммÑ, Ñо иÑ
можно
измениÑÑ Ñак, ÑÑÐ¾Ð±Ñ Ð¿ÑогÑаммÑ
+пÑедоÑÑавлÑли доÑÑÑп к даннÑм клиенÑа.</p>
+ </li>
-<p>Ð¥Ñже Ñого: <a
-href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
-ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð¿Ð¾Ð´ÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð·Ð° дÑÑгими
ÑÑÑÑойÑÑвами по локалÑной ÑеÑи
-полÑзоваÑелÑ</a>.</p>
+ <li id="M201212290">
+ <p><a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">СеÑевÑе
+ÑелеÑÐ¾Ð½Ñ TNP Cisco ÑпионÑÑ</a>.</p>
+ </li>
-<p>ÐпоÑледÑÑвии LG заÑвила, ÑÑо обновила
пÑогÑаммÑ, ÑÑÐ¾Ð±Ñ Ð¿ÑекÑаÑиÑÑ ÑÑо, но
-ÑпиониÑÑ Ñаким обÑазом Ð¼Ð¾Ð¶ÐµÑ Ð»Ñбой
пÑодÑкÑ.</p>
-</li>
-<li>
-<p><a
-href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">ÐабелÑное
-Ñелевидение Verizon подглÑдÑÐ²Ð°ÐµÑ Ð·Ð° Ñем,
какие ÑилÑÐ¼Ñ Ð»Ñди ÑмоÑÑÑÑ</a> и
-даже какие они заÑ
оÑели запиÑаÑÑ.</p>
-</li>
+ <li id="M201212180">
+ <p>“ÐнÑеллекÑÑалÑнÑе” ÑелевизоÑÑ
Samsung <a
+href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
+обÑаÑили Linux в Ð±Ð°Ð·Ñ Ð´Ð»Ñ ÑиÑаниÑеÑкой
ÑиÑÑемÑ</a>, ÑÑÐ¾Ð±Ñ Ð½Ð°Ð²ÑзÑваÑÑ
+ÑиÑÑовое ÑпÑавление огÑаниÑениÑми.Samsung
Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾ÑÑÑпаÑÑ Ñак благодаÑÑ
+ÑомÑ, ÑÑо Linux вÑпÑÑкаеÑÑÑ Ð¿Ð¾Ð´ GNU GPL
веÑÑии 2 <a
+href="/licenses/rms-why-gplv3.html">а не веÑÑии 3</a>, а
Ñакже
+оÑÐ»Ð°Ð±Ð»ÐµÐ½Ð½Ð¾Ð¼Ñ ÑÐ¾Ð»ÐºÐ¾Ð²Ð°Ð½Ð¸Ñ GPL веÑÑии 2.</p>
+ </li>
+
+ <li id="M201212170">
+ <p id="break-security-smarttv"><a
+href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ÐзломÑики наÑли ÑпоÑоб вÑкÑÑÑÑ Ð·Ð°ÑиÑÑ Ð²
“инÑеллекÑÑалÑном”
+ÑелевизоÑе</a> и воÑполÑзоваÑÑÑÑ ÐµÐ³Ð¾
видеокамеÑой, ÑÑÐ¾Ð±Ñ ÑмоÑÑеÑÑ Ð½Ð° лÑдей,
+коÑоÑÑе ÑмоÑÑÑÑ ÑелевизоÑ.</p>
+ </li>
+ <li id="M201210020">
+ <p>ÐекоÑоÑÑе <a
+href="http://openlgtv.org.ru/wiki/index.php/Achievements">ÑелевизоÑÑ
LG
+ÑвлÑÑÑÑÑ ÑиÑанами</a>.</p>
+ </li>
</ul>
+
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -599,7 +800,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/07/25 16:30:35 $
+$Date: 2018/09/26 14:58:02 $
<!-- timestamp end -->
</p>
Index: po/malware-appliances.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- po/malware-appliances.ru-en.html 25 Jul 2018 16:30:35 -0000 1.39
+++ po/malware-appliances.ru-en.html 26 Sep 2018 14:58:03 -0000 1.40
@@ -1,5 +1,10 @@
<!--#include virtual="/server/header.html" -->
<!-- Parent-Version: 1.84 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
<title>Malware in Appliances
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-appliances.translist" -->
@@ -35,468 +40,680 @@
<p>Here are examples of malware in appliances.</p>
-<ul>
- <li id="nest-thermometers">
- <p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about the user</a>.</p>
- </li>
-
- <li>
- <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of the conversation between two users</a>.</p>
- </li>
-
- <li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,
- is a surveillance device. <a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+<ul class="blurbs">
+ <li id="M201809240">
+ <p>Researchers have discovered how to <a
+
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands in other audio</a>, so that people cannot hear
+ them, but Alexa and Siri can.</p>
+ </li>
+
+ <li id="M201807050">
+ <p>The Jawbone fitness tracker was tethered to a proprietary phone
+ app. In 2017, the company shut down and made the app stop working. <a
+
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All
+ the existing trackers stopped working forever</a>.</p>
+
+ <p>The article focuses on a further nasty fillip, that sales of the
+ broken devices continued. But I think that is a secondary issue;
+ it made the nasty consequences extend to some additional people.
+ The fundamental wrong was to design the devices to depend on something
+ else that didn't respect users' freedom.</p>
+ </li>
+
+ <li id="M201804140">
+ <p>A medical insurance company <a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops on its user by
+ sending usage data back over the Internet</a>.</p>
+ </li>
+
+ <li id="M201804010">
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install a surveillance app</a>.</p>
+
+ <p>We link to the article for the facts it presents. It
+ is too bad that the article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
+ </li>
+
+ <li id="M201802120">
+ <p>Apple devices lock users in <a
+
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+ solely to Apple services</a> by being designed to be imcompatible
+ with all other options, ethical or unethical.</p>
+ </li>
+
+ <li id="M201712240">
+ <p>One of the dangers of the “internet of stings”
+ is that, if you lose your internet service, you also <a
+
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ lose control of your house and appliances</a>.</p>
+
+ <p>For your safety, don't use any appliance with a connection to the
+ real internet.</p>
+ </li>
+
+ <li id="M201711200">
+ <p>Amazon recently invited consumers to be suckers and <a
+
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff to open their front doors</a>. Wouldn't you know
+ it, the system has a grave security flaw.</p>
+ </li>
+
+ <li id="M201711100">
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of the conversation between two users</a>.</p>
+ </li>
+
+ <li id="M201711080">
+ <p>Logitech will sabotage
+ all Harmony Link household control devices by <a
+
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
+ turning off the server through which the products' supposed owners
+ communicate with them</a>.</p>
+
+ <p>The owners suspect this is to pressure them to buy a newer model. If
+ they are wise, they will learn, rather, to distrust any product that
+ requires users to talk with them through some specialized service.</p>
+ </li>
+
+ <li id="M201710040">
+ <p>Every “home security” camera, if its
+ manufacturer can communicate with it, is a surveillance device. <a
+
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by the manufacturer, based on the fact
- that the device is tethered to a server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about proprietary
tethering</a>.</p>
+
+ <p>The article describes wrongdoing by the manufacturer, based on
+ the fact that the device is tethered to a server.</p>
+
+ <p><a href="/proprietary/proprietary-tethers.html">More about
+ proprietary tethering</a>.</p>
+
<p>But it also demonstrates that the device gives the company
surveillance capability.</p>
-</li>
+ </li>
-<li>
- <p>A “smart” intravenous pump designed for
- hospitals is connected to the internet. Naturally <a
-href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ <li id="M201709200">
+ <p>A “smart” intravenous pump
+ designed for hospitals is connected to the internet. Naturally <a
+
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
+
<p>Note that this article misuses the term <a
-href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
+ href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
referring to crackers.</p>
-</li>
+ </li>
-<li>
- <p>The bad security in many Internet of Stings devices
- allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ <li id="M201708280">
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
to snoop on the people that use them</a>.</p>
+
<p>Don't be a sucker—reject all the stings.</p>
- <p>It is unfortunate that the article uses the
- term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
-</li>
-
-<li>
- <p>Many models of Internet-connected cameras are tremendously insecure.
- They have login accounts with hard-coded passwords, which can't be
- changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way to
- delete these accounts either</a>.</p>
-</li>
-
-<li>
-<p>The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices is <a href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p>
-</li>
-
-<li><p>Users are suing Bose for <a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing a spyware app for its headphones</a>.
-Specifically, the app would record the names of the audio files
-users listen to along with the headphone's unique serial number.
-</p>
-<p>The suit accuses that this was done without the users' consent.
-If the fine print of the app said that users gave consent for this,
-would that make it acceptable? No way! It should be flat out
-<a href="/philosophy/surveillance-vs-democracy.html">
-illegal to design the app to snoop at all</a>.
-</p>
-</li>
+ <p>It is unfortunate that the article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ </li>
+
+ <li id="M201708230">
+ <p>Sonos <a
+
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
+ told all its customers, “Agree”
+ to snooping or the product will stop working</a>. <a
+
href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321">Another
+ article</a> says they won't forcibly change the software, but
+ people won't be able to get any upgrades and eventually it will
+ stop working.</p>
+ </li>
+
+ <li id="M201708040">
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
+ </li>
+
+ <li id="M201706200">
+ <p>Many models of Internet-connected cameras
+ are tremendously insecure. They have login
+ accounts with hard-coded passwords, which can't be changed, and <a
+
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
+ is no way to delete these accounts either</a>.</p>
+ </li>
+
+ <li id="M201705250">
+ <p>The proprietary code that runs pacemakers,
+ insulin pumps, and other medical devices is <a
+ href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
+ security faults</a>.</p>
+ </li>
+
+ <li id="M201705180">
+ <p>Bird and rabbit pets were implemented for Second
+ Life by a company that tethered their food to a server. <a
+
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
+ It shut down the server and the pets more or less died</a>.</p>
+ </li>
+
+ <li id="M201704190">
+ <p>Users are suing Bose for <a
+
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
+
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ the app to snoop at all</a>.</p>
+ </li>
+
+ <li id="M201704120">
+ <p>Anova sabotaged users' cooking devices
+ with a downgrade that tethered them to a remote server. <a
+
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
+ users create an account on Anova's servers, their cookers won't
+ function</a>.</p>
+ </li>
+
+ <li id="M201703270">
+ <p>When Miele's Internet of
+ Stings hospital disinfectant dishwasher is <a
+
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected to the Internet, its security is crap</a>.</p>
+
+ <p>For example, a cracker can gain access to the dishwasher's
+ filesystem, infect it with malware, and force the dishwasher to launch
+ attacks on other devices in the network. Since these dishwashers are
+ used in hospitals, such attacks could potentially put hundreds of
+ lives at risk.</p>
+ </li>
+
+ <li id="M201703140">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control app</a>.</p>
+
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about their
+ products, rather than free software which users could have checked
+ and changed.</p>
+
+ <p>The company that made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how people
+ used it</a>.</p>
+
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
+
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
+ </li>
+
+ <li id="M201702280">
+ <p>“CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what? <a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
+
+ <p>That the manufacturer and the FBI could listen to these
+ conversations was unacceptable by itself.</p>
+ </li>
+
+ <li id="M201702200">
+ <p>If you buy a used “smart”
+ car, house, TV, refrigerator, etc., usually <a
+
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+ previous owners can still remotely control it</a>.</p>
+ </li>
+
+ <li id="M201702060">
+ <p>Vizio “smart” <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts and
+ cable</a>. Even if the image is coming from the user's own computer,
+ the TV reports what it is. The existence of a way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the surveillance.</p>
+ </li>
+
+ <li id="M201612230">
+ <p>VR equipment, measuring every slight motion,
+ creates the potential for the most intimate
+ surveillance ever. All it takes to make this potential real <a
+
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ software as malicious as many other programs listed in this
+ page</a>.</p>
+
+ <p>You can bet Facebook will implement the maximum possible
+ surveillance on Oculus Rift devices. The moral is, never trust a VR
+ system with nonfree software in it.</p>
+ </li>
+
+ <li id="M201612200">
+ <p>The developer of Ham Radio Deluxe <a
+
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">sabotaged
+ a customer's installation as punishment for posting a negative
+ review</a>.</p>
+
+ <p>Most proprietary software companies don't use their power so
+ harshly, but it is an injustice that they all <em>have</em> such
+ power.</p>
+ </li>
+
+ <li id="M201612061">
+ <p>The “smart” toys My Friend Cayla and i-Que can be <a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
+ controlled with a mobile phone</a>; physical access is not
+ necessary. This would enable crackers to listen in on a child's
+ conversations, and even speak into the toys themselves.</p>
+
+ <p>This means a burglar could speak into the toys and ask the child
+ to unlock the front door while Mommy's not looking.</p>
+ </li>
+
+ <li id="M201608080">
+ <p>Ransomware <a
+
href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">
+ has been developed for a thermostat that uses proprietary
+ software</a>.</p>
+ </li>
+
+ <li id="M201605020">
+ <p>Samsung's “Smart Home” has a big security hole; <a
+
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+ unauthorized people can remotely control it</a>.</p>
+
+ <p>Samsung claims that this is an “open” platform so the
+ problem is partly the fault of app developers. That is clearly true
+ if the apps are proprietary software.</p>
+
+ <p>Anything whose name is “Smart” is most likely going
+ to screw you.</p>
+ </li>
+
+ <li id="M201604110">
+ <p>Malware was found on <a
+
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+ security cameras available through Amazon</a>.</p>
+
+ <p>A camera that records locally on physical media, and has no network
+ connection, does not threaten people with surveillance—neither
+ by watching people through the camera, nor through malware in the
+ camera.</p>
+ </li>
+
+ <li id="M201604050">
+ <p>Google/Alphabet <a
+
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
+ intentionally broke Revolv home automatic control products that
+ depended on a server</a> to function, by shutting down the server.
+ The lesson is, reject all such products. Insist on self-contained
+ computers that run free software!</p>
+ </li>
+
+ <li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras have <a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
+ </li>
+
+ <li id="M201601100">
+ <p>The <a
+ href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+ “Cube” 3D printer was designed with DRM</a>: it
+ won't accept third-party printing materials. It is the Keurig of
+ printers. Now it is being discontinued, which means that eventually
+ authorized materials won't be available and the printers may become
+ unusable.</p>
+
+ <p>With a <a
+ href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+ printer that gets the Respects Your Freedom</a>, this problem would
+ not even be a remote possibility.</p>
+
+ <p>How pitiful that the author of that article says that there was
+ “nothing wrong” with designing the device to restrict
+ users in the first place. This is like putting a “cheat me and
+ mistreat me” sign on your chest. We should know better: we
+ should condemn all companies that take advantage of people like him.
+ Indeed, it is the acceptance of their unjust practice that teaches
+ people to be doormats.</p>
+ </li>
+
+ <li id="M201512140">
+ <p>Phillips “smart” lightbulbs had initially been
+ designed to interact with other companies' smart light bulbs, but <a
+
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
+ later the company updated the firmware to disallow
+ interoperability</a>.</p>
-<li id="anova">
- <p>Anova sabotaged users' cooking devices with a downgrade that
- tethered them to a remote server. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account on Anova's servers, their
- cookers won't function.</a></p>
-</li>
-
-<li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is <a
-href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
-connected to the Internet, its security is crap</a>.</p>
-<p>For example, a cracker can gain access to the dishwasher's filesystem,
- infect it with malware, and force the dishwasher to launch attacks on
- other devices in the network. Since these dishwashers are used in hospitals,
- such attacks could potentially put hundreds of lives at risk.</p>
-
-</li>
-<li>
-<p>If you buy a used “smart” car, house, TV, refrigerator,
-etc.,
-usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
-previous owners can still remotely control it</a>.</p>
-</li>
-<li>
- <p>Vizio
- “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer, the TV reports what it is. The existence of a way to
- disable the surveillance, even if it were not hidden as it was in
- these TVs, does not legitimize the surveillance.</p>
-</li>
-<li>
-<p>More or less all “smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ <p>If a product is “smart”, and you didn't build it,
+ it is cleverly serving its manufacturer <em>against you</em>.</p>
+ </li>
+
+ <li id="M201512074">
+ <p><a
+
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+ Some D-Link routers</a> have a back door for changing settings in a
+ dlink of an eye.</p>
+
+ <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The TP-Link
+ router has a back door</a>.</p>
+
+ <p><a href="https://github.com/elvanderb/TCP-32764">Many models of
+ routers have back doors</a>.</p>
+ </li>
+
+ <li id="M201511250">
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always watching</a>,
+ even when the “owner” switches it “off.”</p>
+
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
+ </li>
+
+ <li id="M201511198">
+ <p>ARRIS cable modem has a <a
+
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ back door in the back door</a>.</p>
+ </li>
+
+ <li id="M201511130">
+ <p>Some web and TV advertisements play inaudible
+ sounds to be picked up by proprietary malware running
+ on other devices in range so as to determine that they
+ are nearby. Once your Internet devices are paired with
+ your TV, advertisers can correlate ads with Web activity, and other <a
+
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p>
+ </li>
+
+ <li id="M201511060">
+ <p>Vizio goes a step further than other TV
+ manufacturers in spying on their users: their <a
+
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
+
+ <p>It is possible to turn this off, but having it enabled by default
+ is an injustice already.</p>
+ </li>
+
+ <li id="M201511020">
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to the 600 millions social media profiles the company
+ already monitors. Tivo customers are unaware they're
+ being watched by advertisers. By combining TV viewing
+ information with online social media participation, Tivo can now <a
+ href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined surveillance by default.</p>
+ </li>
+
+ <li id="M201510210">
+ <p>FitBit fitness trackers have a <a
+
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+ Bluetooth vulnerability</a> that allows attackers to send malware
+ to the devices, which can subsequently spread to computers and other
+ FitBit trackers that interact with them.</p>
+ </li>
+
+ <li id="M201510200">
+ <p>“Self-encrypting” disk drives
+ do the encryption with proprietary firmware so you
+ can't trust it. Western Digital's “My Passport” drives <a
+
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+ have a back door</a>.</p>
+ </li>
+
+ <li id="M201507240">
+ <p>Vizio “smart” TVs recognize and <a
+ href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even if it isn't a TV channel.</p>
+ </li>
+
+ <li id="M201506080">
+ <p>Due to bad security in a drug pump, crackers could use it to <a
+
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
+ kill patients</a>.</p>
+ </li>
+
+ <li id="M201505290">
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch, and even what they wanted to
+ record</a>.</p>
+ </li>
+
+ <li id="M201505050">
+ <p>Hospira infusion pumps, which are used
+ to administer drugs to a patient, were rated “<a
+
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
+ secure IP device I've ever seen</a>” by a security
+ researcher.</p>
+
+ <p>Depending on what drug is being infused, the insecurity could open
+ the door to murder.</p>
+ </li>
+
+ <li id="M201504300">
+ <p>Vizio <a
+ href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs snoop on what
+ users watch</a>. The TVs did not do that when first sold.</p>
+ </li>
+
+ <li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going to spy on children and adults</a>.</p>
+ </li>
+
+ <li id="M201502090">
+ <p>The Samsung “Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on the internet to another company, Nuance</a>.
+ Nuance can save it and would then have to give it to the US or some
+ other government.</p>
+
+ <p>Speech recognition is not to be trusted unless it is done by free
+ software in your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms that <a
+
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be transmitted to third
+ parties</a>.</p>
+ </li>
+
+ <li id="M201411090">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p>
+ </li>
+
+ <li id="M201409290">
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
-<p>The report was as of 2014, but we don't expect this has got
-better.</p>
+ <p>The report was as of 2014, but we don't expect this has got
+ better.</p>
-<p>This shows that laws requiring products to get users' formal
-consent before collecting personal data are totally inadequate. And
-what happens if a user declines consent? Probably the TV will say,
-“Without your consent to tracking, the TV will not
-work.”</p>
-
-<p>Proper laws would say that TVs are not allowed to report what the
-user watches — no exceptions!</p>
-</li>
-<li>
-<p>Some LG
-TVs <a href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
-tyrants</a>.</p>
-</li>
-
-<li><a
-href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
-Samsung “Smart” TVs have turned Linux into the base
-for a tyrant system</a> so as to impose DRM.
-What enables Samsung to do this is that Linux is released under
-GNU GPL version 2, <a href="/licenses/rms-why-gplv3.html">not version 3</a>,
-together with a weak interpretation of GPL version 2.
-</li>
-
-<li>
-<p>A company that makes internet-controlled vibrators
-<a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
-being sued for collecting lots of personal information about how
-people use it</a>.</p>
-
-<p>The company's statement that it anonymizes the data may be true,
-but it doesn't really matter. If it sells the data to a data broker,
-the data broker can figure out who the user is.</p>
-</li>
-
-<li>
-<p>Google/Alphabet <a
-href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
-intentionally broke Revolv home automatic control products that depended on
-a server</a> to function. The lesson is, don't stand for that! Insist
-on self-contained computers that run free software!</p>
-</li>
-
-<li>
-<p>ARRIS cable modem has a <a
-href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
-backdoor in the backdoor</a>.</p>
-</li>
-
-<li>
-<p>HP “storage appliances” that use the proprietary
-“Left Hand” operating system have back doors that give HP
-<a
-href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
-remote login access</a> to them. HP claims that this does not give HP
-access to the customer's data, but if the back door allows
-installation of software changes, a change could be installed that
-would give access to the customer's data.
-</p>
-</li>
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably the TV will
+ say, “Without your consent to tracking, the TV will not
+ work.”</p>
-<li>
-<p><a
-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
-Some D-Link routers</a> have a back door for changing settings in a
-dlink of an eye.</p>
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p>
+ </li>
-<p>
-<a href="https://github.com/elvanderb/TCP-32764">Many models of routers
-have back doors</a>.</p>
-</li>
-
-<li>
-<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
-The TP-Link router has a backdoor</a>.</p>
-</li>
-
-<li>
-<p>The <a href="http://michaelweinberg.org/post/137045828005/free-the-cube">
-“Cube” 3D printer was designed with DRM</a>: it won't accept
-third-party printing materials. It is the Keurig of printers. Now it is
-being discontinued, which means that eventually authorized materials won't
-be available and the printers may become unusable.</p>
-
-<p>With a <a href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
-printer that gets the Respects Your Freedom</a>, this problem would not
-even be a remote possibility.</p>
-
-<p>How pitiful that the author of that article says that there was
-“nothing wrong” with designing the device to restrict users in
-the first place. This is like putting a “cheat me and mistreat me”
-sign on your chest. We should know better: we should condemn all companies
-that take advantage of people like him. Indeed, it is the acceptance of
-their unjust practice that teaches people to be doormats.</p>
-</li>
-
-<li>
-<p>Philips “smart” lightbulbs <a
-href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
-have been designed not to interact with other companies' smart
-lightbulbs</a>.</p>
-
-<p>If a product is “smart”, and you didn't build it, it is
-cleverly serving its manufacturer <em>against you</em>.</p>
-</li>
-
-<li>
-<p><a
-href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
-DVDs and Bluray disks have DRM</a>.
-</p>
+ <li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send <a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ data about the user</a>.</p>
+ </li>
-<p>That page uses spin terms that favor DRM,
-including <a href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
-digital “rights” management</a>
-and <a
href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,
-and it claims that “artists” (rather than companies) are
-primarily responsible for putting digital restrictions management into
-these disks. Nonetheless, it is a reference for the facts.
-</p>
+ <li id="M201405201">
+ <p>LG <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ disabled network features</a> on <em>previously purchased</em>
+ “smart” TVs, unless the purchasers agreed to let LG begin
+ to snoop on them and distribute their personal data.</p>
+ </li>
-<p>Every Bluray disk (with few, rare exceptions) has DRM—so
-don't use Bluray disks!</p>
-</li>
-
-<li id="cameras-bugs">
-<p>Over 70 brands of network-connected surveillance cameras have <a
-href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
-security bugs that allow anyone to watch through them</a>.</p>
-</li>
-
-<li>
-<p>Samsung's “Smart Home” has a big security hole; <a
-href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
-unauthorized people can remotely control it</a>.</p>
-
-<p>Samsung claims that this is an “open” platform so the
-problem is partly the fault of app developers. That is clearly true if
-the apps are proprietary software.</p>
-
-<p>Anything whose name is “Smart” is most likely going to
-screw you.</p>
-</li>
+ <li id="M201404250">
+ <p>Lots of <a
+ href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+ hospital equipment has lousy security</a>, and it can be fatal.</p>
+ </li>
-<li>
-<p>
-Malware found on <a
-href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
-security cameras available through Amazon</a>.
-</p>
+ <li id="M201312290">
+ <p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some flash
+ memories have modifiable software</a>, which makes them vulnerable
+ to viruses.</p>
+
+ <p>We don't call this a “back door” because it is normal
+ that you can install a new system in a computer, given physical access
+ to it. However, memory sticks and cards should not be modifiable in
+ this way.</p>
+ </li>
-<p>A camera that records locally on physical media, and has no network
-connection, does not threaten people with surveillance—neither
-by watching people through the camera, nor through malware in the
-camera.</p>
-</li>
-
-<li>
-<p> <a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-FitBit fitness trackers have a Bluetooth vulnerability</a> that allows
-attackers to send malware to the devices, which can subsequently
-spread to computers and other FitBit trackers that interact with
-them.</p>
-</li>
-
-<li>
-<p> “Self-encrypting” disk drives do the encryption with
-proprietary firmware so you can't trust it. Western Digital's <a
-href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
-“My Passport” drives have a back door</a>.</p>
-</li>
+ <li id="M201312040">
+ <p><a
+
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+ Point-of-sale terminals running Windows were taken over</a> and
+ turned into a botnet for the purpose of collecting customers' credit
+ card numbers.</p>
+ </li>
-<li>
-<p>
-Hospira infusion pumps, which are used to administer drugs to
-a patient, were rated “<a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
-least secure IP device I've ever seen</a>” by a security
-researcher.</p>
-
-<p>Depending on what drug is being infused, the insecurity could
-open the door to murder.</p>
-</li>
-
-<li>
-<p>Due to bad security in a drug pump, crackers could use it to <a
-href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
-kill patients</a>.</p>
-</li>
-
-<li>
-<p><a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
-“Smart homes”</a> turn out to be stupidly vulnerable to
-intrusion.</p>
-</li>
-
-<li>
-<p>The <a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-FTC punished a company for making webcams with bad security</a> so
-that it was easy for anyone to watch them.</p>
-</li>
-
-<li>
-<p>It is possible to <a
-href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
-kill people by taking control of medical implants by radio</a>. More
-information in <a
-href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and
-<a
-href="https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
-IOActive Labs Research blog</a>.</p>
-</li>
-
-<li>
-<p>Lots of <a
-href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
-hospital equipment has lousy security</a>, and it can be fatal.</p>
-</li>
-
-<li>
-<p><a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
-Point-of-sale terminals running Windows were taken over</a> and turned
-into a botnet for the purpose of collecting customers' credit card
-numbers.</p>
-</li>
-
-<li id="vizio-snoop">
-<p>Vizio
-<a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
-used a firmware “upgrade” to make its TVs snoop on what
-users watch</a>. The TVs did not do that when first sold.</p>
-</li>
-
-<li>
-<p>LG <a
-href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
-disabled network features</a> on <em>previously purchased</em>
-“smart” TVs, unless the purchasers agreed to let LG
-begin to snoop on them and distribute their personal data.</p>
-</li>
-
-<li>
-<p><a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
-Barbie is going to spy</a> on children and adults.</p>
-</li>
-
-<li>
-<p><a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-Cisco TNP IP phones are spying devices</a>.</p>
-</li>
-
-<li>
-<p>The <a
-href="http://www.bbc.com/news/technology-34922712">Nest Cam
-“smart” camera is always watching</a>, even when the
-“owner” switches it “off.”</p>
-
-<p>A “smart” device means the manufacturer is using it to outsmart
-you.</p>
-</li>
-
-<li>
-<p>Vizio goes a step further than other TV manufacturers in spying on
-their users: their <a
-href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
-“smart” TVs analyze your viewing habits in detail and
-link them your IP address</a> so that advertisers can track you
-across devices.</p>
-
-<p>It is possible to turn this off, but having it enabled by default
-is an injustice already.</p>
-</li>
-
-<li>
-<p>Tivo's alliance with Viacom adds 2.3 million households to the 600
-millions social media profiles the company already monitors. Tivo
-customers are unaware they're being watched by advertisers. By
-combining TV viewing information with online social media
-participation, Tivo can now <a
-href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
-correlate TV advertisement with online purchases</a>, exposing all
-users to new combined surveillance by default.</p>
-</li>
-
-<li>
-<p>Some web and TV advertisements play inaudible sounds to be picked
-up by proprietary malware running on other devices in range so as to
-determine that they are nearby. Once your Internet devices are paired
-with your TV, advertisers can correlate ads with Web activity, and
-other <a
-href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
-cross-device tracking</a>.</p>
-</li>
-
-<li>
-<p>Vizio “smart” TVs recognize and <a
-href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
-what people are watching</a>, even if it isn't a TV channel.</p>
-</li>
-
-<li>
-<p>The Amazon “smart” TV is <a
-href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
-snooping all the time</a>.</p>
-</li>
-
-<li>
-<p>The Samsung “smart” TV <a
-href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
-transmits users' voice on the internet to another company, Nuance</a>.
-Nuance can save it and would then have to give it to the US or some
-other government.</p>
-
-<p>Speech recognition is not to be trusted unless it is done by free
-software in your own computer.</p>
-
-<p>In its privacy policy, Samsung explicitly confirms
-that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
-data containing sensitive information will be transmitted to third
-parties</a>.</p>
-</li>
-
-<li>
-<p><a
-href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
-Spyware in LG “smart” TVs</a> reports what the user
-watches, and the switch to turn this off has no effect. (The fact
-that the transmission reports a 404 error really means nothing; the
-server could save that data anyway.)</p>
-
-<p>Even worse, it <a
-href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
-snoops on other devices on the user's local network</a>.</p>
-
-<p>LG later said it had installed a patch to stop this, but any
-product could spy this way.</p>
-</li>
-<li>
-<p><a
-href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
-Verizon cable TV snoops on what programs people watch</a>, and even what
-they wanted to record.</p>
-</li>
+ <li id="M201311210">
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches, and the switch to turn this off has
+ no effect</a>. (The fact that the transmission reports a 404 error
+ really means nothing; the server could save that data anyway.)</p>
+
+ <p>Even worse, it <a
+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network</a>.</p>
+
+ <p>LG later said it had installed a patch to stop this, but any
+ product could spy this way.</p>
+ </li>
+
+ <li id="M201310070">
+ <p id="bluray"><a
+
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
+ DVDs and Bluray disks have DRM</a>.</p>
+
+ <p>That page uses spin terms that favor DRM, including <a
+ href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+ digital “rights” management</a> and <a
+
href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,
+ and it claims that “artists” (rather than companies)
+ are primarily responsible for putting digital restrictions management
+ into these disks. Nonetheless, it is a reference for the facts.</p>
+
+ <p>Every Bluray disk (with few, rare exceptions) has DRM—so
+ don't use Bluray disks!</p>
+ </li>
+ <li id="M201309050">
+ <p>The FTC punished a company for making webcams with <a
+
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+ bad security so that it was easy for anyone to watch through
+ them</a>.</p>
+ </li>
+
+ <li id="M201308060">
+ <p><a href="http://spritesmods.com/?art=hddhack&page=6">
+ Replaceable nonfree software in disk drives can be written by a
+ nonfree program</a>. This makes any system vulnerable to persistent
+ attacks that normal forensics won't detect.</p>
+ </li>
+
+ <li id="M201307270">
+ <p> It is possible to <a
+
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+ kill people by taking control of medical
+ implants by radio</a>. More information in <a
+ href="http://www.bbc.co.uk/news/technology-17631838">BBC
+ News</a> and <a
+
href="https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
+ IOActive Labs Research blog</a>.</p>
+ </li>
+
+ <li id="M201307260">
+ <p><a
+
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+ “Smart homes”</a> turn out to be stupidly vulnerable to
+ intrusion.</p>
+ </li>
+
+ <li id="M201307114">
+ <p>HP “storage appliances” that
+ use the proprietary “Left Hand”
+ operating system have back doors that give HP <a
+
href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+ remote login access</a> to them. HP claims that this does not
+ give HP access to the customer's data, but if the back door allows
+ installation of software changes, a change could be installed that
+ would give access to the customer's data.</p>
+ </li>
+
+ <li id="M201212290">
+ <p>The Cisco TNP IP phones are <a
+ href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+ spying devices</a>.</p>
+ </li>
+
+ <li id="M201212180">
+ <p>Samsung “Smart” TVs have <a
+
href="https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
+ turned Linux into the base for a tyrant system</a> so as to impose
+ DRM. What enables Samsung to do this is that Linux is released
+ under GNU GPL version 2, <a
+ href="/licenses/rms-why-gplv3.html">not version 3</a>, together with
+ a weak interpretation of GPL version 2.</p>
+ </li>
+
+ <li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way to break security on a “smart” TV</a>
+ and use its camera to watch the people who are watching TV.</p>
+ </li>
+
+ <li id="M201210020">
+ <p>Some LG TVs <a
+ href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
+ tyrants</a>.</p>
+ </li>
</ul>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -554,7 +771,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/07/25 16:30:35 $
+$Date: 2018/09/26 14:58:03 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- po/malware-appliances.ru.po 26 Sep 2018 14:35:34 -0000 1.108
+++ po/malware-appliances.ru.po 26 Sep 2018 14:58:03 -0000 1.109
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-09-26 13:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -88,10 +87,10 @@
"voice commands in other audio</a>, so that people cannot hear them, but "
"Alexa and Siri can."
msgstr ""
-"ÐÑÑледоваÑели оÑкÑÑли ÑпоÑоб <a
href=\"http://news.rub.de/english/"
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\">
ÑкÑÑваÑÑ "
-"голоÑовÑе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² дÑÑгиÑ
звÑкозапиÑÑÑ
</a>, Ñак ÑÑо лÑди ÑÑи ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð½Ðµ ÑлÑÑаÑ, "
-"но иÑ
ÑлÑÑÐ°Ñ Alexa и Siri."
+"ÐÑÑледоваÑели оÑкÑÑли ÑпоÑоб <a
href=\"http://news.rub.de/english/press-"
+"releases/2018-09-24-it-security-secret-messages-alexa-and-co\">
ÑкÑÑваÑÑ "
+"голоÑовÑе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² дÑÑгиÑ
звÑкозапиÑÑÑ
</a>, Ñак ÑÑо лÑди ÑÑи ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð½Ðµ "
+"ÑлÑÑаÑ, но иÑ
ÑлÑÑÐ°Ñ Alexa и Siri."
#. type: Content of: <ul><li><p>
msgid ""
@@ -141,9 +140,10 @@
"web/20180405014828/https:/twitter.com/buro9/status/980349887006076928\"> "
"load downgrades that install a surveillance app</a>."
msgstr ""
-"ÐекоÑоÑÑе “инÑеллекÑÑалÑнÑе”
ÑелевизоÑÑ Ð°Ð²ÑомаÑиÑеÑки <a
href=\"https://web.archive.org/"
-"web/20180405014828/https:/twitter.com/buro9/status/980349887006076928\"> "
-"загÑÑжаÑÑ ÑÑÑаÑениÑ, коÑоÑÑе
ÑÑÑанавливаÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ñлежки</a>."
+"ÐекоÑоÑÑе “инÑеллекÑÑалÑнÑе”
ÑелевизоÑÑ Ð°Ð²ÑомаÑиÑеÑки <a href="
+"\"https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/"
+"status/980349887006076928\"> загÑÑжаÑÑ ÑÑÑаÑениÑ,
коÑоÑÑе ÑÑÑанавливаÑÑ "
+"пÑогÑÐ°Ð¼Ð¼Ñ Ñлежки</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -164,10 +164,10 @@
"a> by being designed to be imcompatible with all other options, ethical or "
"unethical."
msgstr ""
-"УÑÑÑойÑÑва Apple замÑкаÑÑ Ð¿Ð¾Ð»ÑзоваÑелей <a
href=\"https://gizmodo.com/homepod-is-the-"
-"ultimate-apple-product-in-a-bad-way-1822883347\"> иÑклÑÑиÑелÑно
на ÑлÑжбаÑ
Apple</a>, "
-"бÑдÑÑи ÑпÑоекÑиÑÐ¾Ð²Ð°Ð½Ñ Ð½ÐµÑовмеÑÑимÑми Ñ
лÑбÑми дÑÑгими ваÑианÑами, как ÑÑиÑнÑми, "
-"Ñак и неÑÑиÑнÑми."
+"УÑÑÑойÑÑва Apple замÑкаÑÑ Ð¿Ð¾Ð»ÑзоваÑелей <a
href=\"https://gizmodo.com/"
+"homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347\"> "
+"иÑклÑÑиÑелÑно на ÑлÑжбаÑ
Apple</a>, бÑдÑÑи
ÑпÑоекÑиÑÐ¾Ð²Ð°Ð½Ñ Ð½ÐµÑовмеÑÑимÑми Ñ "
+"лÑбÑми дÑÑгими ваÑианÑами, как ÑÑиÑнÑми,
Ñак и неÑÑиÑнÑми."
#. type: Content of: <ul><li><p>
msgid ""
@@ -408,17 +408,6 @@
"закладÑваÑÑ Ð² пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð»ÑбÑÑ ÑлежкÑ</a>."
#. type: Content of: <ul><li><p>
-# | Anova sabotaged users' cooking devices with a downgrade that tethered them
-# | to a remote server. <a
-# |
href=\"https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062\">Unless
-# | users create an account on Anova's servers, their cookers won't
-# | [-function.</a>-] {+function</a>.+}
-#| msgid ""
-#| "Anova sabotaged users' cooking devices with a downgrade that tethered "
-#| "them to a remote server. <a href=\"https://consumerist.com/2017/04/12/"
-#| "anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/"
-#| "#more-10275062\">Unless users create an account on Anova's servers, their "
-#| "cookers won't function.</a>"
msgid ""
"Anova sabotaged users' cooking devices with a downgrade that tethered them "
"to a remote server. <a href=\"https://consumerist.com/2017/04/12/anova-ticks-"
@@ -487,18 +476,6 @@
"пÑовеÑÑÑÑÑÑ Ð¸ модиÑиÑиÑоваÑÑÑÑ
полÑзоваÑелÑми."
#. type: Content of: <ul><li><p>
-# | [-A-]{+The+} company that [-makes internet-controlled vibrators-] {+made
-# | the vibrator+} <a
-# |
[-href=\"https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit\">is
-# | being-]
-# |
{+href=\"https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit\">
-# | was+} sued for collecting lots of personal information about how people
-# | use{+d+} it</a>.
-#| msgid ""
-#| "A company that makes internet-controlled vibrators <a href=\"https://www."
-#| "theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-"
-#| "chicago-lawsuit\">is being sued for collecting lots of personal "
-#| "information about how people use it</a>."
msgid ""
"The company that made the vibrator <a href=\"https://www.theguardian.com/us-"
"news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit\"> was sued "
@@ -510,14 +487,6 @@
"о Ñом, как полÑзоваÑели пÑименÑли иÑ
изделиÑ</a>."
#. type: Content of: <ul><li><p>
-# | The company's statement that it [-anonymizes-] {+was anonymizing+} the
-# | data may be true, but it doesn't really matter. If it [-sells-] {+had
-# | sold+} the data to a data broker, the data broker [-can-] {+would have
-# | been able to+} figure out who the user [-is.-] {+was.+}
-#| msgid ""
-#| "The company's statement that it anonymizes the data may be true, but it "
-#| "doesn't really matter. If it sells the data to a data broker, the data "
-#| "broker can figure out who the user is."
msgid ""
"The company's statement that it was anonymizing the data may be true, but it "
"doesn't really matter. If it had sold the data to a data broker, the data "
@@ -698,14 +667,6 @@
"водиÑÑ Ð²Ð°Ñ Ð·Ð° ноÑ."
#. type: Content of: <ul><li><p>
-# | Malware {+was+} found on <a
-# |
href=\"http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html\">
-# | security cameras available through Amazon</a>.
-#| msgid ""
-#| "Malware found on <a href=\"http://www.slate.com/blogs/"
-#| "future_tense/2016/04/11/"
-#| "security_cameras_sold_through_amazon_have_malware_according_to_security."
-#| "html\"> security cameras available through Amazon</a>."
msgid ""
"Malware was found on <a href=\"http://www.slate.com/blogs/"
"future_tense/2016/04/11/"
@@ -729,18 +690,6 @@
"оÑноÑении Ñоже не пÑедÑÑавлÑÑÑ ÑгÑозÑ."
#. type: Content of: <ul><li><p>
-# | Google/Alphabet <a
-# |
href=\"https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be\">
-# | intentionally broke Revolv home automatic control products that depended
-# | on a server</a> to [-function.-] {+function, by shutting down the
-# | server.+} The lesson is, [-don't stand for that!-] {+reject all such
-# | products.+} Insist on self-contained computers that run free software!
-#| msgid ""
-#| "Google/Alphabet <a href=\"https://www.eff.org/deeplinks/2016/04/nest-"
-#| "reminds-customers-ownership-isnt-what-it-used-be\"> intentionally broke "
-#| "Revolv home automatic control products that depended on a server</a> to "
-#| "function. The lesson is, don't stand for that! Insist on self-contained "
-#| "computers that run free software!"
msgid ""
"Google/Alphabet <a href=\"https://www.eff.org/deeplinks/2016/04/nest-reminds-"
"customers-ownership-isnt-what-it-used-be\"> intentionally broke Revolv home "
@@ -751,8 +700,9 @@
"Google/Alphabet <a href=\"https://www.eff.org/deeplinks/2016/04/nest-reminds-"
"customers-ownership-isnt-what-it-used-be\"> пÑеднамеÑенно
вÑвели из ÑÑÑÐ¾Ñ "
"пÑодÑкÑÑ Ð°Ð²ÑомаÑиÑеÑкого ÑпÑавлениÑ
домом Revolv, ÑабоÑа коÑоÑÑÑ
завиÑила Ð¾Ñ "
-"ÑеÑвеÑа</a>, вÑклÑÑив ÑеÑвеÑ. ÐоÑалÑ:
оÑвеÑгайÑе вÑе Ñакие пÑодÑкÑÑ. ÐаÑÑаивайÑе
на ÑамоÑÑоÑÑелÑнÑÑ
"
-"компÑÑÑеÑаÑ
, коÑоÑÑе ÑабоÑаÑÑ Ð¿Ð¾Ð´
ÑпÑавлением ÑвободнÑÑ
пÑогÑамм!"
+"ÑеÑвеÑа</a>, вÑклÑÑив ÑеÑвеÑ. ÐоÑалÑ:
оÑвеÑгайÑе вÑе Ñакие пÑодÑкÑÑ. "
+"ÐаÑÑаивайÑе на ÑамоÑÑоÑÑелÑнÑÑ
компÑÑÑеÑаÑ
, коÑоÑÑе ÑабоÑаÑÑ Ð¿Ð¾Ð´
ÑпÑавлением "
+"ÑвободнÑÑ
пÑогÑамм!"
#. type: Content of: <ul><li><p>
msgid ""
@@ -806,17 +756,6 @@
"неÑпÑаведливой пÑакÑикой пÑиÑÑÐ°ÐµÑ Ð»Ñдей
к ÑомÑ, ÑÑÐ¾Ð±Ñ Ð¾Ð± ниÑ
вÑÑиÑали ноги."
#. type: Content of: <ul><li><p>
-# | Phillips “smart” lightbulbs had initially been designed to
-# | interact with other companies' smart light bulbs, but [-later the-] <a
-# |
href=\"https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml\">
-# | {+later the+} company updated the firmware to disallow
-# | interoperability</a>.
-#| msgid ""
-#| "Phillips “smart” lightbulbs had initially been designed to "
-#| "interact with other companies' smart light bulbs, but later the <a href="
-#| "\"https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-"
-#| "philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"
-#| "\"> company updated the firmware to disallow interoperability</a>."
msgid ""
"Phillips “smart” lightbulbs had initially been designed to "
"interact with other companies' smart light bulbs, but <a href=\"https://www."
@@ -849,11 +788,6 @@
"Link</a> еÑÑÑ ÑеÑнÑй Ñ
од Ð´Ð»Ñ Ð¼Ð¾Ð¼ÐµÐ½ÑалÑного
Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð½Ð°ÑÑÑоек."
#. type: Content of: <ul><li><p>
-# | <a href=\"http://sekurak.pl/tp-link-httptftp-backdoor/\"> The TP-Link
-# | router has a back{+ +}door</a>.
-#| msgid ""
-#| "<a href=\"http://sekurak.pl/tp-link-httptftp-backdoor/\"> The TP-Link "
-#| "router has a backdoor</a>."
msgid ""
"<a href=\"http://sekurak.pl/tp-link-httptftp-backdoor/\"> The TP-Link router "
"has a back door</a>."
@@ -870,15 +804,6 @@
"маÑÑÑÑÑизаÑоÑов еÑÑÑ ÑеÑнÑе Ñ
одÑ</a>."
#. type: Content of: <ul><li><p>
-# | The [-<a href=\"http://www.bbc.com/news/technology-34922712\">Nest-]
-# | {+Nest+} Cam “smart” camera is [-always-] {+<a
-# | href=\"http://www.bbc.com/news/technology-34922712\">always+}
-# | watching</a>, even when the “owner” switches it
-# | “off.”
-#| msgid ""
-#| "The <a href=\"http://www.bbc.com/news/technology-34922712\">Nest Cam "
-#| "“smart” camera is always watching</a>, even when the “"
-#| "owner” switches it “off.”"
msgid ""
"The Nest Cam “smart” camera is <a href=\"http://www.bbc.com/news/"
"technology-34922712\">always watching</a>, even when the “owner” "
@@ -897,13 +822,6 @@
"полÑзÑеÑÑÑ Ð¸Ð¼, ÑÑÐ¾Ð±Ñ Ð¸Ð½ÑеллекÑÑалÑно ваÑ
надÑÑÑ."
#. type: Content of: <ul><li><p>
-# | ARRIS cable modem has a <a
-# |
href=\"https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1\">
-# | back{+ +}door in the back{+ +}door</a>.
-#| msgid ""
-#| "ARRIS cable modem has a <a href=\"https://w00tsec.blogspot.de/2015/11/"
-#| "arris-cable-modem-has-backdoor-in.html?m=1\"> backdoor in the backdoor</"
-#| "a>."
msgid ""
"ARRIS cable modem has a <a href=\"https://w00tsec.blogspot.de/2015/11/arris-"
"cable-modem-has-backdoor-in.html?m=1\"> back door in the back door</a>."
@@ -951,15 +869,6 @@
"ÐÑо можно вÑклÑÑиÑÑ, но неÑпÑаведливо Ñже
Ñо, ÑÑо по ÑмолÑÐ°Ð½Ð¸Ñ ÑÑо вклÑÑено."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
-#| msgid ""
-#| "Tivo's alliance with Viacom adds 2.3 million households to the 600 "
-#| "millions social media profiles the company already monitors. Tivo "
-#| "customers are unaware they're being watched by advertisers. By combining "
-#| "TV viewing information with online social media participation, Tivo can "
-#| "now <a href=\"http://www.reuters.com/article/viacom-tivo-"
-#| "idUSL1N12U1VV20151102\"> correlate TV advertisement with online "
-#| "purchases</a>, exposing all users to new combined surveillance by default."
msgid ""
"Tivo's alliance with Viacom adds 2.3 million households to the 600 millions "
"social media profiles the company already monitors. Tivo customers are "
@@ -979,19 +888,6 @@
"комбиниÑованнÑй вид Ñлежки."
#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">-]FitBit
-# | fitness trackers have a {+<a
-# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">+}
-# | Bluetooth vulnerability</a> that allows attackers to send malware to the
-# | devices, which can subsequently spread to computers and other FitBit
-# | trackers that interact with them.
-#| msgid ""
-#| "<a href=\"http://www.tripwire.com/state-of-security/latest-security-"
-#| "news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\"> "
-#| "FitBit fitness trackers have a Bluetooth vulnerability</a> that allows "
-#| "attackers to send malware to the devices, which can subsequently spread "
-#| "to computers and other FitBit trackers that interact with them."
msgid ""
"FitBit fitness trackers have a <a href=\"http://www.tripwire.com/state-of-"
"security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-"
@@ -1000,24 +896,12 @@
"other FitBit trackers that interact with them."
msgstr ""
"<a href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-"
-"second-hack-delivers-first-ever-malware-to-fitness-trackers/\">ÑÑзвимоÑÑÑ
Bluetooth</a>, позволÑÑÑÐ°Ñ "
-"поÑÑлаÑÑ Ð² ÑÑÑÑойÑÑва вÑедоноÑнÑе
пÑогÑаммÑ, коÑоÑÑе заÑем могÑÑ "
-"ÑаÑпÑоÑÑÑанÑÑÑÑÑ Ð¿Ð¾ компÑÑÑеÑам и дÑÑгим
ÑÑÑÑойÑÑвам FitBit, Ñ ÐºÐ¾ÑоÑÑми они "
-"взаимодейÑÑвÑÑÑ."
-
-#. type: Content of: <ul><li><p>
-# | “Self-encrypting” disk drives do the encryption with
-# | proprietary firmware so you can't trust it. Western Digital's [-<a
-# |
href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">-]
-# | “My Passport” drives {+<a
-# |
href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">+}
-# | have a back door</a>.
-#| msgid ""
-#| "“Self-encrypting” disk drives do the encryption with "
-#| "proprietary firmware so you can't trust it. Western Digital's <a href="
-#| "\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-"
-#| "encrypting-hard-drives-have-really-bad-encryption\"> “My "
-#| "Passport” drives have a back door</a>."
+"second-hack-delivers-first-ever-malware-to-fitness-trackers/\">ÑÑзвимоÑÑÑ
"
+"Bluetooth</a>, позволÑÑÑÐ°Ñ Ð¿Ð¾ÑÑлаÑÑ Ð²
ÑÑÑÑойÑÑва вÑедоноÑнÑе пÑогÑаммÑ, "
+"коÑоÑÑе заÑем могÑÑ ÑаÑпÑоÑÑÑанÑÑÑÑÑ Ð¿Ð¾
компÑÑÑеÑам и дÑÑгим ÑÑÑÑойÑÑвам "
+"FitBit, Ñ ÐºÐ¾ÑоÑÑми они взаимодейÑÑвÑÑÑ."
+
+#. type: Content of: <ul><li><p>
msgid ""
"“Self-encrypting” disk drives do the encryption with proprietary "
"firmware so you can't trust it. Western Digital's “My Passport” "
@@ -1052,36 +936,17 @@
"hospital-drug-pumps/\">ÑбийÑÑва паÑиенÑов</a>."
#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/\">-]Verizon
-# | cable TV {+<a
-# |
href=\"http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/\">+}
-# | snoops on what programs people [-watch</a>,-] {+watch,+} and even what
-# | they wanted to [-record.-] {+record</a>.+}
-#| msgid ""
-#| "<a href=\"http://arstechnica.com/business/2015/05/verizon-fios-reps-know-"
-#| "what-tv-channels-you-watch/\"> Verizon cable TV snoops on what programs "
-#| "people watch</a>, and even what they wanted to record."
msgid ""
"Verizon cable TV <a href=\"http://arstechnica.com/business/2015/05/verizon-"
"fios-reps-know-what-tv-channels-you-watch/\"> snoops on what programs people "
"watch, and even what they wanted to record</a>."
msgstr ""
-"ÐабелÑное Ñелевидение Verizon <a
href=\"http://arstechnica.com/business/2015/05/verizon-fios-reps-know-"
-"what-tv-channels-you-watch/\">подглÑдÑÐ²Ð°ÐµÑ Ð·Ð° "
-"Ñем, какие ÑилÑÐ¼Ñ Ð»Ñди ÑмоÑÑÑÑ Ð¸ даже
какие они заÑ
оÑели запиÑаÑÑ</a>."
+"ÐабелÑное Ñелевидение Verizon <a
href=\"http://arstechnica.com/"
+"business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"
+"\">подглÑдÑÐ²Ð°ÐµÑ Ð·Ð° Ñем, какие ÑилÑÐ¼Ñ Ð»Ñди
ÑмоÑÑÑÑ Ð¸ даже какие они заÑ
оÑели "
+"запиÑаÑÑ</a>."
#. type: Content of: <ul><li><p>
-# | Hospira infusion pumps, which are used to administer drugs to a patient,
-# | were rated “<a
-# |
href=\"https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/\">[-
-# | -]least secure IP device I've ever seen</a>” by a security
-# | researcher.
-#| msgid ""
-#| "Hospira infusion pumps, which are used to administer drugs to a patient, "
-#| "were rated “<a href=\"https://securityledger.com/2015/05/researcher-"
-#| "drug-pump-the-least-secure-ip-device-ive-ever-seen/\"> least secure IP "
-#| "device I've ever seen</a>” by a security researcher."
msgid ""
"Hospira infusion pumps, which are used to administer drugs to a patient, "
"were rated “<a href=\"https://securityledger.com/2015/05/researcher-"
@@ -1114,36 +979,16 @@
"a>. Ðогда ÑелевизоÑÑ Ð¿Ñодавали, они ÑÑого
еÑе не делали."
#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673\">-]Barbie
-# | [-is-] {+<a
-# |
href=\"http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673\">is+}
-# | going to [-spy</a>-] {+spy+} on children and [-adults.-] {+adults</a>.+}
-#| msgid ""
-#| "<a href=\"http://www.mirror.co.uk/news/technology-science/technology/wi-"
-#| "fi-spy-barbie-records-childrens-5177673\"> Barbie is going to spy</a> on "
-#| "children and adults."
msgid ""
"Barbie <a href=\"http://www.mirror.co.uk/news/technology-science/technology/"
"wi-fi-spy-barbie-records-childrens-5177673\">is going to spy on children and "
"adults</a>."
msgstr ""
-"ÐаÑби <a
href=\"http://www.mirror.co.uk/news/technology-science/technology/wi-fi-"
-"spy-barbie-records-childrens-5177673\">ÑобиÑаеÑÑÑ ÑпиониÑÑ
за "
-"деÑÑми и взÑоÑлÑми</a>."
-
-#. type: Content of: <ul><li><p>
-# | The Samsung “[-s-]{+S+}mart” TV <a
-# |
href=\"http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm\">
-# | transmits users' voice on the internet to another company, Nuance</a>.
-# | Nuance can save it and would then have to give it to the US or some other
-# | government.
-#| msgid ""
-#| "The Samsung “smart” TV <a href=\"http://www.consumerreports."
-#| "org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-"
-#| "are-sharing-your-voice-data-with/index.htm\"> transmits users' voice on "
-#| "the internet to another company, Nuance</a>. Nuance can save it and "
-#| "would then have to give it to the US or some other government."
+"ÐаÑби <a
href=\"http://www.mirror.co.uk/news/technology-science/technology/"
+"wi-fi-spy-barbie-records-childrens-5177673\">ÑобиÑаеÑÑÑ
ÑпиониÑÑ Ð·Ð° деÑÑми и "
+"взÑоÑлÑми</a>."
+
+#. type: Content of: <ul><li><p>
msgid ""
"The Samsung “Smart” TV <a href=\"http://www.consumerreports.org/"
"cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-"
@@ -1179,13 +1024,6 @@
"конÑиденÑиалÑнÑÑ Ð¸Ð½ÑоÑмаÑиÑ, бÑдÑÑ
пеÑедаваÑÑÑÑ ÑÑеÑÑим ÑÑоÑонам</a>."
#. type: Content of: <ul><li><p>
-# | The Amazon “[-s-]{+S+}mart” TV is <a
-# |
href=\"http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance\">
-# | snooping all the time</a>.
-#| msgid ""
-#| "The Amazon “smart” TV is <a href=\"http://www.theguardian.com/"
-#| "technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-"
-#| "surveillance\"> snooping all the time</a>."
msgid ""
"The Amazon “Smart” TV is <a href=\"http://www.theguardian.com/"
"technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-"
@@ -1223,11 +1061,6 @@
"ÑабоÑаÑÑ”."
#. type: Content of: <ul><li><p>
-# | Proper laws would say that TVs are not allowed to report what the user
-# | [-watches — no-] {+watches—no+} exceptions!
-#| msgid ""
-#| "Proper laws would say that TVs are not allowed to report what the user "
-#| "watches — no exceptions!"
msgid ""
"Proper laws would say that TVs are not allowed to report what the user "
"watches—no exceptions!"
@@ -1300,19 +1133,6 @@
"конÑÑолÑ</a> и обÑаÑÐµÐ½Ñ Ð² ÑеÑÑ ÑбоÑа
номеÑов кÑедиÑнÑÑ
каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов."
#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html\">-]Spyware
-# | in LG “smart” [-TVs</a>-] {+TVs <a
-# |
href=\"http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html\">+}
-# | reports what the user watches, and the switch to turn this off has no
-# | [-effect.-] {+effect</a>.+} (The fact that the transmission reports a 404
-# | error really means nothing; the server could save that data anyway.)
-#| msgid ""
-#| "<a href=\"http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-"
-#| "usb-filenames-and.html\"> Spyware in LG “smart” TVs</a> "
-#| "reports what the user watches, and the switch to turn this off has no "
-#| "effect. (The fact that the transmission reports a 404 error really means "
-#| "nothing; the server could save that data anyway.)"
msgid ""
"Spyware in LG “smart” TVs <a href=\"http://doctorbeet.blogspot."
"co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html\"> reports what "
@@ -1320,10 +1140,10 @@
"fact that the transmission reports a 404 error really means nothing; the "
"server could save that data anyway.)"
msgstr ""
-" ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² “ÑмнÑÑ
”
ÑелевизоÑаÑ
LG<a
href=\"http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-"
-"filenames-and.html\"> докладÑваÑÑ Ð¾ Ñом, ÑÑо ÑмоÑÑиÑ
полÑзоваÑелÑ, незавиÑимо Ð¾Ñ Ñого, "
-"ÑазÑеÑено ли ÑÑо в наÑÑÑойкаÑ
ÑелевизоÑа</"
-"a> (даже когда ÑеÑÐ²ÐµÑ Ð¾ÑвеÑÐ°ÐµÑ "
+" ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² “ÑмнÑÑ
”
ÑелевизоÑаÑ
LG<a href=\"http://"
+"doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"
+"\"> докладÑваÑÑ Ð¾ Ñом, ÑÑо ÑмоÑÑиÑ
полÑзоваÑелÑ, незавиÑимо Ð¾Ñ Ñого, "
+"ÑазÑеÑено ли ÑÑо в наÑÑÑойкаÑ
ÑелевизоÑа</a> (даже когда ÑеÑÐ²ÐµÑ Ð¾ÑвеÑÐ°ÐµÑ "
"квиÑанÑией “ÑÑÑаниÑа не найдена” на
вÑÑланнÑе даннÑе, ÑÑо ниÑего "
"не знаÑиÑ; ÑÑи даннÑе вÑе Ñавно могÑÑ ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð° ÑеÑвеÑе LG)."
@@ -1358,15 +1178,6 @@
"огÑаниÑениÑми еÑÑÑ Ð½Ð° DVD и диÑкаÑ
Bluray</a>."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
-#| msgid ""
-#| "That page uses spin terms that favor DRM, including <a href=\"/philosophy/"
-#| "words-to-avoid.html#DigitalRightsManagement\"> digital “"
-#| "rights” management</a> and <a href=\"/philosophy/words-to-avoid."
-#| "html#Protection\">“protect”</a>, and it claims that “"
-#| "artists” (rather than companies) are primarily responsible for "
-#| "putting digital restrictions management into these disks. Nonetheless, "
-#| "it is a reference for the facts."
msgid ""
"That page uses spin terms that favor DRM, including <a href=\"/philosophy/"
"words-to-avoid.html#DigitalRightsManagement\"> digital “rights” "
@@ -1394,27 +1205,16 @@
"ÑпÑавление огÑаниÑениÑми; Ñак ÑÑо не
полÑзÑйÑеÑÑ Ð´Ð¸Ñками Bluray!"
#. type: Content of: <ul><li><p>
-# | The [-<a
-# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">-]
-# | FTC punished a company for making webcams with {+<a
-# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">+}
-# | bad [-security</a>-] {+security+} so that it was easy for anyone to watch
-# | [-them.-] {+through them</a>.+}
-#| msgid ""
-#| "The <a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-"
-#| "webcams-flaw-put-users-lives-on-display.html\"> FTC punished a company "
-#| "for making webcams with bad security</a> so that it was easy for anyone "
-#| "to watch them."
msgid ""
"The FTC punished a company for making webcams with <a href=\"http://www."
"nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-"
"display.html\"> bad security so that it was easy for anyone to watch through "
"them</a>."
msgstr ""
-"ФедеÑалÑÐ½Ð°Ñ ÑоÑÐ³Ð¾Ð²Ð°Ñ ÐºÐ¾Ð¼Ð¸ÑÑÐ¸Ñ Ð½Ð°ÐºÐ°Ð·Ð°Ð»Ð° "
-"ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð·Ð° пÑоизводÑÑво ÑеÑевÑÑ
ÐºÐ°Ð¼ÐµÑ Ñ
Ñакой Ñлабой заÑиÑой, <a
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\"> ÑÑо каждÑй "
-"мог легко глÑдеÑÑ ÑеÑез ниÑ
</a>."
+"ФедеÑалÑÐ½Ð°Ñ ÑоÑÐ³Ð¾Ð²Ð°Ñ ÐºÐ¾Ð¼Ð¸ÑÑÐ¸Ñ Ð½Ð°ÐºÐ°Ð·Ð°Ð»Ð°
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð·Ð° пÑоизводÑÑво ÑеÑевÑÑ
"
+"ÐºÐ°Ð¼ÐµÑ Ñ Ñакой Ñлабой заÑиÑой, <a
href=\"http://www.nytimes.com/2013/09/05/"
+"technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\"> ÑÑо "
+"каждÑй мог легко глÑдеÑÑ ÑеÑез ниÑ
</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -1425,26 +1225,10 @@
msgstr ""
"<a href=\"http://spritesmods.com/?art=hddhack&page=6\">
ÐеÑезапиÑÑваемÑе "
"неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² конÑÑоллеÑаÑ
диÑков могÑÑ Ð·Ð°Ð¼ÐµÐ½ÑÑÑÑÑ Ð½ÐµÑвободной "
-"пÑогÑаммой</a>. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ Ð»ÑбÑÑ ÑиÑÑемÑ
ÑÑзвимой по оÑноÑÐµÐ½Ð¸Ñ Ðº неÑÑÑÑанÑемÑм "
-"аÑакам, коÑоÑÑе не обнаÑÑживаÑÑÑÑ Ð¾Ð±ÑÑнÑм
анализом."
+"пÑогÑаммой</a>. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ Ð»ÑбÑÑ ÑиÑÑемÑ
ÑÑзвимой по оÑноÑÐµÐ½Ð¸Ñ Ðº "
+"неÑÑÑÑанÑемÑм аÑакам, коÑоÑÑе не
обнаÑÑживаÑÑÑÑ Ð¾Ð±ÑÑнÑм анализом."
#. type: Content of: <ul><li><p>
-# | It is possible to <a
-# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">
-# | kill people by taking control of medical implants by radio</a>. More
-# | information in <a
-# | href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a> and <a
-# |
[-href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">-]
-# |
{+href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">+}
-# | IOActive Labs Research blog</a>.
-#| msgid ""
-#| "It is possible to <a href=\"http://siliconangle.com/blog/2013/07/27/famed-"
-#| "hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\"> "
-#| "kill people by taking control of medical implants by radio</a>. More "
-#| "information in <a href=\"http://www.bbc.co.uk/news/"
-#| "technology-17631838\">BBC News</a> and <a href=\"https://web.archive.org/"
-#| "web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-"
-#| "plausible-was.html\"> IOActive Labs Research blog</a>."
msgid ""
"It is possible to <a href=\"http://siliconangle.com/blog/2013/07/27/famed-"
"hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\"> kill "
@@ -1457,9 +1241,8 @@
"dies-days-before-scheduled-black-hat-appearance/\"> ÐолÑÑив
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ "
"вживленнÑми медиÑинÑкими ÑÑÑÑойÑÑвами по
Ñадио, можно ÑбиваÑÑ Ð»Ñдей</a>. "
"ÐодÑобноÑÑи Ñм. <a
href=\"http://www.bbc.co.uk/news/technology-17631838\"> "
-"на ÑайÑе Ðи-Ðи-Си</a> и <a
href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-"
-"was.html\"> в "
-"блоге лабоÑаÑоÑии IOActive</a>."
+"на ÑайÑе Ðи-Ðи-Си</a> и <a
href=\"https://blog.ioactive.com/2013/02/broken-"
+"hearts-how-plausible-was.html\"> в блоге лабоÑаÑоÑии
IOActive</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -1491,14 +1274,6 @@
"пÑедоÑÑавлÑли доÑÑÑп к даннÑм клиенÑа."
#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html\">-]{+The+}
-# | Cisco TNP IP phones are {+<a
-# |
href=\"http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html\">+}
-# | spying devices</a>.
-#| msgid ""
-#| "<a href=\"http://boingboing.net/2012/12/29/your-cisco-phone-is-listening."
-#| "html\"> Cisco TNP IP phones are spying devices</a>."
msgid ""
"The Cisco TNP IP phones are <a href=\"http://boingboing.net/2012/12/29/your-"
"cisco-phone-is-listening.html\"> spying devices</a>."
@@ -1507,22 +1282,6 @@
"\">СеÑевÑе ÑелеÑÐ¾Ð½Ñ TNP Cisco ÑпионÑÑ</a>."
#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F\">-]Samsung
-# | “Smart” TVs have {+<a
-# |
href=\"https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F\">+}
-# | turned Linux into the base for a tyrant system</a> so as to impose DRM.
-# | What enables Samsung to do this is that Linux is released under GNU GPL
-# | version 2, <a href=\"/licenses/rms-why-gplv3.html\">not version 3</a>,
-# | together with a weak interpretation of GPL version 2.
-#| msgid ""
-#| "<a href=\"http://wiki.samygo.tv/index.php5/"
-#| "SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F\"> Samsung “"
-#| "Smart” TVs have turned Linux into the base for a tyrant system</a> "
-#| "so as to impose DRM. What enables Samsung to do this is that Linux is "
-#| "released under GNU GPL version 2, <a href=\"/licenses/rms-why-gplv3.html"
-#| "\">not version 3</a>, together with a weak interpretation of GPL version "
-#| "2."
msgid ""
"Samsung “Smart” TVs have <a href=\"https://wiki.samygo.tv/index."
"php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F\"> turned "
@@ -1531,13 +1290,13 @@
"2, <a href=\"/licenses/rms-why-gplv3.html\">not version 3</a>, together with "
"a weak interpretation of GPL version 2."
msgstr ""
-"“"
-"ÐнÑеллекÑÑалÑнÑе” ÑелевизоÑÑ Samsung <a
href=\"http://wiki.samygo.tv/index.php5/"
-"SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F\"> обÑаÑили Linux
в Ð±Ð°Ð·Ñ Ð´Ð»Ñ "
-"ÑиÑаниÑеÑкой ÑиÑÑемÑ</a>, ÑÑÐ¾Ð±Ñ Ð½Ð°Ð²ÑзÑваÑÑ
ÑиÑÑовое ÑпÑавление огÑаниÑениÑми."
-"Samsung Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾ÑÑÑпаÑÑ Ñак благодаÑÑ ÑомÑ,
ÑÑо Linux вÑпÑÑкаеÑÑÑ Ð¿Ð¾Ð´ "
-"GNU GPL веÑÑии 2 <a href=\"/licenses/rms-why-gplv3.html\">а
не "
-"веÑÑии 3</a>, а Ñакже оÑлабленномÑ
ÑÐ¾Ð»ÐºÐ¾Ð²Ð°Ð½Ð¸Ñ GPL веÑÑии 2."
+"“ÐнÑеллекÑÑалÑнÑе” ÑелевизоÑÑ Samsung
<a href=\"http://wiki."
+"samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F\"> "
+"обÑаÑили Linux в Ð±Ð°Ð·Ñ Ð´Ð»Ñ ÑиÑаниÑеÑкой
ÑиÑÑемÑ</a>, ÑÑÐ¾Ð±Ñ Ð½Ð°Ð²ÑзÑваÑÑ "
+"ÑиÑÑовое ÑпÑавление огÑаниÑениÑми.Samsung
Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾ÑÑÑпаÑÑ Ñак благодаÑÑ "
+"ÑомÑ, ÑÑо Linux вÑпÑÑкаеÑÑÑ Ð¿Ð¾Ð´ GNU GPL
веÑÑии 2 <a href=\"/"
+"licenses/rms-why-gplv3.html\">а не веÑÑии 3</a>, а Ñакже
оÑÐ»Ð°Ð±Ð»ÐµÐ½Ð½Ð¾Ð¼Ñ "
+"ÑÐ¾Ð»ÐºÐ¾Ð²Ð°Ð½Ð¸Ñ GPL веÑÑии 2."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- po/proprietary-insecurity.ru.po 26 Sep 2018 14:38:54 -0000 1.183
+++ po/proprietary-insecurity.ru.po 26 Sep 2018 14:58:03 -0000 1.184
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-09-18 17:25+0000\n"
+"POT-Creation-Date: 2018-09-26 14:26+0000\n"
"PO-Revision-Date: 2018-09-26 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -108,6 +108,49 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
+"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
+"voice commands in other audio</a>, so that people cannot hear them, but "
+"Alexa and Siri can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+"Siri, Alexa и вÑе дÑÑгие ÑиÑÑÐµÐ¼Ñ Ð³Ð¾Ð»Ð¾Ñового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">взÑÑÑ Ð¿Ð¾Ð´ конÑÑолÑ
пÑогÑаммами, "
+"коÑоÑÑе воÑпÑоизводÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð²
неÑлÑÑимом лÑдÑми ÑлÑÑÑазвÑковом
диапазоне</"
+"a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Samsung phones randomly <a href=\"https://www.theverge.com/"
"circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"
"\">send photos to people in the owner's contact list</a>."
@@ -138,6 +181,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Intel's intentional “management engine” back door has <a href="
+"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
+"unintended back doors</a> too."
+msgstr ""
+"РпÑеднамеÑенном ÑеÑном Ñ
оде в “маÑине
ÑпÑавлениє Intel еÑÑÑ "
+"Ñакже <a href=\"https://www.theregister.co.uk/2017/11/20/"
+"intel_flags_firmware_flaws/\"> непÑеднамеÑеннÑй ÑеÑнÑй
Ñ
од</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -150,16 +203,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Intel's intentional “management engine” back door has <a href="
-"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
-"unintended back doors</a> too."
-msgstr ""
-"РпÑеднамеÑенном ÑеÑном Ñ
оде в “маÑине
ÑпÑавлениє Intel еÑÑÑ "
-"Ñакже <a href=\"https://www.theregister.co.uk/2017/11/20/"
-"intel_flags_firmware_flaws/\"> непÑеднамеÑеннÑй ÑеÑнÑй
Ñ
од</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Bad security in some cars makes it possible to <a href=\"https://cve.mitre."
"org/cgi-bin/cvename.cgi?name=CVE-2017-14937\"> remotely activate the "
"airbags</a>."
@@ -206,46 +249,22 @@
msgstr "Ðе бÑÐ´Ñ Ð¿ÑоÑÑоÑилей — оÑкажиÑÑ
Ð¾Ñ Ð²ÑеÑ
клеÑей."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | It is unfortunate that the article uses the term <a
+# | href=\"/philosophy/words-to-avoid.html#Monetize\">[-
+# | -]“monetize”</a>.
+#, fuzzy
#| msgid ""
#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
#| "words-to-avoid.html#Monetize\"> “monetize”</a>."
msgid ""
"It is unfortunate that the article uses the term <a href=\"/philosophy/words-"
-"to-avoid.html#Monetize\"> “monetize”</a>."
+"to-avoid.html#Monetize\">“monetize”</a>."
msgstr ""
"ÐÑÐµÐ½Ñ Ð¶Ð°Ð»Ñ, ÑÑо в ÑÑаÑÑе ÑпоÑÑеблÑеÑÑÑ
Ñлово <a href=\"/philosophy/words-to-"
"avoid.html#Monetize\"> “монеÑизиÑоваÑÑ”</a>."
#. type: Content of: <ul><li><p>
msgid ""
-"Siri, Alexa, and all the other voice-control systems can be <a href="
-"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
-"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
-"commands in ultrasound that humans can't hear</a>."
-msgstr ""
-"Siri, Alexa и вÑе дÑÑгие ÑиÑÑÐµÐ¼Ñ Ð³Ð¾Ð»Ð¾Ñового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ <a href="
-"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
-"astoundingly-easy-to-hack-siri-and-alexa\">взÑÑÑ Ð¿Ð¾Ð´ конÑÑолÑ
пÑогÑаммами, "
-"коÑоÑÑе воÑпÑоизводÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð²
неÑлÑÑимом лÑдÑми ÑлÑÑÑазвÑковом
диапазоне</"
-"a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
-"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
-"microphone-cameras.html\"> Crackers found a way to break security on a "
-"“smart” TV</a> and use its camera to watch the people who are "
-"watching TV."
-msgstr ""
-"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
-"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
-"microphone-cameras.html\"> ÐзломÑики наÑли ÑпоÑоб
вÑкÑÑÑÑ Ð·Ð°ÑиÑÑ Ð² “"
-"инÑеллекÑÑалÑном” ÑелевизоÑе</a> и
воÑполÑзоваÑÑÑÑ ÐµÐ³Ð¾ видеокамеÑой, "
-"ÑÑÐ¾Ð±Ñ ÑмоÑÑеÑÑ Ð½Ð° лÑдей, коÑоÑÑе ÑмоÑÑÑÑ
ÑелевизоÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Many models of Internet-connected cameras <a href=\"/proprietary/proprietary-"
"back-doors.html#InternetCameraBackDoor\"> have backdoors</a>."
msgstr ""
@@ -269,52 +288,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
-"installed on 28 models of HP laptops logged the user's keystroke to a file "
-"in the filesystem. Any process with access to the filesystem or the "
-"MapViewOfFile API could gain access to the log. Furthermore, <a href="
-"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
-"\">according to modzero</a> the “information-leak via Covert Storage "
-"Channel enables malware authors to capture keystrokes without taking the "
-"risk of being classified as malicious task by AV heuristics”."
-msgstr ""
-"ÐÐ°ÐºÐµÑ Ð°ÑдиодÑайвеÑов Conexant HD (веÑÑии 1.0.0.46 и
более ÑанниÑ
), "
-"пÑедÑÑÑановленнÑй на 28 моделей
поÑÑаÑивнÑÑ
компÑÑÑеÑов Hewlett-"
-"Packard, запиÑÑвали в Ñайл нажаÑиÑ
полÑзоваÑÐµÐ»Ñ Ð½Ð° клавиÑи. ÐÑбой пÑоÑеÑÑ, Ñ "
-"коÑоÑого бÑл доÑÑÑп к MapViewOfFile, мог ÑиÑаÑÑ
ÑÑÐ¾Ñ Ð¶ÑÑнал. Ðолее Ñого, "
-"ÑоглаÑно modzero, “<a href=\"https://www.modzero.ch/advisories/"
-"MZ-17-01-Conexant-Keylogger.txt\">ÑÑеÑка инÑоÑмаÑии
ÑеÑез ÑкÑÑÑÑй канал "
-"накопиÑÐµÐ»Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÐµÑ Ð°Ð²ÑоÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм пеÑеÑ
ваÑÑваÑÑ Ð½Ð°Ð¶Ð°ÑÐ¸Ñ Ð½Ð° "
-"клавиÑи без ÑиÑка бÑÑÑ
клаÑÑиÑиÑиÑованнÑм алгоÑиÑмами
анÑивиÑÑÑов как "
-"вÑедоноÑÐ½Ð°Ñ Ð·Ð°Ð´Ð°Ñа</a>”."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The proprietary code that runs pacemakers, insulin pumps, and other medical "
-"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
-"of gross security faults</a>."
-msgstr ""
-"РнеÑвободнÑÑ
пÑогÑаммаÑ
, под ÑпÑавлением
коÑоÑÑÑ
ÑабоÑаÑÑ <a href=\"http://"
-"www.bbc.co.uk/news/technology-40042584\">каÑдиоÑÑимÑлÑÑоÑÑ,
ÑпÑиÑÑ Ñ "
-"инÑÑлином и дÑÑгие медиÑинÑкие пÑибоÑÑ</a>,
полнÑм-полно гÑÑбÑÑ
пÑоÑÑеÑов по "
-"ÑаÑÑи безопаÑноÑÑи."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
-"by the Shadowbrokers group, are now being used to <a href=\"https://"
-"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
-"computers-around-the-world/\">attack a great number of Windows computers "
-"with ransomware</a>."
-msgstr ""
-"ÐÑиÑиÑеÑкие оÑибки в Windows, коÑоÑÑе
накапливалиÑÑ Ð² ÐÐРа заÑем бÑли "
-"ÑазглаÑÐµÐ½Ñ Ð³ÑÑппой Shadowbrokers, ÑепеÑÑ
пÑименÑÑÑÑÑ, ÑÑÐ¾Ð±Ñ <a href="
-"\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-"
-"helping-hijack-computers-around-the-world/\">заÑажаÑÑ
компÑÑÑеÑÑ Ð¿Ð¾Ð´ Windows "
-"Ñ ÑелÑÑ Ð¿Ð¾Ð»ÑÑÐµÐ½Ð¸Ñ Ð²ÑкÑпа.</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Intel's CPU backdoor—the Intel Management Engine—had a <a href="
"\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-"
"execution-bug-that-lurked-in-cpus-for-10-years/\">major security "
@@ -354,6 +327,52 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The proprietary code that runs pacemakers, insulin pumps, and other medical "
+"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
+"of gross security faults</a>."
+msgstr ""
+"РнеÑвободнÑÑ
пÑогÑаммаÑ
, под ÑпÑавлением
коÑоÑÑÑ
ÑабоÑаÑÑ <a href=\"http://"
+"www.bbc.co.uk/news/technology-40042584\">каÑдиоÑÑимÑлÑÑоÑÑ,
ÑпÑиÑÑ Ñ "
+"инÑÑлином и дÑÑгие медиÑинÑкие пÑибоÑÑ</a>,
полнÑм-полно гÑÑбÑÑ
пÑоÑÑеÑов по "
+"ÑаÑÑи безопаÑноÑÑи."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
+"installed on 28 models of HP laptops logged the user's keystroke to a file "
+"in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a href="
+"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
+"\">according to modzero</a> the “information-leak via Covert Storage "
+"Channel enables malware authors to capture keystrokes without taking the "
+"risk of being classified as malicious task by AV heuristics”."
+msgstr ""
+"ÐÐ°ÐºÐµÑ Ð°ÑдиодÑайвеÑов Conexant HD (веÑÑии 1.0.0.46 и
более ÑанниÑ
), "
+"пÑедÑÑÑановленнÑй на 28 моделей
поÑÑаÑивнÑÑ
компÑÑÑеÑов Hewlett-"
+"Packard, запиÑÑвали в Ñайл нажаÑиÑ
полÑзоваÑÐµÐ»Ñ Ð½Ð° клавиÑи. ÐÑбой пÑоÑеÑÑ, Ñ "
+"коÑоÑого бÑл доÑÑÑп к MapViewOfFile, мог ÑиÑаÑÑ
ÑÑÐ¾Ñ Ð¶ÑÑнал. Ðолее Ñого, "
+"ÑоглаÑно modzero, “<a href=\"https://www.modzero.ch/advisories/"
+"MZ-17-01-Conexant-Keylogger.txt\">ÑÑеÑка инÑоÑмаÑии
ÑеÑез ÑкÑÑÑÑй канал "
+"накопиÑÐµÐ»Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÐµÑ Ð°Ð²ÑоÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм пеÑеÑ
ваÑÑваÑÑ Ð½Ð°Ð¶Ð°ÑÐ¸Ñ Ð½Ð° "
+"клавиÑи без ÑиÑка бÑÑÑ
клаÑÑиÑиÑиÑованнÑм алгоÑиÑмами
анÑивиÑÑÑов как "
+"вÑедоноÑÐ½Ð°Ñ Ð·Ð°Ð´Ð°Ñа</a>”."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+"ÐÑиÑиÑеÑкие оÑибки в Windows, коÑоÑÑе
накапливалиÑÑ Ð² ÐÐРа заÑем бÑли "
+"ÑазглаÑÐµÐ½Ñ Ð³ÑÑппой Shadowbrokers, ÑепеÑÑ
пÑименÑÑÑÑÑ, ÑÑÐ¾Ð±Ñ <a href="
+"\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-"
+"helping-hijack-computers-around-the-world/\">заÑажаÑÑ
компÑÑÑеÑÑ Ð¿Ð¾Ð´ Windows "
+"Ñ ÑелÑÑ Ð¿Ð¾Ð»ÑÑÐµÐ½Ð¸Ñ Ð²ÑкÑпа.</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-"
"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
@@ -391,6 +410,49 @@
#. type: Content of: <ul><li><p>
msgid ""
+"If you buy a used “smart” car, house, TV, refrigerator, etc., "
+"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
+"used.html\">the previous owners can still remotely control it</a>."
+msgstr ""
+"ÐÑли Ð²Ñ Ð¿Ð¾ÐºÑпаеÑе “ÑмнÑй”
авÑомобилÑ, дом, ÑелевизоÑ, "
+"Ñ
олодилÑник и Ñ.д., обÑÑно <a
href=\"http://boingboing.net/2017/02/20/the-"
+"previous-owners-of-used.html\">пÑедÑдÑÑие владелÑÑÑ
могÑÑ Ð¿Ð¾-пÑÐµÐ¶Ð½ÐµÐ¼Ñ "
+"ÑпÑавлÑÑÑ Ð¸Ð¼ на ÑаÑÑÑоÑнии</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The mobile apps for communicating <a href=\"https://www.bleepingcomputer.com/"
+"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
+"\">with a smart but foolish car have very bad security</a>."
+msgstr ""
+"ÐобилÑнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑвÑзи <a
href=\"https://www.bleepingcomputer.com/"
+"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
+"\">ÑмнÑми, но дÑÑаÑкими авÑомобилÑми
оÑлиÑаÑÑÑÑ Ð¾ÑÐµÐ½Ñ Ñлабой безопаÑноÑÑÑÑ</"
+"a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This is in addition to the fact that the car contains a cellular modem that "
+"tells big brother all the time where it is. If you own such a car, it would "
+"be wise to disconnect the modem so as to turn off the tracking."
+msgstr ""
+"ÐÑо дополнÑÐµÑ ÑÐ¾Ñ ÑакÑ, ÑÑо авÑомобилÑ
ÑодеÑÐ¶Ð¸Ñ Ð¼Ð¾Ð´ÐµÐ¼ ÑоÑовой ÑвÑзи, коÑоÑÑй "
+"вÑе вÑÐµÐ¼Ñ ÑаÑÑказÑваеÑ, где он наÑ
одиÑÑÑ,
СÑаÑÑÐµÐ¼Ñ ÐÑаÑÑ. ÐÑли Ð²Ñ Ð²Ð»Ð°Ð´ÐµÐµÑе "
+"Ñаким авÑомобилем, бÑло Ð±Ñ Ð¼ÑдÑÑм
оÑÑоединиÑÑ Ð¼Ð¾Ð´ÐµÐ¼, ÑÑÐ¾Ð±Ñ Ð²ÑклÑÑиÑÑ ÑлежкÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
+"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
+"\">have a security hole that allows an SMS message to install ransomware</a>."
+msgstr ""
+"Ð ÑелеÑонаÑ
Samsung еÑÑÑ <a
href=\"https://www.bleepingcomputer.com/news/"
+"security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-"
+"ransomware-attacks/\">пÑокол в заÑиÑе, позволÑÑÑий
ÑÑÑанавливаÑÑ Ð¿Ð¾ SMS "
+"пÑогÑаммÑ, ÑÑебÑÑÑие вÑкÑпа</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"WhatsApp has a feature that <a href=\"https://techcrunch.com/2017/01/13/"
"encrypted-messaging-platform-whatsapp-denies-backdoor-claim/\"> has been "
"described as a “back door”</a> because it would enable "
@@ -434,85 +496,45 @@
"пока не Ð²Ð¸Ð´Ð¸Ñ Ð¼Ð°Ð¼Ð°."
#. type: Content of: <ul><li><p>
+# | 4G LTE phone networks are drastically insecure. They can be <a
+# |
[-href=\"https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">-]
+# |
{+href=\"https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">+}
+# | taken over by third parties and used for man-in-the-middle attacks</a>.
+#, fuzzy
+#| msgid ""
+#| "4G LTE phone networks are drastically insecure. They can be <a href="
+#| "\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
+#| "uk/2016/10/23/"
+#| "every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
+#| "over by third parties and used for man-in-the-middle attacks</a>."
msgid ""
-"The mobile apps for communicating <a href=\"https://www.bleepingcomputer.com/"
-"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
-"\">with a smart but foolish car have very bad security</a>."
+"4G LTE phone networks are drastically insecure. They can be <a href="
+"\"https://www.theregister.co.uk/2016/10/23/"
+"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
+"over by third parties and used for man-in-the-middle attacks</a>."
msgstr ""
-"ÐобилÑнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑвÑзи <a
href=\"https://www.bleepingcomputer.com/"
-"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
-"\">ÑмнÑми, но дÑÑаÑкими авÑомобилÑми
оÑлиÑаÑÑÑÑ Ð¾ÑÐµÐ½Ñ Ñлабой безопаÑноÑÑÑÑ</"
-"a>."
+"ТелеÑоннÑе ÑеÑи 4G LTE кÑайне Ñлабо
заÑиÑенÑ. СвÑÐ·Ñ Ð¿Ð¾ ним могÑÑ <a href="
+"\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
+"uk/2016/10/23/"
+"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> "
+"пеÑеÑ
ваÑÑваÑÑ ÑÑеÑÑи ÑÑоÑÐ¾Ð½Ñ Ð´Ð»Ñ Ð°Ñак
“Ñеловек поÑеÑедине”</a>."
#. type: Content of: <ul><li><p>
msgid ""
-"This is in addition to the fact that the car contains a cellular modem that "
-"tells big brother all the time where it is. If you own such a car, it would "
-"be wise to disconnect the modem so as to turn off the tracking."
+"Due to weak security, <a href=\"http://jalopnik.com/almost-every-volkswagen-"
+"built-since-1995-is-vulnerable-1785159844\">it is easy to open the doors of "
+"100 million cars built by Volkswagen</a>."
msgstr ""
-"ÐÑо дополнÑÐµÑ ÑÐ¾Ñ ÑакÑ, ÑÑо авÑомобилÑ
ÑодеÑÐ¶Ð¸Ñ Ð¼Ð¾Ð´ÐµÐ¼ ÑоÑовой ÑвÑзи, коÑоÑÑй "
-"вÑе вÑÐµÐ¼Ñ ÑаÑÑказÑваеÑ, где он наÑ
одиÑÑÑ,
СÑаÑÑÐµÐ¼Ñ ÐÑаÑÑ. ÐÑли Ð²Ñ Ð²Ð»Ð°Ð´ÐµÐµÑе "
-"Ñаким авÑомобилем, бÑло Ð±Ñ Ð¼ÑдÑÑм
оÑÑоединиÑÑ Ð¼Ð¾Ð´ÐµÐ¼, ÑÑÐ¾Ð±Ñ Ð²ÑклÑÑиÑÑ ÑлежкÑ."
+"СлабоÑÑÑ Ð·Ð°ÑиÑÑ <a
href=\"http://jalopnik.com/almost-every-volkswagen-built-"
+"since-1995-is-vulnerable-1785159844\">позволÑÐµÑ Ð»ÐµÐ³ÐºÐ¾
оÑкÑÑваÑÑ Ð´Ð²ÐµÑи "
+"100 миллионов авÑомобилей, ÑобÑаннÑÑ
компанией “ФолÑкÑваген”"
+"</a>."
#. type: Content of: <ul><li><p>
msgid ""
-"If you buy a used “smart” car, house, TV, refrigerator, etc., "
-"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
-"used.html\">the previous owners can still remotely control it</a>."
-msgstr ""
-"ÐÑли Ð²Ñ Ð¿Ð¾ÐºÑпаеÑе “ÑмнÑй”
авÑомобилÑ, дом, ÑелевизоÑ, "
-"Ñ
олодилÑник и Ñ.д., обÑÑно <a
href=\"http://boingboing.net/2017/02/20/the-"
-"previous-owners-of-used.html\">пÑедÑдÑÑие владелÑÑÑ
могÑÑ Ð¿Ð¾-пÑÐµÐ¶Ð½ÐµÐ¼Ñ "
-"ÑпÑавлÑÑÑ Ð¸Ð¼ на ÑаÑÑÑоÑнии</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
-"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
-"\">have a security hole that allows an SMS message to install ransomware</a>."
-msgstr ""
-"Ð ÑелеÑонаÑ
Samsung еÑÑÑ <a
href=\"https://www.bleepingcomputer.com/news/"
-"security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-"
-"ransomware-attacks/\">пÑокол в заÑиÑе, позволÑÑÑий
ÑÑÑанавливаÑÑ Ð¿Ð¾ SMS "
-"пÑогÑаммÑ, ÑÑебÑÑÑие вÑкÑпа</a>."
-
-#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
-#| msgid ""
-#| "4G LTE phone networks are drastically insecure. They can be <a href="
-#| "\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
-#| "uk/2016/10/23/"
-#| "every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
-#| "over by third parties and used for man-in-the-middle attacks</a>."
-msgid ""
-"4G LTE phone networks are drastically insecure. They can be <a href="
-"\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
-"uk/2016/10/23/"
-"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
-"over by third parties and used for man-in-the-middle attacks</a>."
-msgstr ""
-"ТелеÑоннÑе ÑеÑи 4G LTE кÑайне Ñлабо
заÑиÑенÑ. СвÑÐ·Ñ Ð¿Ð¾ ним могÑÑ <a href="
-"\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
-"uk/2016/10/23/"
-"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> "
-"пеÑеÑ
ваÑÑваÑÑ ÑÑеÑÑи ÑÑоÑÐ¾Ð½Ñ Ð´Ð»Ñ Ð°Ñак
“Ñеловек поÑеÑедине”</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Due to weak security, <a href=\"http://jalopnik.com/almost-every-volkswagen-"
-"built-since-1995-is-vulnerable-1785159844\">it is easy to open the doors of "
-"100 million cars built by Volkswagen</a>."
-msgstr ""
-"СлабоÑÑÑ Ð·Ð°ÑиÑÑ <a
href=\"http://jalopnik.com/almost-every-volkswagen-built-"
-"since-1995-is-vulnerable-1785159844\">позволÑÐµÑ Ð»ÐµÐ³ÐºÐ¾
оÑкÑÑваÑÑ Ð´Ð²ÐµÑи "
-"100 миллионов авÑомобилей, ÑобÑаннÑÑ
компанией “ФолÑкÑваген”"
-"</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Ransomware <a href=\"https://www.pentestpartners.com/security-blog/"
-"thermostat-ransomware-a-lesson-in-iot-security/\"> has been developed for a "
-"thermostat that uses proprietary software</a>."
+"Ransomware <a href=\"https://www.pentestpartners.com/security-blog/"
+"thermostat-ransomware-a-lesson-in-iot-security/\"> has been developed for a "
+"thermostat that uses proprietary software</a>."
msgstr ""
"<a href=\"https://www.pentestpartners.com/security-blog/thermostat-"
"ransomware-a-lesson-in-iot-security/\">ÐÐ»Ñ ÑеÑмоÑÑаÑа Ñ
неÑвободнÑми "
@@ -582,22 +604,10 @@
msgstr "GNU/Linux в анÑивиÑÑÑаÑ
не нÑждаеÑÑÑ."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
-#| msgid ""
-#| "Over 70 brands of network-connected surveillance cameras <a href=\"http://"
-#| "www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
-#| "\">have security bugs that allow anyone to watch through them</a>."
-msgid ""
-"Over 70 brands of network-connected surveillance cameras <a href=\"http://"
-"www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
-"\">have security bugs that allow anyone to watch through them</a>."
-msgstr ""
-"РкамеÑаÑ
наблÑÐ´ÐµÐ½Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ 70 маÑок <a
href=\"http://www.kerneronsec."
-"com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">обнаÑÑженÑ
недоÑеÑÑ "
-"безопаÑноÑÑи, позволÑÑÑие ÐºÐ¾Ð¼Ñ Ñгодно
подглÑдÑваÑÑ ÑеÑез ниÑ
</a>."
-
-#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | Samsung's “Smart Home” has a big security hole; <a
+# |
href=\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/\">{+
+# | +}unauthorized people can remotely control it</a>.
+#, fuzzy
#| msgid ""
#| "Samsung's “Smart Home” has a big security hole; <a href="
#| "\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-"
@@ -606,7 +616,7 @@
msgid ""
"Samsung's “Smart Home” has a big security hole; <a href=\"http://"
"arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-"
-"keys-to-front-door/\">unauthorized people can remotely control it</a>."
+"keys-to-front-door/\"> unauthorized people can remotely control it</a>."
msgstr ""
"Ð “инÑеллекÑÑалÑном доме” компании
Samsung еÑÑÑ Ð±Ð¾Ð»ÑÑÐ°Ñ Ð¿ÑоÑеÑ
а "
"безопаÑноÑÑи; <a
href=\"http://arstechnica.com/security/2016/05/samsung-"
@@ -632,52 +642,29 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Nissan Leaf has a built-in cell phone modem which allows effectively "
-"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
-"nissan/\">to access its computers remotely and make changes in various "
-"settings</a>."
-msgstr ""
-"Ð Nissan Leaf еÑÑÑ Ð²ÑÑÑоеннÑй ÑелеÑоннÑй модем,
позволÑÑÑий ÑакÑиÑеÑки ÐºÐ¾Ð¼Ñ "
-"Ñгодно <a
href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
-"nissan/\">полÑÑаÑÑ ÑдаленнÑй доÑÑÑп к
компÑÑÑеÑам и вноÑиÑÑ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² "
-"ÑазлиÑнÑе наÑÑÑойки</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"That's easy to do because the system has no authentication when accessed "
-"through the modem. However, even if it asked for authentication, you "
-"couldn't be confident that Nissan has no access. The software in the car is "
-"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
-"\">which means it demands blind faith from its users</a>."
-msgstr ""
-"ÐÑо неÑÑÑдно поÑомÑ, ÑÑо в ÑиÑÑеме неÑ
пÑовеÑки подлинноÑÑи полÑзоваÑÐµÐ»Ñ Ð¿Ñи "
-"доÑÑÑпе по модемÑ. Ðднако даже еÑли бÑ
модем пÑоводил пÑовеÑкÑ, нелÑÐ·Ñ Ð±Ñло "
-"Ð±Ñ Ð±ÑÑÑ ÑвеÑеннÑми, ÑÑо Ñ Nissan Ð½ÐµÑ Ð´Ð¾ÑÑÑпа.
ÐÑогÑÐ°Ð¼Ð¼Ñ Ð² авÑомобиле "
-"неÑвободнÑ, <a
href=\"/philosophy/free-software-even-more-important.html"
-"\">ÑÑо знаÑиÑ, они ÑÑебÑÑÑ Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей
Ñлепой веÑÑ</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Even if no one connects to the car remotely, the cell phone modem enables "
-"the phone company to track the car's movements all the time; it is possible "
-"to physically remove the cell phone modem though."
+"A bug in the iThings Messages app <a href=\"https://theintercept."
+"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
+"a malicious web site to extract all the user's messaging history</a>."
msgstr ""
-"Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой "
-"ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ "
-"авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи."
+"ÐÑибка в Messages, пÑиложении Ð´Ð»Ñ Ð°Ð¹-ÑÑÑÑек, <a
href=\"https://theintercept."
+"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\"> "
+"позволила вÑедоноÑÐ½Ð¾Ð¼Ñ ÑайÑÑ Ð¸Ð·Ð²Ð»ÐµÑÑ Ð²ÑÑ
иÑÑоÑÐ¸Ñ ÑообÑений полÑзоваÑелÑ</a>."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | Malware {+was+} found on <a
+# |
href=\"http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html\">{+
+# | +}security cameras available through Amazon</a>.
+#, fuzzy
#| msgid ""
#| "Malware found on <a href=\"http://www.slate.com/blogs/"
#| "future_tense/2016/04/11/"
#| "security_cameras_sold_through_amazon_have_malware_according_to_security."
#| "html\">security cameras available through Amazon</a>."
msgid ""
-"Malware found on <a href=\"http://www.slate.com/blogs/"
+"Malware was found on <a href=\"http://www.slate.com/blogs/"
"future_tense/2016/04/11/"
"security_cameras_sold_through_amazon_have_malware_according_to_security.html"
-"\">security cameras available through Amazon</a>."
+"\"> security cameras available through Amazon</a>."
msgstr ""
"<a href=\"http://www.slate.com/blogs/future_tense/2016/04/11/"
"security_cameras_sold_through_amazon_have_malware_according_to_security.html"
@@ -696,20 +683,42 @@
"оÑноÑении Ñоже не пÑедÑÑавлÑÑÑ ÑгÑозÑ."
#. type: Content of: <ul><li><p>
+# | Over 70 brands of network-connected surveillance cameras {+have+} <a
+# |
[-href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">have-]
+# |
{+href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">+}
+# | security bugs that allow anyone to watch through them</a>.
+#, fuzzy
+#| msgid ""
+#| "Over 70 brands of network-connected surveillance cameras <a href=\"http://"
+#| "www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
+#| "\">have security bugs that allow anyone to watch through them</a>."
msgid ""
-"A bug in the iThings Messages app <a href=\"https://theintercept."
-"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
-"a malicious web site to extract all the user's messaging history</a>."
+"Over 70 brands of network-connected surveillance cameras have <a href="
+"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
+"html\"> security bugs that allow anyone to watch through them</a>."
msgstr ""
-"ÐÑибка в Messages, пÑиложении Ð´Ð»Ñ Ð°Ð¹-ÑÑÑÑек, <a
href=\"https://theintercept."
-"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\"> "
-"позволила вÑедоноÑÐ½Ð¾Ð¼Ñ ÑайÑÑ Ð¸Ð·Ð²Ð»ÐµÑÑ Ð²ÑÑ
иÑÑоÑÐ¸Ñ ÑообÑений полÑзоваÑелÑ</a>."
+"РкамеÑаÑ
наблÑÐ´ÐµÐ½Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ 70 маÑок <a
href=\"http://www.kerneronsec."
+"com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">обнаÑÑженÑ
недоÑеÑÑ "
+"безопаÑноÑÑи, позволÑÑÑие ÐºÐ¾Ð¼Ñ Ñгодно
подглÑдÑваÑÑ ÑеÑез ниÑ
</a>."
#. type: Content of: <ul><li><p>
+# | Many proprietary payment apps <a
+# |
href=\"http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data\">[-
+# | -]transmit personal data in an insecure way</a>. However, the worse aspect
+# | of these apps is that <a
+# | href=\"/philosophy/surveillance-vs-democracy.html\">payment is not
+# | anonymous</a>.
+#, fuzzy
+#| msgid ""
+#| "Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
+#| "articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
+#| "securing-user-data\"> transmit personal data in an insecure way</a>. "
+#| "However, the worse aspect of these apps is that <a href=\"/philosophy/"
+#| "surveillance-vs-democracy.html\">payment is not anonymous</a>."
msgid ""
"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
-"user-data\"> transmit personal data in an insecure way</a>. However, the "
+"user-data\">transmit personal data in an insecure way</a>. However, the "
"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
"democracy.html\">payment is not anonymous</a>."
msgstr ""
@@ -720,7 +729,58 @@
"democracy.html\">плаÑежи не анонимнÑ</a>."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+msgid ""
+"The Nissan Leaf has a built-in cell phone modem which allows effectively "
+"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
+"nissan/\">to access its computers remotely and make changes in various "
+"settings</a>."
+msgstr ""
+"Ð Nissan Leaf еÑÑÑ Ð²ÑÑÑоеннÑй ÑелеÑоннÑй модем,
позволÑÑÑий ÑакÑиÑеÑки ÐºÐ¾Ð¼Ñ "
+"Ñгодно <a
href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
+"nissan/\">полÑÑаÑÑ ÑдаленнÑй доÑÑÑп к
компÑÑÑеÑам и вноÑиÑÑ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² "
+"ÑазлиÑнÑе наÑÑÑойки</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"That's easy to do because the system has no authentication when accessed "
+"through the modem. However, even if it asked for authentication, you "
+"couldn't be confident that Nissan has no access. The software in the car is "
+"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
+"\">which means it demands blind faith from its users</a>."
+msgstr ""
+"ÐÑо неÑÑÑдно поÑомÑ, ÑÑо в ÑиÑÑеме неÑ
пÑовеÑки подлинноÑÑи полÑзоваÑÐµÐ»Ñ Ð¿Ñи "
+"доÑÑÑпе по модемÑ. Ðднако даже еÑли бÑ
модем пÑоводил пÑовеÑкÑ, нелÑÐ·Ñ Ð±Ñло "
+"Ð±Ñ Ð±ÑÑÑ ÑвеÑеннÑми, ÑÑо Ñ Nissan Ð½ÐµÑ Ð´Ð¾ÑÑÑпа.
ÐÑогÑÐ°Ð¼Ð¼Ñ Ð² авÑомобиле "
+"неÑвободнÑ, <a
href=\"/philosophy/free-software-even-more-important.html"
+"\">ÑÑо знаÑиÑ, они ÑÑебÑÑÑ Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей
Ñлепой веÑÑ</a>."
+
+#. type: Content of: <ul><li><p>
+# | Even if no one connects to the car remotely, the cell phone modem enables
+# | the phone company to track the car's movements all the time; it is
+# | possible to physically remove the cell phone modem{+,+} though.
+#, fuzzy
+#| msgid ""
+#| "Even if no one connects to the car remotely, the cell phone modem enables "
+#| "the phone company to track the car's movements all the time; it is "
+#| "possible to physically remove the cell phone modem though."
+msgid ""
+"Even if no one connects to the car remotely, the cell phone modem enables "
+"the phone company to track the car's movements all the time; it is possible "
+"to physically remove the cell phone modem, though."
+msgstr ""
+"Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой "
+"ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ "
+"авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи."
+
+#. type: Content of: <ul><li><p>
+# | FitBit fitness trackers [-<a
+# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">-]
+# | have a {+<a
+# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">+}
+# | Bluetooth vulnerability</a> that allows attackers to send malware to the
+# | devices, which can subsequently spread to computers and other FitBit
+# | trackers that interact with them.
+#, fuzzy
#| msgid ""
#| "FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-"
#| "security/latest-security-news/10-second-hack-delivers-first-ever-malware-"
@@ -728,9 +788,9 @@
#| "attackers to send malware to the devices, which can subsequently spread "
#| "to computers and other FitBit trackers that interact with them."
msgid ""
-"FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-security/"
-"latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-"
-"trackers/\"> have a Bluetooth vulnerability</a> that allows attackers to "
+"FitBit fitness trackers have a <a href=\"http://www.tripwire.com/state-of-"
+"security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-"
+"fitness-trackers/\"> Bluetooth vulnerability</a> that allows attackers to "
"send malware to the devices, which can subsequently spread to computers and "
"other FitBit trackers that interact with them."
msgstr ""
@@ -741,7 +801,12 @@
"компÑÑÑеÑам и дÑÑгим ÑÑÑÑойÑÑвам FitBit, Ñ
коÑоÑÑми они взаимодейÑÑвÑÑÑ."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | “Self-encrypting” disk drives do the encryption with
+# | proprietary firmware so you can't trust it. Western Digital's “My
+# | Passport” drives <a
+# |
href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">{+
+# | +}have a back door</a>.
+#, fuzzy
#| msgid ""
#| "“Self-encrypting” disk drives do the encryption with "
#| "proprietary firmware so you can't trust it. Western Digital's “My "
@@ -752,8 +817,8 @@
"“Self-encrypting” disk drives do the encryption with proprietary "
"firmware so you can't trust it. Western Digital's “My Passport” "
"drives <a href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-"
-"popular-self-encrypting-hard-drives-have-really-bad-encryption\">have a back "
-"door</a>."
+"popular-self-encrypting-hard-drives-have-really-bad-encryption\"> have a "
+"back door</a>."
msgstr ""
"“СамоÑиÑÑÑÑÑиеÑÑ” жеÑÑкие диÑки
ÑиÑÑÑÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð½ÐµÑвободнÑÑ
"
"внÑÑÑенниÑ
пÑогÑамм, Ñак ÑÑо Ð²Ñ Ð½Ðµ можеÑе
им довеÑÑÑÑ. У диÑков “My "
@@ -763,18 +828,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
-"door for 4 years</a>, which could be exploited by attackers to gain root "
-"privileges."
-msgstr ""
-"Ð Mac OS X <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\"> в ÑеÑение
4 Ð»ÐµÑ "
-"пÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>,
коÑоÑÑм взломÑики могли "
-"воÑполÑзоваÑÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ Ð¿Ñава
админиÑÑÑаÑоÑа."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
@@ -788,30 +841,27 @@
#. type: Content of: <ul><li><p>
# | Crackers were able to <a
-# |
href=\"http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">[-
-# | -]take remote control of the Jeep</a> “connected car”.
+# |
href=\"http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">{+
+# | +}take remote control of the Jeep</a> “connected car”. {+They
+# | could track the car, start or stop the engine, and activate or deactivate
+# | the brakes, and more.+}
+#, fuzzy
#| msgid ""
#| "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
-#| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> "
-#| "take remote control of the Jeep</a> “connected car”."
+#| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"
+#| "\">take remote control of the Jeep</a> “connected car”."
msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
-"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take "
-"remote control of the Jeep</a> “connected car”."
+"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> take "
+"remote control of the Jeep</a> “connected car”. They could track "
+"the car, start or stop the engine, and activate or deactivate the brakes, "
+"and more."
msgstr ""
"ÐзломÑикам ÑдалоÑÑ <a
href=\"http://arstechnica.com/security/2015/07/fiat-"
"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">
полÑÑиÑÑ "
"ÑдаленнÑй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ джипом</a> “Ñ
Ñоединением”."
#. type: Content of: <ul><li><p>
-msgid ""
-"They could track the car, start or stop the engine, and activate or "
-"deactivate the brakes, and more."
-msgstr ""
-"Ðни могли ÑледиÑÑ Ð·Ð° авÑомобилем,
запÑÑкаÑÑ Ð¸ оÑÑанавливаÑÑ Ð´Ð²Ð¸Ð³Ð°ÑелÑ, "
-"вклÑÑаÑÑ Ð¸ вÑклÑÑаÑÑ ÑоÑмоз, а Ñакже
многое дÑÑгое."
-
-#. type: Content of: <ul><li><p>
msgid "I expect that Chrysler and the NSA can do this too."
msgstr "Я дÑмаÑ, ÑÑо ÐÑайÑÐ»ÐµÑ Ð¸ ÐÐÐ Ñоже ÑÑо
могÑÑ."
@@ -824,6 +874,56 @@
"вÑклÑÑÑ."
#. type: Content of: <ul><li><p>
+# | Due to bad security in a drug pump, crackers could use it to <a
+# |
href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/\">{+
+# | +}kill patients</a>.
+#, fuzzy
+#| msgid ""
+#| "Due to bad security in a drug pump, crackers could use it to <a href="
+#| "\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
+#| "pumps/\">kill patients</a>."
+msgid ""
+"Due to bad security in a drug pump, crackers could use it to <a href="
+"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
+"pumps/\"> kill patients</a>."
+msgstr ""
+"Ðз-за плоÑ
ой заÑиÑÑ Ð² инÑÑзионном наÑоÑе
взломÑики могÑÑ Ð¸ÑполÑзоваÑÑ ÐµÐ³Ð¾ "
+"Ð´Ð»Ñ <a href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-"
+"hospital-drug-pumps/\">ÑбийÑÑва паÑиенÑов</a>."
+
+#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html\">
+# | Many smartphone apps use insecure authentication methods when storing your
+# | personal data on remote [-servers.</a>-] {+servers</a>.+} This leaves
+# | personal information like email addresses, passwords, and health
+# | information vulnerable. Because many of these apps are proprietary it
+# | makes it hard to impossible to know which apps are at risk.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-"
+#| "millions-users.html\"> Many smartphone apps use insecure authentication "
+#| "methods when storing your personal data on remote servers.</a> This "
+#| "leaves personal information like email addresses, passwords, and health "
+#| "information vulnerable. Because many of these apps are proprietary it "
+#| "makes it hard to impossible to know which apps are at risk."
+msgid ""
+"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
+"users.html\"> Many smartphone apps use insecure authentication methods when "
+"storing your personal data on remote servers</a>. This leaves personal "
+"information like email addresses, passwords, and health information "
+"vulnerable. Because many of these apps are proprietary it makes it hard to "
+"impossible to know which apps are at risk."
+msgstr ""
+"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
+"users.html\"> Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑмаÑÑÑонов
пÑименÑÑÑ Ð½ÐµÐ±ÐµÐ·Ð¾Ð¿Ð°ÑнÑе меÑÐ¾Ð´Ñ "
+"аÑÑенÑиÑикаÑии пÑи Ñ
Ñанении ваÑиÑ
лиÑнÑÑ
даннÑÑ
на ÑдаленнÑÑ
ÑеÑвеÑаÑ
.</a> "
+"ÐÑо подвеÑÐ³Ð°ÐµÑ Ð¾Ð¿Ð°ÑноÑÑи ÑакÑÑ Ð»Ð¸ÑнÑÑ
инÑоÑмаÑиÑ, как адÑеÑа ÑлекÑÑонной "
+"поÑÑÑ, паÑоли, а Ñакже медиÑинÑкие даннÑе.
ÐоÑколÑÐºÑ Ð¼Ð½Ð¾Ð³Ð¸Ðµ из ÑÑиÑ
"
+"пÑиложений неÑвободнÑ, ÑÑÑдно, еÑли
вообÑе возможно, ÑзнаÑÑ, какие "
+"пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´Ð²ÐµÑÐ¶ÐµÐ½Ñ ÑÑомÑ."
+
+#. type: Content of: <ul><li><p>
msgid ""
"Hospira infusion pumps, which are used to administer drugs to a patient, "
"were rated “<a href=\"https://securityledger.com/2015/05/researcher-"
@@ -845,50 +945,67 @@
"паÑиенÑÑ ÑмеÑÑелÑнÑÑ Ð´Ð¾Ð·Ñ."
#. type: Content of: <ul><li><p>
+msgid ""
+"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
+"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
+"door for 4 years</a>, which could be exploited by attackers to gain root "
+"privileges."
+msgstr ""
+"Ð Mac OS X <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
+"backdoor-api-to-root-privileges-in-apple-os-x/\"> в ÑеÑение
4 Ð»ÐµÑ "
+"пÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>,
коÑоÑÑм взломÑики могли "
+"воÑполÑзоваÑÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ Ð¿Ñава
админиÑÑÑаÑоÑа."
+
+#. type: Content of: <ul><li><p>
# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
#| msgid ""
-#| "Due to bad security in a drug pump, crackers could use it to <a href="
-#| "\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
-#| "pumps/\">kill patients</a>."
+#| "An app to prevent “identity theft” (access to personal data) "
+#| "by storing users' data on a special server <a href=\"http://arstechnica."
+#| "com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-"
+#| "over-concerns-that-app-isnt-safe/\">was deactivated by its developer</a> "
+#| "which had discovered a security flaw."
msgid ""
-"Due to bad security in a drug pump, crackers could use it to <a href="
-"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
-"pumps/\">kill patients</a>."
+"An app to prevent “identity theft” (access to personal data) by "
+"storing users' data on a special server <a href=\"http://arstechnica.com/"
+"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
+"concerns-that-app-isnt-safe/\">was deactivated by its developer</a> which "
+"had discovered a security flaw."
msgstr ""
-"Ðз-за плоÑ
ой заÑиÑÑ Ð² инÑÑзионном наÑоÑе
взломÑики могÑÑ Ð¸ÑполÑзоваÑÑ ÐµÐ³Ð¾ "
-"Ð´Ð»Ñ <a href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-"
-"hospital-drug-pumps/\">ÑбийÑÑва паÑиенÑов</a>."
+"ÐÑиложение Ð´Ð»Ñ Ð¿ÑедоÑвÑаÑÐµÐ½Ð¸Ñ “кÑажи
лиÑноÑÑи” (доÑÑÑпа к лиÑнÑм "
+"даннÑм), Ñ
ÑанивÑее даннÑе полÑзоваÑÐµÐ»Ñ Ð½Ð°
оÑобом ÑеÑвеÑе, <a href=\"http://"
+"arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-"
+"data-over-concerns-that-app-isnt-safe/\">бÑло вÑклÑÑено
ÑазÑабоÑÑиком ÑÑого "
+"пÑиложениÑ</a>, коÑоÑÑй обнаÑÑжил бÑеÑÑ Ð²
заÑиÑе."
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
-"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
-"phones, including iPhones, Android, and BlackBerry</a>. While there is not "
-"much detail here, it seems that this does not operate via the universal back "
-"door that we know nearly all portable phones have. It may involve "
-"exploiting various bugs. There are <a href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> lots "
-"of bugs in the phones' radio software</a>."
-msgstr ""
-"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
-"spy-on-smart-phone-data-a-920971.html\"> ÐÐРможеÑ
заглÑдÑваÑÑ Ð² даннÑе на "
-"ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone, Android и
BlackBerry</a>. ХоÑÑ "
-"подÑобноÑÑи здеÑÑ Ð½Ðµ пÑиводÑÑÑÑ, поÑ
оже,
ÑÑо ÑабоÑÐ°ÐµÑ Ð½Ðµ как ÑнивеÑÑалÑнÑй "
-"ÑеÑнÑй Ñ
од, коÑоÑÑй, как Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ
поÑÑи во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
. "
-"ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑвÑзано Ñ ÑкÑплÑаÑаÑией
ÑазлиÑнÑÑ
оÑибок. <a href=\"http://"
-"www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> Ð
пÑогÑаммаÑ
"
-"ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво
оÑибок</a>."
+"That developer seems to be conscientious about protecting personal data from "
+"third parties in general, but it can't protect that data from the state. "
+"Quite the contrary: confiding your data to someone else's server, if not "
+"first encrypted by you with free software, undermines your rights."
+msgstr ""
+"ÐажеÑÑÑ, ÑÑÐ¾Ñ ÑазÑабоÑÑик добÑоÑовеÑÑно
заÑиÑÐ°ÐµÑ Ð»Ð¸ÑнÑе даннÑе Ð¾Ñ ÑÑеÑÑиÑ
"
+"ÑÑоÑон вообÑе, но он не Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°ÑиÑиÑÑ ÑÑи
даннÑе Ð¾Ñ Ð³Ð¾ÑÑдаÑÑÑва. СовÑем "
+"наобоÑоÑ: пеÑедаÑа ваÑиÑ
даннÑÑ
ÑÑжомÑ
ÑеÑвеÑÑ, еÑли Ð²Ñ Ð½Ðµ ÑиÑÑÑеÑе иÑ
"
+"пÑедваÑиÑелÑно Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑвободнÑÑ
пÑогÑамм, подÑÑÐ²Ð°ÐµÑ Ð²Ð°Ñи пÑава."
#. type: Content of: <ul><li><p>
+# | Lots of <a
+# | href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/\">{+
+# | +}hospital equipment has lousy security</a>, and it can be fatal.
+#, fuzzy
+#| msgid ""
+#| "Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-"
+#| "vulnerable/\">hospital equipment has lousy security</a>, and it can be "
+#| "fatal."
msgid ""
-"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
-"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
-"intrusion."
+"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
+"\"> hospital equipment has lousy security</a>, and it can be fatal."
msgstr ""
-"Ð ÑиÑÑÐµÐ¼Ñ <a
href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-"
-"homes-hack/\"> “инÑеллекÑÑалÑнÑÑ
домов”</a>,
оказÑваеÑÑÑ, до "
-"идиоÑизма легко пÑоникнÑÑÑ."
+"Ðного <a
href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
+"\">болÑниÑного обоÑÑÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð·Ð°ÑиÑено
паÑÑиво</a>, и ÑÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ "
+"ÑмеÑÑелÑно."
#. type: Content of: <ul><li><p>
msgid ""
@@ -901,103 +1018,50 @@
"Ð´ÐµÐ»Ð°ÐµÑ Ð¿Ð¾Ð´ÑлÑÑивание пÑоÑе пÑоÑÑого."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
-#| msgid ""
-#| "<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-"
-#| "flaw-put-users-lives-on-display.html\"> The FTC punished a company for "
-#| "making webcams with bad security so that it was easy for anyone to watch "
-#| "them</a>."
-msgid ""
-"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\"> The FTC punished a company for making "
-"webcams with bad security so that it was easy for anyone to watch them</a>."
-msgstr ""
-"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\"> ФедеÑалÑÐ½Ð°Ñ ÑоÑговаÑ
комиÑÑÐ¸Ñ Ð½Ð°ÐºÐ°Ð·Ð°Ð»Ð° "
-"ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð·Ð° пÑоизводÑÑво ÑеÑевÑÑ
камеÑ,
безопаÑноÑÑÑ ÐºÐ¾ÑоÑÑÑ
бÑла наÑÑолÑко "
-"плоÑ
а, ÑÑо каждÑй легко мог глÑдеÑÑ ÑеÑез
ниÑ
</a>."
-
-#. type: Content of: <ul><li><p>
-# | {+<a
-# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">+}
-# | It is possible to [-<a
-# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">-]
-# | take control of some car computers through malware in music files</a>.
-# | Also <a
-# | href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">by
-# | radio</a>. [-More information in-] {+Here is+} <a
-# | [-href=\"http://www.autosec.org/faq.html\"> Automotive Security And
-# | Privacy Center</a>.-] {+href=\"http://www.autosec.org/faq.html\">more
-# | information</a>.+}
-#| msgid ""
-#| "It is possible to <a href=\"http://www.pcworld.idg.com.au/article/379477/"
-#| "hacking_music_can_take_control_your_car/\"> take control of some car "
-#| "computers through malware in music files</a>. Also <a href=\"http://www."
-#| "nytimes.com/2011/03/10/business/10hack.html?_r=0\">by radio</a>. More "
-#| "information in <a href=\"http://www.autosec.org/faq.html\"> Automotive "
-#| "Security And Privacy Center</a>."
msgid ""
-"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\"> It is possible to take control "
-"of some car computers through malware in music files</a>. Also <a href="
-"\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">by radio</"
-"a>. Here is <a href=\"http://www.autosec.org/faq.html\">more information</"
-"a>."
+"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
+"have modifiable software</a>, which makes them vulnerable to viruses."
msgstr ""
-"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\"> Ðад некоÑоÑÑми
авÑомобилÑнÑми "
-"компÑÑÑеÑÑми можно полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ñ
помоÑÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в ÑайлаÑ
"
-"Ñ Ð¼ÑзÑкой</a>. Ð Ñакже <a
href=\"http://www.nytimes.com/2011/03/10/"
-"business/10hack.html?_r=0\">по Ñадио</a>. ÐÑÑгие
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи <a "
-"href=\"http://www.autosec.org/faq.html\">на ÑайÑе ЦенÑÑа
авÑомобилÑной "
-"безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>."
+"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> РнекоÑоÑÑÑ
видаÑ
"
+"поÑÑаÑивной памÑÑи еÑÑÑ Ð¿ÑогÑаммÑ,
коÑоÑÑе можно изменÑÑÑ</a>. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ Ð¸Ñ
"
+"ÑÑзвимÑми Ð´Ð»Ñ Ð²Ð¸ÑÑÑов."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | We don't call this a “back door” because it is normal that you
+# | can install a new system in a computer{+,+} given physical access to it.
+# | However, memory sticks and cards should not be modifiable in this way.
+#, fuzzy
#| msgid ""
-#| "<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-"
-#| "jack-dies-days-before-scheduled-black-hat-appearance/\"> It is possible "
-#| "to kill people by taking control of medical implants by radio</a>. Here "
-#| "is <a href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
-#| "information</a>. And <a href=\"https://web.archive.org/"
-#| "web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-"
-#| "plausible-was.html\">here</a>."
+#| "We don't call this a “back door” because it is normal that "
+#| "you can install a new system in a computer given physical access to it. "
+#| "However, memory sticks and cards should not be modifiable in this way."
msgid ""
-"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
-"dies-days-before-scheduled-black-hat-appearance/\"> It is possible to kill "
-"people by taking control of medical implants by radio</a>. Here is <a href="
-"\"http://www.bbc.co.uk/news/technology-17631838\">more information</a>. And "
-"<a href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive."
-"com/2013/02/broken-hearts-how-plausible-was.html\">here</a>."
+"We don't call this a “back door” because it is normal that you "
+"can install a new system in a computer, given physical access to it. "
+"However, memory sticks and cards should not be modifiable in this way."
msgstr ""
-"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
-"dies-days-before-scheduled-black-hat-appearance/\"> ÐолÑÑив
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ "
-"вживленнÑми медиÑинÑкими ÑÑÑÑойÑÑвами по
Ñадио, можно ÑбиваÑÑ Ð»Ñдей</a>. "
-"ÐодÑобноÑÑи Ñм. <a
href=\"http://www.bbc.co.uk/news/technology-17631838\"> "
-"на ÑайÑе Ðи-Ðи-Си</a> и <a
href=\"https://web.archive.org/web/20180203130244/"
-"http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\"> в "
-"блоге IOActive</a>."
+"ÐÑ Ð½Ðµ назÑваем ÑÑо “ÑеÑнÑм Ñ
одом”,
поÑÐ¾Ð¼Ñ ÑÑо когда Ð²Ñ Ð¿Ð¾Ð»ÑÑаеÑе "
+"ÑизиÑеÑкий доÑÑÑп к компÑÑÑеÑÑ, вÑ, как
пÑавило, можеÑе ÑÑÑановиÑÑ Ð½Ð° нем "
+"новÑÑ ÑиÑÑемÑ. Ðднако Ñ ÐºÐ°ÑÑ Ð¿Ð°Ð¼ÑÑи и
дÑÑгиÑ
ноÑиÑелей не должно бÑÑÑ "
+"возможноÑÑи ÑакиÑ
изменений."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | <a
+# |
href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/\">
+# | Point-of-sale terminals running Windows were taken [-over-] {+over</a>+}
+# | and turned into a botnet for the purpose of collecting customers' credit
+# | card [-numbers</a>.-] {+numbers.+}
+#, fuzzy
#| msgid ""
-#| "Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-"
-#| "vulnerable/\">hospital equipment has lousy security</a>, and it can be "
-#| "fatal."
-msgid ""
-"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
-"\">hospital equipment has lousy security</a>, and it can be fatal."
-msgstr ""
-"Ðного <a
href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
-"\">болÑниÑного обоÑÑÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð·Ð°ÑиÑено
паÑÑиво</a>, и ÑÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ "
-"ÑмеÑÑелÑно."
-
-#. type: Content of: <ul><li><p>
+#| "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
+#| "of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
+#| "running Windows were taken over and turned into a botnet for the purpose "
+#| "of collecting customers' credit card numbers</a>."
msgid ""
"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
"age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
-"running Windows were taken over and turned into a botnet for the purpose of "
-"collecting customers' credit card numbers</a>."
+"running Windows were taken over</a> and turned into a botnet for the purpose "
+"of collecting customers' credit card numbers."
msgstr ""
"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
"age-with-first-known-point-of-sale-botnet/\"> ТеÑÐ¼Ð¸Ð½Ð°Ð»Ñ Ð²
меÑÑаÑ
пÑодаж, "
@@ -1005,65 +1069,86 @@
"ÑбоÑа номеÑов кÑедиÑнÑÑ
каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов</a>."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | <a
+# |
[-href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">-]
+# |
{+href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">+}
+# | The NSA can tap data in smart phones, including iPhones, Android, and
+# | BlackBerry</a>. While there is not much detail here, it seems that this
+# | does not operate via the universal back door that we know nearly all
+# | portable phones have. It may involve exploiting various bugs. There are
+# | <a
+# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# | lots of bugs in the phones' radio software</a>.
+#, fuzzy
#| msgid ""
-#| "An app to prevent “identity theft” (access to personal data) "
-#| "by storing users' data on a special server <a href=\"http://arstechnica."
-#| "com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-"
-#| "over-concerns-that-app-isnt-safe/\">was deactivated by its developer</a> "
-#| "which had discovered a security flaw."
-msgid ""
-"An app to prevent “identity theft” (access to personal data) by "
-"storing users' data on a special server <a href=\"http://arstechnica.com/"
-"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
-"concerns-that-app-isnt-safe/\">was deactivated by its developer</a> which "
-"had discovered a security flaw."
+#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#| "smart phones, including iPhones, Android, and BlackBerry</a>. While "
+#| "there is not much detail here, it seems that this does not operate via "
+#| "the universal back door that we know nearly all portable phones have. It "
+#| "may involve exploiting various bugs. There are <a href=\"http://www."
+#| "osnews.com/story/27416/"
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs "
+#| "in the phones' radio software</a>."
+msgid ""
+"<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/"
+"international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971."
+"html\"> The NSA can tap data in smart phones, including iPhones, Android, "
+"and BlackBerry</a>. While there is not much detail here, it seems that this "
+"does not operate via the universal back door that we know nearly all "
+"portable phones have. It may involve exploiting various bugs. There are <a "
+"href=\"http://www.osnews.com/story/27416/"
+"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
+"the phones' radio software</a>."
msgstr ""
-"ÐÑиложение Ð´Ð»Ñ Ð¿ÑедоÑвÑаÑÐµÐ½Ð¸Ñ “кÑажи
лиÑноÑÑи” (доÑÑÑпа к лиÑнÑм "
-"даннÑм), Ñ
ÑанивÑее даннÑе полÑзоваÑÐµÐ»Ñ Ð½Ð°
оÑобом ÑеÑвеÑе, <a href=\"http://"
-"arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-"
-"data-over-concerns-that-app-isnt-safe/\">бÑло вÑклÑÑено
ÑазÑабоÑÑиком ÑÑого "
-"пÑиложениÑ</a>, коÑоÑÑй обнаÑÑжил бÑеÑÑ Ð²
заÑиÑе."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"That developer seems to be conscientious about protecting personal data from "
-"third parties in general, but it can't protect that data from the state. "
-"Quite the contrary: confiding your data to someone else's server, if not "
-"first encrypted by you with free software, undermines your rights."
-msgstr ""
-"ÐажеÑÑÑ, ÑÑÐ¾Ñ ÑазÑабоÑÑик добÑоÑовеÑÑно
заÑиÑÐ°ÐµÑ Ð»Ð¸ÑнÑе даннÑе Ð¾Ñ ÑÑеÑÑиÑ
"
-"ÑÑоÑон вообÑе, но он не Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°ÑиÑиÑÑ ÑÑи
даннÑе Ð¾Ñ Ð³Ð¾ÑÑдаÑÑÑва. СовÑем "
-"наобоÑоÑ: пеÑедаÑа ваÑиÑ
даннÑÑ
ÑÑжомÑ
ÑеÑвеÑÑ, еÑли Ð²Ñ Ð½Ðµ ÑиÑÑÑеÑе иÑ
"
-"пÑедваÑиÑелÑно Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑвободнÑÑ
пÑогÑамм, подÑÑÐ²Ð°ÐµÑ Ð²Ð°Ñи пÑава."
+"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
+"spy-on-smart-phone-data-a-920971.html\"> ÐÐРможеÑ
заглÑдÑваÑÑ Ð² даннÑе на "
+"ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone, Android и
BlackBerry</a>. ХоÑÑ "
+"подÑобноÑÑи здеÑÑ Ð½Ðµ пÑиводÑÑÑÑ, поÑ
оже,
ÑÑо ÑабоÑÐ°ÐµÑ Ð½Ðµ как ÑнивеÑÑалÑнÑй "
+"ÑеÑнÑй Ñ
од, коÑоÑÑй, как Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ
поÑÑи во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
. "
+"ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑвÑзано Ñ ÑкÑплÑаÑаÑией
ÑазлиÑнÑÑ
оÑибок. <a href=\"http://"
+"www.osnews.com/story/27416/"
+"The_second_operating_system_hiding_in_every_mobile_phone\"> Ð
пÑогÑаммаÑ
"
+"ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво
оÑибок</a>."
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
-"have modifiable software</a>, which makes them vulnerable to viruses."
+"<a href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-"
+"codes-security\">The NSA has put back doors into nonfree encryption "
+"software</a>. We don't know which ones they are, but we can be sure they "
+"include some widely used systems. This reinforces the point that you can "
+"never trust the security of nonfree software."
msgstr ""
-"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> РнекоÑоÑÑÑ
видаÑ
"
-"поÑÑаÑивной памÑÑи еÑÑÑ Ð¿ÑогÑаммÑ,
коÑоÑÑе можно изменÑÑÑ</a>. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ Ð¸Ñ
"
-"ÑÑзвимÑми Ð´Ð»Ñ Ð²Ð¸ÑÑÑов."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | [-<a
+# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">-]The
+# | FTC punished a company for making webcams with {+<a
+# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">+}
+# | bad security so that it was easy for anyone to watch {+through+} them</a>.
+#, fuzzy
#| msgid ""
-#| "We don't call this a “back door” because it is normal that "
-#| "you can install a new system in a computer given physical access to it. "
-#| "However, memory sticks and cards should not be modifiable in this way."
+#| "<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-"
+#| "flaw-put-users-lives-on-display.html\"> The FTC punished a company for "
+#| "making webcams with bad security so that it was easy for anyone to watch "
+#| "them</a>."
msgid ""
-"We don't call this a “back door” because it is normal that you "
-"can install a new system in a computer given physical access to it. "
-"However, memory sticks and cards should not be modifiable in this way."
+"The FTC punished a company for making webcams with <a href=\"http://www."
+"nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-"
+"display.html\"> bad security so that it was easy for anyone to watch through "
+"them</a>."
msgstr ""
-"ÐÑ Ð½Ðµ назÑваем ÑÑо “ÑеÑнÑм Ñ
одом”,
поÑÐ¾Ð¼Ñ ÑÑо когда Ð²Ñ Ð¿Ð¾Ð»ÑÑаеÑе "
-"ÑизиÑеÑкий доÑÑÑп к компÑÑÑеÑÑ, вÑ, как
пÑавило, можеÑе ÑÑÑановиÑÑ Ð½Ð° нем "
-"новÑÑ ÑиÑÑемÑ. Ðднако Ñ ÐºÐ°ÑÑ Ð¿Ð°Ð¼ÑÑи и
дÑÑгиÑ
ноÑиÑелей не должно бÑÑÑ "
-"возможноÑÑи ÑакиÑ
изменений."
+"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
+"put-users-lives-on-display.html\"> ФедеÑалÑÐ½Ð°Ñ ÑоÑговаÑ
комиÑÑÐ¸Ñ Ð½Ð°ÐºÐ°Ð·Ð°Ð»Ð° "
+"ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð·Ð° пÑоизводÑÑво ÑеÑевÑÑ
камеÑ,
безопаÑноÑÑÑ ÐºÐ¾ÑоÑÑÑ
бÑла наÑÑолÑко "
+"плоÑ
а, ÑÑо каждÑй легко мог глÑдеÑÑ ÑеÑез
ниÑ
</a>."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | <a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable
+# | nonfree software in disk drives can be written by a nonfree
+# | [-program.</a>-] {+program</a>.+} This makes any system vulnerable to
+# | persistent attacks that normal forensics won't detect.
+#, fuzzy
#| msgid ""
#| "<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
#| "nonfree software in disk drives can be written by a nonfree program.</a> "
@@ -1071,7 +1156,7 @@
#| "forensics won't detect."
msgid ""
"<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
-"nonfree software in disk drives can be written by a nonfree program.</a> "
+"nonfree software in disk drives can be written by a nonfree program</a>. "
"This makes any system vulnerable to persistent attacks that normal forensics "
"won't detect."
msgstr ""
@@ -1081,29 +1166,100 @@
"необнаÑÑжимÑÑ
обÑÑнÑми ÑÑедÑÑвами."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | [-<a
+# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">-]It
+# | is possible to {+<a
+# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">+}
+# | kill people by taking control of medical implants by radio</a>. [-Here
+# | is-] {+More information in+} <a
+# | [-href=\"http://www.bbc.co.uk/news/technology-17631838\">more
+# | information</a>. And-]
+# | {+href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a>
+# | and+} <a
+# |
[-href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">here</a>.-]
+# |
{+href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">
+# | IOActive Labs Research blog</a>.+}
+#, fuzzy
#| msgid ""
-#| "<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-"
-#| "millions-users.html\"> Many smartphone apps use insecure authentication "
-#| "methods when storing your personal data on remote servers.</a> This "
-#| "leaves personal information like email addresses, passwords, and health "
-#| "information vulnerable. Because many of these apps are proprietary it "
-#| "makes it hard to impossible to know which apps are at risk."
+#| "<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-"
+#| "jack-dies-days-before-scheduled-black-hat-appearance/\"> It is possible "
+#| "to kill people by taking control of medical implants by radio</a>. Here "
+#| "is <a href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
+#| "information</a>. And <a href=\"https://web.archive.org/"
+#| "web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-"
+#| "plausible-was.html\">here</a>."
msgid ""
-"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
-"users.html\"> Many smartphone apps use insecure authentication methods when "
-"storing your personal data on remote servers.</a> This leaves personal "
-"information like email addresses, passwords, and health information "
-"vulnerable. Because many of these apps are proprietary it makes it hard to "
-"impossible to know which apps are at risk."
+"It is possible to <a href=\"http://siliconangle.com/blog/2013/07/27/famed-"
+"hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\"> kill "
+"people by taking control of medical implants by radio</a>. More information "
+"in <a href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a> "
+"and <a href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-"
+"was.html\"> IOActive Labs Research blog</a>."
msgstr ""
-"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
-"users.html\"> Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑмаÑÑÑонов
пÑименÑÑÑ Ð½ÐµÐ±ÐµÐ·Ð¾Ð¿Ð°ÑнÑе меÑÐ¾Ð´Ñ "
-"аÑÑенÑиÑикаÑии пÑи Ñ
Ñанении ваÑиÑ
лиÑнÑÑ
даннÑÑ
на ÑдаленнÑÑ
ÑеÑвеÑаÑ
.</a> "
-"ÐÑо подвеÑÐ³Ð°ÐµÑ Ð¾Ð¿Ð°ÑноÑÑи ÑакÑÑ Ð»Ð¸ÑнÑÑ
инÑоÑмаÑиÑ, как адÑеÑа ÑлекÑÑонной "
-"поÑÑÑ, паÑоли, а Ñакже медиÑинÑкие даннÑе.
ÐоÑколÑÐºÑ Ð¼Ð½Ð¾Ð³Ð¸Ðµ из ÑÑиÑ
"
-"пÑиложений неÑвободнÑ, ÑÑÑдно, еÑли
вообÑе возможно, ÑзнаÑÑ, какие "
-"пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´Ð²ÐµÑÐ¶ÐµÐ½Ñ ÑÑомÑ."
+"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
+"dies-days-before-scheduled-black-hat-appearance/\"> ÐолÑÑив
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ "
+"вживленнÑми медиÑинÑкими ÑÑÑÑойÑÑвами по
Ñадио, можно ÑбиваÑÑ Ð»Ñдей</a>. "
+"ÐодÑобноÑÑи Ñм. <a
href=\"http://www.bbc.co.uk/news/technology-17631838\"> "
+"на ÑайÑе Ðи-Ðи-Си</a> и <a
href=\"https://web.archive.org/web/20180203130244/"
+"http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\"> в "
+"блоге IOActive</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
+"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
+"intrusion."
+msgstr ""
+"Ð ÑиÑÑÐµÐ¼Ñ <a
href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-"
+"homes-hack/\"> “инÑеллекÑÑалÑнÑÑ
домов”</a>,
оказÑваеÑÑÑ, до "
+"идиоÑизма легко пÑоникнÑÑÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
+"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
+"microphone-cameras.html\"> Crackers found a way to break security on a "
+"“smart” TV</a> and use its camera to watch the people who are "
+"watching TV."
+msgstr ""
+"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
+"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
+"microphone-cameras.html\"> ÐзломÑики наÑли ÑпоÑоб
вÑкÑÑÑÑ Ð·Ð°ÑиÑÑ Ð² “"
+"инÑеллекÑÑалÑном” ÑелевизоÑе</a> и
воÑполÑзоваÑÑÑÑ ÐµÐ³Ð¾ видеокамеÑой, "
+"ÑÑÐ¾Ð±Ñ ÑмоÑÑеÑÑ Ð½Ð° лÑдей, коÑоÑÑе ÑмоÑÑÑÑ
ÑелевизоÑ."
+
+#. type: Content of: <ul><li><p>
+# | [-<a
+# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">-]It
+# | is possible to take control of some car computers through {+<a
+# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">+}
+# | malware in music files</a>. Also <a
+# | href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">{+
+# | +}by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html\">more
+# | information</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+#| "hacking_music_can_take_control_your_car/\"> It is possible to take "
+#| "control of some car computers through malware in music files</a>. Also "
+#| "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+#| "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+#| "\">more information</a>."
+msgid ""
+"It is possible to take control of some car computers through <a href="
+"\"http://www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\"> malware in music files</a>. "
+"Also <a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+"_r=0\"> by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+"\">more information</a>."
+msgstr ""
+"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\"> Ðад некоÑоÑÑми
авÑомобилÑнÑми "
+"компÑÑÑеÑÑми можно полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ñ
помоÑÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в ÑайлаÑ
"
+"Ñ Ð¼ÑзÑкой</a>. Ð Ñакже <a
href=\"http://www.nytimes.com/2011/03/10/"
+"business/10hack.html?_r=0\">по Ñадио</a>. ÐÑÑгие
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи <a "
+"href=\"http://www.autosec.org/faq.html\">на ÑайÑе ЦенÑÑа
авÑомобилÑной "
+"безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>."
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
@@ -1181,17 +1337,19 @@
msgid "Updated:"
msgstr "Ðбновлено:"
-#, fuzzy
-#~| msgid ""
-#~| "Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
-#~| "articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
-#~| "securing-user-data\"> transmit personal data in an insecure way</a>. "
-#~| "However, the worse aspect of these apps is that <a href=\"/philosophy/"
-#~| "surveillance-vs-democracy.html\">payment is not anonymous</a>."
+#~ msgid ""
+#~ "Even if no one connects to the car remotely, the cell phone modem enables "
+#~ "the phone company to track the car's movements all the time; it is "
+#~ "possible to physically remove the cell phone modem though."
+#~ msgstr ""
+#~ "Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой "
+#~ "ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ "
+#~ "авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки
ÑдалиÑÑ Ð¼Ð¾Ð´ÐµÐ¼ ÑоÑовой ÑвÑзи."
+
#~ msgid ""
#~ "Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
#~ "articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
-#~ "securing-user-data\">transmit personal data in an insecure way</a>. "
+#~ "securing-user-data\"> transmit personal data in an insecure way</a>. "
#~ "However, the worse aspect of these apps is that <a href=\"/philosophy/"
#~ "surveillance-vs-democracy.html\">payment is not anonymous</a>."
#~ msgstr ""
@@ -1201,72 +1359,34 @@
#~ "еÑе Ñ
Ñже Ñо, ÑÑо в ÑÑиÑ
пÑиложениÑÑ
<a
href=\"/philosophy/surveillance-vs-"
#~ "democracy.html\">плаÑежи не анонимнÑ</a>."
-#, fuzzy
-#~| msgid ""
-#~| "Even if no one connects to the car remotely, the cell phone modem "
-#~| "enables the phone company to track the car's movements all the time; it "
-#~| "is possible to physically remove the cell phone modem though."
-#~ msgid ""
-#~ "Even if no one connects to the car remotely, the cell phone modem enables "
-#~ "the phone company to track the car's movements all the time; it is "
-#~ "possible to physically remove the cell phone modem, though."
-#~ msgstr ""
-#~ "Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой "
-#~ "ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ "
-#~ "авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки
ÑдалиÑÑ Ð¼Ð¾Ð´ÐµÐ¼ ÑоÑовой ÑвÑзи."
-
-#, fuzzy
#~| msgid ""
#~| "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
-#~| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"
-#~| "\">take remote control of the Jeep</a> “connected car”."
+#~| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> "
+#~| "take remote control of the Jeep</a> “connected car”."
#~ msgid ""
#~ "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
-#~ "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> "
-#~ "take remote control of the Jeep</a> “connected car”. They "
-#~ "could track the car, start or stop the engine, and activate or deactivate "
-#~ "the brakes, and more."
+#~ "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"
+#~ "\">take remote control of the Jeep</a> “connected car”."
#~ msgstr ""
#~ "ÐзломÑикам ÑдалоÑÑ <a
href=\"http://arstechnica.com/security/2015/07/fiat-"
#~ "chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> "
#~ "полÑÑиÑÑ ÑдаленнÑй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
джипом</a> “Ñ Ñоединением”."
-#, fuzzy
-#~| msgid ""
-#~| "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-"
-#~| "comes-of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale "
-#~| "terminals running Windows were taken over and turned into a botnet for "
-#~| "the purpose of collecting customers' credit card numbers</a>."
#~ msgid ""
-#~ "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
-#~ "of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
-#~ "running Windows were taken over</a> and turned into a botnet for the "
-#~ "purpose of collecting customers' credit card numbers."
+#~ "They could track the car, start or stop the engine, and activate or "
+#~ "deactivate the brakes, and more."
#~ msgstr ""
-#~ "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
-#~ "of-age-with-first-known-point-of-sale-botnet/\"> ТеÑÐ¼Ð¸Ð½Ð°Ð»Ñ Ð²
меÑÑаÑ
"
-#~ "пÑодаж, ÑабоÑаÑÑие под ÑпÑавлением Windows,
бÑли обÑаÑÐµÐ½Ñ "
-#~ "злоÑмÑÑленниками в ÑеÑÑ ÑбоÑа номеÑов
кÑедиÑнÑÑ
каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов</a>."
+#~ "Ðни могли ÑледиÑÑ Ð·Ð° авÑомобилем,
запÑÑкаÑÑ Ð¸ оÑÑанавливаÑÑ Ð´Ð²Ð¸Ð³Ð°ÑелÑ, "
+#~ "вклÑÑаÑÑ Ð¸ вÑклÑÑаÑÑ ÑоÑмоз, а Ñакже
многое дÑÑгое."
-#, fuzzy
-#~| msgid ""
-#~| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
-#~| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
-#~| "smart phones, including iPhones, Android, and BlackBerry</a>. While "
-#~| "there is not much detail here, it seems that this does not operate via "
-#~| "the universal back door that we know nearly all portable phones have. "
-#~| "It may involve exploiting various bugs. There are <a href=\"http://www."
-#~| "osnews.com/story/27416/"
-#~| "The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs "
-#~| "in the phones' radio software</a>."
#~ msgid ""
-#~ "<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel."
-#~ "de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-"
-#~ "a-920971.html\"> The NSA can tap data in smart phones, including iPhones, "
-#~ "Android, and BlackBerry</a>. While there is not much detail here, it "
-#~ "seems that this does not operate via the universal back door that we know "
-#~ "nearly all portable phones have. It may involve exploiting various bugs. "
-#~ "There are <a href=\"http://www.osnews.com/story/27416/"
+#~ "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#~ "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#~ "smart phones, including iPhones, Android, and BlackBerry</a>. While "
+#~ "there is not much detail here, it seems that this does not operate via "
+#~ "the universal back door that we know nearly all portable phones have. It "
+#~ "may involve exploiting various bugs. There are <a href=\"http://www."
+#~ "osnews.com/story/27416/"
#~ "The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs "
#~ "in the phones' radio software</a>."
#~ msgstr ""
@@ -1280,20 +1400,19 @@
#~ "The_second_operating_system_hiding_in_every_mobile_phone\"> Ð
пÑогÑаммаÑ
"
#~ "ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ
множеÑÑво оÑибок</a>."
-#, fuzzy
#~| msgid ""
-#~| "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-#~| "hacking_music_can_take_control_your_car/\"> It is possible to take "
-#~| "control of some car computers through malware in music files</a>. Also "
-#~| "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
-#~| "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
-#~| "\">more information</a>."
+#~| "It is possible to <a href=\"http://www.pcworld.idg.com.au/article/379477/"
+#~| "hacking_music_can_take_control_your_car/\"> take control of some car "
+#~| "computers through malware in music files</a>. Also <a href=\"http://www."
+#~| "nytimes.com/2011/03/10/business/10hack.html?_r=0\">by radio</a>. More "
+#~| "information in <a href=\"http://www.autosec.org/faq.html\"> Automotive "
+#~| "Security And Privacy Center</a>."
#~ msgid ""
-#~ "It is possible to take control of some car computers through <a href="
-#~ "\"http://www.pcworld.idg.com.au/article/379477/"
-#~ "hacking_music_can_take_control_your_car/\"> malware in music files</a>. "
-#~ "Also <a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
-#~ "_r=0\"> by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+#~ "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+#~ "hacking_music_can_take_control_your_car/\"> It is possible to take "
+#~ "control of some car computers through malware in music files</a>. Also "
+#~ "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+#~ "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
#~ "\">more information</a>."
#~ msgstr ""
#~ "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
@@ -1304,6 +1423,17 @@
#~ "href=\"http://www.autosec.org/faq.html\">на ÑайÑе ЦенÑÑа
авÑомобилÑной "
#~ "безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>."
+#~ msgid ""
+#~ "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
+#~ "of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
+#~ "running Windows were taken over and turned into a botnet for the purpose "
+#~ "of collecting customers' credit card numbers</a>."
+#~ msgstr ""
+#~ "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
+#~ "of-age-with-first-known-point-of-sale-botnet/\"> ТеÑÐ¼Ð¸Ð½Ð°Ð»Ñ Ð²
меÑÑаÑ
"
+#~ "пÑодаж, ÑабоÑаÑÑие под ÑпÑавлением Windows,
бÑли обÑаÑÐµÐ½Ñ "
+#~ "злоÑмÑÑленниками в ÑеÑÑ ÑбоÑа номеÑов
кÑедиÑнÑÑ
каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов</a>."
+
# type: Content of: <div><p>
#~ msgid ""
#~ "Copyright © 2013, 2015, 2016, 2017 Free Software Foundation, Inc."
- www/proprietary malware-appliances.ru.html po/m...,
GNUN <=