www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www licenses/po/license-list.cs.po licenses/po/...


From: GNUN
Subject: www licenses/po/license-list.cs.po licenses/po/...
Date: Wed, 17 Oct 2018 08:59:18 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/17 08:59:18

Modified files:
        licenses/po    : license-list.cs.po license-list.de.po 
                         license-list.es.po license-list.fr.po 
                         license-list.it-diff.html license-list.it.po 
                         license-list.ja-diff.html license-list.ja.po 
                         license-list.pl.po license-list.pot 
                         license-list.ru.po 
        proprietary    : malware-microsoft.es.html 
        proprietary/po : malware-microsoft.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/license-list.cs.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/license-list.de.po?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/license-list.es.po?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/license-list.fr.po?cvsroot=www&r1=1.368&r2=1.369
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/license-list.it-diff.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/license-list.it.po?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/license-list.ja-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/license-list.ja.po?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/license-list.pl.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/license-list.pot?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/license-list.ru.po?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.51&r2=1.52

Patches:
Index: licenses/po/license-list.cs.po
===================================================================
RCS file: /web/www/www/licenses/po/license-list.cs.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- licenses/po/license-list.cs.po      8 Oct 2018 21:28:29 -0000       1.22
+++ licenses/po/license-list.cs.po      17 Oct 2018 12:59:15 -0000      1.23
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: license-list.html\n"
-"POT-Creation-Date: 2018-10-08 21:26+0000\n"
+"POT-Creation-Date: 2018-10-17 12:57+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: web-translators <address@hidden>\n"
@@ -3292,15 +3292,8 @@
 msgid ""
 "The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids "
 "selling copies of the program, and even running the program as part of "
-"implementing any commercial service."
-msgstr ""
-
-#. type: Content of: <dl><dd><p>
-msgid ""
-"Adding insult to injury, it also twists the words &ldquo;commons&rdquo; and "
-"&ldquo;sell.&rdquo; For further criticism, see <a href=\"https://";
-"sfconservancy.org/blog/2018/aug/22/commons-clause/\"> Bradley Kuhn's "
-"article</a>."
+"implementing any commercial service.  Adding insult to injury, it also "
+"twists the words &ldquo;commons&rdquo; and &ldquo;sell.&rdquo;"
 msgstr ""
 
 #. type: Content of: <dl><dd><p>

Index: licenses/po/license-list.de.po
===================================================================
RCS file: /web/www/www/licenses/po/license-list.de.po,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- licenses/po/license-list.de.po      8 Oct 2018 21:28:29 -0000       1.285
+++ licenses/po/license-list.de.po      17 Oct 2018 12:59:15 -0000      1.286
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: license-list.html\n"
 "Report-Msgid-Bugs-To: Licensing & Compliance Lab <address@hidden>\n"
-"POT-Creation-Date: 2018-10-08 21:26+0000\n"
+"POT-Creation-Date: 2018-10-17 12:57+0000\n"
 "PO-Revision-Date: 2018-08-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -3793,15 +3793,8 @@
 msgid ""
 "The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids "
 "selling copies of the program, and even running the program as part of "
-"implementing any commercial service."
-msgstr ""
-
-#. type: Content of: <dl><dd><p>
-msgid ""
-"Adding insult to injury, it also twists the words &ldquo;commons&rdquo; and "
-"&ldquo;sell.&rdquo; For further criticism, see <a href=\"https://";
-"sfconservancy.org/blog/2018/aug/22/commons-clause/\"> Bradley Kuhn's "
-"article</a>."
+"implementing any commercial service.  Adding insult to injury, it also "
+"twists the words &ldquo;commons&rdquo; and &ldquo;sell.&rdquo;"
 msgstr ""
 
 #. type: Content of: <dl><dd><p>

Index: licenses/po/license-list.es.po
===================================================================
RCS file: /web/www/www/licenses/po/license-list.es.po,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- licenses/po/license-list.es.po      10 Oct 2018 09:58:10 -0000      1.260
+++ licenses/po/license-list.es.po      17 Oct 2018 12:59:16 -0000      1.261
@@ -12,7 +12,7 @@
 msgstr ""
 "Project-Id-Version: license-list.html\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2018-10-08 21:26+0000\n"
+"POT-Creation-Date: 2018-10-17 12:57+0000\n"
 "PO-Revision-Date: 2018-10-10 11:31+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -20,6 +20,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-17 12:57+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -3993,10 +3994,20 @@
 "</span>"
 
 #. type: Content of: <dl><dd><p>
+# | The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids
+# | selling copies of the program, and even running the program as part of
+# | implementing any commercial service.  {+Adding insult to injury, it also
+# | twists the words &ldquo;commons&rdquo; and &ldquo;sell.&rdquo;+}
+#, fuzzy
+#| msgid ""
+#| "The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids "
+#| "selling copies of the program, and even running the program as part of "
+#| "implementing any commercial service."
 msgid ""
 "The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids "
 "selling copies of the program, and even running the program as part of "
-"implementing any commercial service."
+"implementing any commercial service.  Adding insult to injury, it also "
+"twists the words &ldquo;commons&rdquo; and &ldquo;sell.&rdquo;"
 msgstr ""
 "La «Cláusula de los bienes comunes» es una licencia no libre, ya que 
prohíbe "
 "vender copias del programa, e incluso ejecutar el programa si se emplea para "
@@ -4004,17 +4015,6 @@
 
 #. type: Content of: <dl><dd><p>
 msgid ""
-"Adding insult to injury, it also twists the words &ldquo;commons&rdquo; and "
-"&ldquo;sell.&rdquo; For further criticism, see <a href=\"https://";
-"sfconservancy.org/blog/2018/aug/22/commons-clause/\"> Bradley Kuhn's "
-"article</a>."
-msgstr ""
-"Para colmo, tergiversa los términos «bienes comunes» y «vender». Para 
una "
-"crítica más detallada, consulte el <a href=\"https://sfconservancy.org/";
-"blog/2018/aug/22/commons-clause/\">artículo de Bradley Kuhn</a>."
-
-#. type: Content of: <dl><dd><p>
-msgid ""
 "We urge people to reject programs under this license and to develop free "
 "replacements.  Where a previous version was available as free software, "
 "continuing development of that version is an option."
@@ -5877,6 +5877,16 @@
 msgid "Updated:"
 msgstr "Última actualización:"
 
+#~ msgid ""
+#~ "Adding insult to injury, it also twists the words &ldquo;commons&rdquo; "
+#~ "and &ldquo;sell.&rdquo; For further criticism, see <a href=\"https://";
+#~ "sfconservancy.org/blog/2018/aug/22/commons-clause/\"> Bradley Kuhn's "
+#~ "article</a>."
+#~ msgstr ""
+#~ "Para colmo, tergiversa los términos «bienes comunes» y «vender». Para 
una "
+#~ "crítica más detallada, consulte el <a href=\"https://sfconservancy.org/";
+#~ "blog/2018/aug/22/commons-clause/\">artículo de Bradley Kuhn</a>."
+
 # type: Content of: <dl><dd><p>
 #~ msgid ""
 #~ "The CeCILL-B is a free software license with copyleft.  It is "

Index: licenses/po/license-list.fr.po
===================================================================
RCS file: /web/www/www/licenses/po/license-list.fr.po,v
retrieving revision 1.368
retrieving revision 1.369
diff -u -b -r1.368 -r1.369
--- licenses/po/license-list.fr.po      10 Oct 2018 10:48:02 -0000      1.368
+++ licenses/po/license-list.fr.po      17 Oct 2018 12:59:16 -0000      1.369
@@ -11,7 +11,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: license-list.html\n"
-"POT-Creation-Date: 2018-10-08 21:26+0000\n"
+"POT-Creation-Date: 2018-10-17 12:57+0000\n"
 "PO-Revision-Date: 2018-10-10 12:47+0200\n"
 "Last-Translator: Thérèse godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -19,6 +19,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-17 12:57+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.6\n"
 
@@ -3748,10 +3749,20 @@
 "</span>"
 
 #. type: Content of: <dl><dd><p>
+# | The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids
+# | selling copies of the program, and even running the program as part of
+# | implementing any commercial service.  {+Adding insult to injury, it also
+# | twists the words &ldquo;commons&rdquo; and &ldquo;sell.&rdquo;+}
+#, fuzzy
+#| msgid ""
+#| "The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids "
+#| "selling copies of the program, and even running the program as part of "
+#| "implementing any commercial service."
 msgid ""
 "The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids "
 "selling copies of the program, and even running the program as part of "
-"implementing any commercial service."
+"implementing any commercial service.  Adding insult to injury, it also "
+"twists the words &ldquo;commons&rdquo; and &ldquo;sell.&rdquo;"
 msgstr ""
 "La « Clause des biens communs » est une licence non libre parce qu'elle "
 "interdit de vendre des exemplaires du programme, et même d'utiliser le "
@@ -3759,17 +3770,6 @@
 
 #. type: Content of: <dl><dd><p>
 msgid ""
-"Adding insult to injury, it also twists the words &ldquo;commons&rdquo; and "
-"&ldquo;sell.&rdquo; For further criticism, see <a href=\"https://";
-"sfconservancy.org/blog/2018/aug/22/commons-clause/\"> Bradley Kuhn's "
-"article</a>."
-msgstr ""
-"Et pour comble, elle dévie les mots « biens communs » et « vendre » 
de leur "
-"sens. Voir <a href=\"https://sfconservancy.org/blog/2018/aug/22/commons-";
-"clause/\">l'article de Bradley Kuhn</a> pour une critique détaillée."
-
-#. type: Content of: <dl><dd><p>
-msgid ""
 "We urge people to reject programs under this license and to develop free "
 "replacements.  Where a previous version was available as free software, "
 "continuing development of that version is an option."
@@ -5547,3 +5547,14 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Adding insult to injury, it also twists the words &ldquo;commons&rdquo; "
+#~ "and &ldquo;sell.&rdquo; For further criticism, see <a href=\"https://";
+#~ "sfconservancy.org/blog/2018/aug/22/commons-clause/\"> Bradley Kuhn's "
+#~ "article</a>."
+#~ msgstr ""
+#~ "Et pour comble, elle dévie les mots « biens communs » et « vendre 
» de "
+#~ "leur sens. Voir <a href=\"https://sfconservancy.org/blog/2018/aug/22/";
+#~ "commons-clause/\">l'article de Bradley Kuhn</a> pour une critique "
+#~ "détaillée."

Index: licenses/po/license-list.it-diff.html
===================================================================
RCS file: /web/www/www/licenses/po/license-list.it-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- licenses/po/license-list.it-diff.html       8 Oct 2018 21:28:29 -0000       
1.7
+++ licenses/po/license-list.it-diff.html       17 Oct 2018 12:59:16 -0000      
1.8
@@ -1909,12 +1909,8 @@
 &lt;dd&gt;
 &lt;p&gt;The &ldquo;Commons Clause&rdquo; is a nonfree license because it
 forbids selling copies of the program, and even running the program as
-part of implementing any commercial service.&lt;/p&gt;
-
-&lt;p&gt;Adding insult to injury, it also twists the words
-&ldquo;commons&rdquo; and &ldquo;sell.&rdquo; For further criticism,
-see &lt;a href="https://sfconservancy.org/blog/2018/aug/22/commons-clause/"&gt;
-Bradley Kuhn's article&lt;/a&gt;.&lt;/p&gt;
+part of implementing any commercial service.  Adding insult to injury,
+it also twists the words &ldquo;commons&rdquo; and 
&ldquo;sell.&rdquo;&lt;/p&gt;
 
 &lt;p&gt;We urge people to reject programs under this license and to develop
 free replacements.  Where a previous version was available as free
@@ -2805,7 +2801,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/08 21:28:29 $
+$Date: 2018/10/17 12:59:16 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: licenses/po/license-list.it.po
===================================================================
RCS file: /web/www/www/licenses/po/license-list.it.po,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- licenses/po/license-list.it.po      8 Oct 2018 21:28:29 -0000       1.310
+++ licenses/po/license-list.it.po      17 Oct 2018 12:59:17 -0000      1.311
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: license-list.html\n"
-"POT-Creation-Date: 2018-10-08 21:26+0000\n"
+"POT-Creation-Date: 2018-10-17 12:57+0000\n"
 "PO-Revision-Date: 2018-02-16 09:15+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian\n"
@@ -4088,15 +4088,8 @@
 msgid ""
 "The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids "
 "selling copies of the program, and even running the program as part of "
-"implementing any commercial service."
-msgstr ""
-
-#. type: Content of: <dl><dd><p>
-msgid ""
-"Adding insult to injury, it also twists the words &ldquo;commons&rdquo; and "
-"&ldquo;sell.&rdquo; For further criticism, see <a href=\"https://";
-"sfconservancy.org/blog/2018/aug/22/commons-clause/\"> Bradley Kuhn's "
-"article</a>."
+"implementing any commercial service.  Adding insult to injury, it also "
+"twists the words &ldquo;commons&rdquo; and &ldquo;sell.&rdquo;"
 msgstr ""
 
 #. type: Content of: <dl><dd><p>

Index: licenses/po/license-list.ja-diff.html
===================================================================
RCS file: /web/www/www/licenses/po/license-list.ja-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- licenses/po/license-list.ja-diff.html       8 Oct 2018 21:28:29 -0000       
1.21
+++ licenses/po/license-list.ja-diff.html       17 Oct 2018 12:59:17 -0000      
1.22
@@ -1303,9 +1303,9 @@
 Thus, developers can't</em></ins></span> rely on this license to provide a 
strong
 copyleft.&lt;/p&gt;
 
-&lt;p&gt;The EUPL allows relicensing to GPLv2, because that is listed as one
+&lt;p&gt;The EUPL allows relicensing to GPLv2, because that is listed as <span 
class="removed"><del><strong>one</strong></del></span> <span 
class="inserted"><ins><em>one
 of the alternative licenses that users may convert to.  It also,
-indirectly, allows relicensing to GPL <span 
class="removed"><del><strong>version 3,</strong></del></span> <span 
class="inserted"><ins><em>version 3, because there is a
+indirectly, allows relicensing to GPL version 3, because there is a
 way to relicense to the CeCILL v2, and the CeCILL v2 gives a way to
 relicense to any version of the GNU GPL.&lt;/p&gt;
 
@@ -1331,9 +1331,9 @@
 rely on this license to provide a strong copyleft.&lt;/p&gt;
 
 &lt;p&gt;The EUPL allows relicensing to GPLv2 only and GPLv3 only, because
-those licenses are listed as two of the alternative licenses that users
-may convert to. It also, indirectly, allows relicensing to GPL
-version&nbsp;3 or any later version,</em></ins></span> because there is a way 
to relicense
+those licenses are listed as two</em></ins></span> of the alternative licenses 
that users
+may convert to. It also, indirectly, allows relicensing to GPL <span 
class="removed"><del><strong>version 3,</strong></del></span>
+<span class="inserted"><ins><em>version&nbsp;3 or any later 
version,</em></ins></span> because there is a way to relicense
 to the CeCILL v2, and the CeCILL v2 gives a way to relicense to any
 version of the GNU GPL.&lt;/p&gt;
 
@@ -1920,12 +1920,8 @@
 &lt;dd&gt;
 &lt;p&gt;The &ldquo;Commons Clause&rdquo; is a nonfree license because it
 forbids selling copies of the program, and even running the program as
-part of implementing any commercial service.&lt;/p&gt;
-
-&lt;p&gt;Adding insult to injury, it also twists the words
-&ldquo;commons&rdquo; and &ldquo;sell.&rdquo; For further criticism,
-see &lt;a href="https://sfconservancy.org/blog/2018/aug/22/commons-clause/"&gt;
-Bradley Kuhn's article&lt;/a&gt;.&lt;/p&gt;
+part of implementing any commercial service.  Adding insult to injury,
+it also twists the words &ldquo;commons&rdquo; and 
&ldquo;sell.&rdquo;&lt;/p&gt;
 
 &lt;p&gt;We urge people to reject programs under this license and to develop
 free replacements.  Where a previous version was available as free
@@ -2816,7 +2812,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/08 21:28:29 $
+$Date: 2018/10/17 12:59:17 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: licenses/po/license-list.ja.po
===================================================================
RCS file: /web/www/www/licenses/po/license-list.ja.po,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- licenses/po/license-list.ja.po      8 Oct 2018 21:28:29 -0000       1.171
+++ licenses/po/license-list.ja.po      17 Oct 2018 12:59:17 -0000      1.172
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: license-list.html\n"
-"POT-Creation-Date: 2018-10-08 21:26+0000\n"
+"POT-Creation-Date: 2018-10-17 12:57+0000\n"
 "PO-Revision-Date: 2016-10-31 10:00+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -3717,15 +3717,8 @@
 msgid ""
 "The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids "
 "selling copies of the program, and even running the program as part of "
-"implementing any commercial service."
-msgstr ""
-
-#. type: Content of: <dl><dd><p>
-msgid ""
-"Adding insult to injury, it also twists the words &ldquo;commons&rdquo; and "
-"&ldquo;sell.&rdquo; For further criticism, see <a href=\"https://";
-"sfconservancy.org/blog/2018/aug/22/commons-clause/\"> Bradley Kuhn's "
-"article</a>."
+"implementing any commercial service.  Adding insult to injury, it also "
+"twists the words &ldquo;commons&rdquo; and &ldquo;sell.&rdquo;"
 msgstr ""
 
 #. type: Content of: <dl><dd><p>

Index: licenses/po/license-list.pl.po
===================================================================
RCS file: /web/www/www/licenses/po/license-list.pl.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- licenses/po/license-list.pl.po      8 Oct 2018 21:28:29 -0000       1.21
+++ licenses/po/license-list.pl.po      17 Oct 2018 12:59:17 -0000      1.22
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: license-list.html\n"
-"POT-Creation-Date: 2018-10-08 21:26+0000\n"
+"POT-Creation-Date: 2018-10-17 12:57+0000\n"
 "PO-Revision-Date: 2017-04-24 16:01-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -3725,15 +3725,8 @@
 msgid ""
 "The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids "
 "selling copies of the program, and even running the program as part of "
-"implementing any commercial service."
-msgstr ""
-
-#. type: Content of: <dl><dd><p>
-msgid ""
-"Adding insult to injury, it also twists the words &ldquo;commons&rdquo; and "
-"&ldquo;sell.&rdquo; For further criticism, see <a href=\"https://";
-"sfconservancy.org/blog/2018/aug/22/commons-clause/\"> Bradley Kuhn's "
-"article</a>."
+"implementing any commercial service.  Adding insult to injury, it also "
+"twists the words &ldquo;commons&rdquo; and &ldquo;sell.&rdquo;"
 msgstr ""
 
 #. type: Content of: <dl><dd><p>

Index: licenses/po/license-list.pot
===================================================================
RCS file: /web/www/www/licenses/po/license-list.pot,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- licenses/po/license-list.pot        8 Oct 2018 21:28:29 -0000       1.186
+++ licenses/po/license-list.pot        17 Oct 2018 12:59:17 -0000      1.187
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: license-list.html\n"
-"POT-Creation-Date: 2018-10-08 21:26+0000\n"
+"POT-Creation-Date: 2018-10-17 12:57+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -2553,15 +2553,8 @@
 msgid ""
 "The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids "
 "selling copies of the program, and even running the program as part of "
-"implementing any commercial service."
-msgstr ""
-
-#. type: Content of: <dl><dd><p>
-msgid ""
-"Adding insult to injury, it also twists the words &ldquo;commons&rdquo; and "
-"&ldquo;sell.&rdquo; For further criticism, see <a "
-"href=\"https://sfconservancy.org/blog/2018/aug/22/commons-clause/\";> Bradley "
-"Kuhn's article</a>."
+"implementing any commercial service.  Adding insult to injury, it also "
+"twists the words &ldquo;commons&rdquo; and &ldquo;sell.&rdquo;"
 msgstr ""
 
 #. type: Content of: <dl><dd><p>

Index: licenses/po/license-list.ru.po
===================================================================
RCS file: /web/www/www/licenses/po/license-list.ru.po,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- licenses/po/license-list.ru.po      9 Oct 2018 16:58:23 -0000       1.301
+++ licenses/po/license-list.ru.po      17 Oct 2018 12:59:17 -0000      1.302
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: license-list.html\n"
-"POT-Creation-Date: 2018-10-08 21:26+0000\n"
+"POT-Creation-Date: 2018-10-17 12:57+0000\n"
 "PO-Revision-Date: 2018-10-09 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-17 12:57+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -3755,10 +3756,20 @@
 "href=\"#comclause\">#comclause</a>)</span>"
 
 #. type: Content of: <dl><dd><p>
+# | The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids
+# | selling copies of the program, and even running the program as part of
+# | implementing any commercial service.  {+Adding insult to injury, it also
+# | twists the words &ldquo;commons&rdquo; and &ldquo;sell.&rdquo;+}
+#, fuzzy
+#| msgid ""
+#| "The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids "
+#| "selling copies of the program, and even running the program as part of "
+#| "implementing any commercial service."
 msgid ""
 "The &ldquo;Commons Clause&rdquo; is a nonfree license because it forbids "
 "selling copies of the program, and even running the program as part of "
-"implementing any commercial service."
+"implementing any commercial service.  Adding insult to injury, it also "
+"twists the words &ldquo;commons&rdquo; and &ldquo;sell.&rdquo;"
 msgstr ""
 "&ldquo;Параграф обобществления&rdquo; 
представляет лицензию несвободных "
 "программ, поскольку запрещает продажу 
копий программы и даже работу с "
@@ -3766,18 +3777,6 @@
 
 #. type: Content of: <dl><dd><p>
 msgid ""
-"Adding insult to injury, it also twists the words &ldquo;commons&rdquo; and "
-"&ldquo;sell.&rdquo; For further criticism, see <a href=\"https://";
-"sfconservancy.org/blog/2018/aug/22/commons-clause/\"> Bradley Kuhn's "
-"article</a>."
-msgstr ""
-"Добавляя оскорбление к несправедливости, 
она выворачивает наизнанку слова "
-"&ldquo;обобществление&rdquo; и &ldquo;продажа&rdquo;. 
Более подробную "
-"критику см. в <a 
href=\"https://sfconservancy.org/blog/2018/aug/22/commons-";
-"clause/\"> статье Бредли Куна</a>."
-
-#. type: Content of: <dl><dd><p>
-msgid ""
 "We urge people to reject programs under this license and to develop free "
 "replacements.  Where a previous version was available as free software, "
 "continuing development of that version is an option."
@@ -5549,6 +5548,17 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Adding insult to injury, it also twists the words &ldquo;commons&rdquo; "
+#~ "and &ldquo;sell.&rdquo; For further criticism, see <a href=\"https://";
+#~ "sfconservancy.org/blog/2018/aug/22/commons-clause/\"> Bradley Kuhn's "
+#~ "article</a>."
+#~ msgstr ""
+#~ "Добавляя оскорбление к 
несправедливости, она выворачивает 
наизнанку слова "
+#~ "&ldquo;обобществление&rdquo; и 
&ldquo;продажа&rdquo;. Более подробную "
+#~ "критику см. в <a 
href=\"https://sfconservancy.org/blog/2018/aug/22/";
+#~ "commons-clause/\"> статье Бредли Куна</a>."
+
+#~ msgid ""
 #~ "The CeCILL-B is a free software license with copyleft.  It is "
 #~ "incompatible with the GNU GPL because it does not contain the explicit "
 #~ "GPL-compatibility clause of the <a href=\"#CeCILL\">basic CeCILL</a>."

Index: proprietary/malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/malware-microsoft.es.html       24 Sep 2018 09:58:03 -0000      
1.53
+++ proprietary/malware-microsoft.es.html       17 Oct 2018 12:59:17 -0000      
1.54
@@ -2,6 +2,12 @@
 
 <!--#include virtual="/server/header.es.html" -->
 <!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+     Please do not edit lists with items such as <li id="Mnnnnnnnn">
+!
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>El software de Microsoft es malware - Proyecto GNU - Free Software
@@ -14,7 +20,7 @@
 <p><a href="/proprietary/proprietary.html">Más ejemplos de 
<cite>malware</cite>
 en el software privativo</a></p>
 
-<div class="highlight-para">
+<div class="comment">
 <p>
 <cite>Malware</cite> se refiere al software que es dañino, es decir, que
 está diseñado de tal forma que su funcionamiento maltrata o daña al usuario
@@ -37,92 +43,107 @@
 tentado a imponer algunas.
 </p>
 
+<div class="important" style="margin-bottom: 2em">
 <p>Si conoce algún ejemplo que debería mencionarse en esta página y no 
está,
 escriba por favor a <a
 href="mailto:address@hidden";>&lt;address@hidden&gt;</a> para
 informarnos. Para dar cuenta de los detalles, incluya también como
 referencia la URL de alguna página fiable.</p>
 </div>
+</div>
 
-<div class="summary" style="margin-top: 2em">
+<div class="summary">
 <h3>Tipo de <cite>malware</cite></h3>
 <ul>
-<li><a href="#back-doors">Puertas traseras</a></li>
+  <li><a href="#back-doors">Puertas traseras</a></li>
 
-<!--<li>
+  <!--<li>
 <a href="#censorship">Censorship</a></li>-->
-<li><a href="#insecurity">Inseguridad</a></li>
-<li><a href="#sabotage">Sabotaje</a></li>
-<li><a href="#interference">Intromisiones</a></li>
-<li><a href="#surveillance">Vigilancia</a></li>
 <li><a href="#drm">Gestión digital de restricciones («<abbr title="Digital
 Restrictions Management">DRM</abbr>»)</a>: Son funcionalidades diseñadas
 para restringir  lo que los usuarios pueden hacer con los datos en sus
 ordenadores.</li>
-<li><a href="#jails">Prisiones</a>: Son sistemas que imponen la censura en los
+  <li><a href="#insecurity">Inseguridad</a></li>
+  <li><a href="#interference">Intromisiones</a></li>
+  <li><a href="#jails">Prisiones</a>: Son sistemas que imponen la censura en 
los
 programas de aplicación.</li>
-<li><a href="#tyrants">Tiranos</a>: Son sistemas que rechazan cualquier sistema
+  <li><a href="#sabotage">Sabotaje</a></li>
+  <li><a href="#subscriptions">Suscripciones</a></li>
+  <li><a href="#surveillance">Vigilancia</a></li>
+  <li><a href="#tyrants">Tiranos</a>: Son sistemas que rechazan cualquier 
sistema
 operativo que no esté «autorizado» por el fabricante.</li>
-<li><a href="#subscriptions">Suscripciones</a></li>
 </ul>
 </div>
 
 <h3 id="back-doors">Puertas traseras de Microsoft</h3>
-<ul>
-  <li><p><a
-href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
-Microsoft ha incluido ya una puerta trasera en su encriptado de 
discos</a>.</p></li>
 
-  <li><p>Microsoft Windows tiene una puerta trasera universal a través de la 
cual <a
+<ul class="blurbs">
+  <li id="M201608172">
+    <p id="windows-update">Microsoft Windows tiene una puerta trasera 
universal a través de la cual <a
 
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>se
 puede imponer a los usuarios todo tipo de modificaciones</a>.</p>
 
-  <p>Más información acerca de las ocasiones en que <a
-href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>se ha
-hecho uso de esa puerta trasera</a>.</p>
+    <p>De esto <a
+href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";> se
+informó en 2007</a> con respecto a XP y Vista, y parece que Microsoft
+utilizó el mismo método para forzar la <a
+href="/proprietary/malware-microsoft.html#windows10-forcing"> actualización
+a Windows 10</a> de ordenadores que funcionaban con Windows 7 y 8.</p>
 
   <p>En Windows 10, la puerta trasera universal ya no está oculta: todas las
 «actualizaciones» <a
 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>se
-impondrán de inmediato y de forma forzosa</a>.</p></li>
+impondrán de inmediato y de forma forzosa</a>.</p>
+  </li>
+
+  <li id="M201512280">
+    <p>Microsoft ha <a
+href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+incluido una puerta trasera en su encriptado de discos</a>.</p>
+  </li>
 
-  <li><p><a
-href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>Windows
-8 también tiene una puerta trasera para cancelar aplicaciones de forma
-remota</a>.</p>
+  <li id="M201308230">
+    <p>El Gobierno alemán <a
+href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>evita
+los ordenadores con Windows 8 provistos del chip TPM 2.0</a> debido a que
+este chip permite la creación de puertas traseras.</p>
+  </li>
+
+  <li id="M201307300">
+    <p>Esta es una sospecha que no podemos probar, pero merece la pena
+considerarlo: según reputados expertos en seguridad, el <a
+href="https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>microcódigo
+reprogramable para microprocesadores Intel y AMD</a> puede ser un medio para
+que la NSA acceda a los ordenadores con la ayuda de Microsoft.</p>
+  </li>
+
+  <li id="M201112081">
+    <p>Windows 8 también tiene una puerta trasera para <a
+href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>cancelar
+aplicaciones de forma remota</a>.</p>
 
   <p>Usted bien podrí­a tomar la decisión de dejar que algún servicio de
 seguridad en el que confí­a <em>desactive</em> de forma remota los programas
 que dicho servicio considere maliciosos, pero no hay ninguna excusa para
 <em>eliminarlos</em>, y usted tiene el derecho de decidir en quién confiar
-(si es que desea confiar en alguien para esto).</p></li>
+(si es que desea confiar en alguien para esto).</p>
+  </li>
+</ul>
 
-  <li><p>El Gobierno alemán <a
-href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>evita
-los ordenadores con Windows 8 provistos del chip TPM 2.0 debido a que este
-chip permite la creación de puertas traseras</a>.</p>
-  </li>
-
-<li id="windows7-back-door"><p>Los usuarios informan que <a
-href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
-Microsoft los ha obligado a sustituir Windows 7 y 8 por el fisgón Windows
-10</a>.</p>
-
-    <p>Microsoft estaba <a
-href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
-atacando a los ordenadores con Windows 7 y 8</a>, haciendo aparecer una
-ventana que preguntaba si «actualizar» a Windows 10, en el momento de apagar
-el equipo.</p>
-
-    <p>Posteriormente, Microsoft publicó instrucciones sobre el <a
-href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/";>modo
-de rechazar permanentemente el paso a Windows 10</a>.</p>
 
-    <p>Esto parece implicar el uso de una puerta trasera en Windows 7 y 8.</p>
-</li>
+<h3 id="drm">Gestión digital de restricciones en Microsoft</h3>
 
+<ul class="blurbs">
+  <li id="M200708131">
+    <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM en
+Windows</a>, introducida para  aplicarla a los discos <a
+href="/proprietary/proprietary-drm.html#bluray">Bluray</a>. El artículo
+menciona que la misma función dañina se implementaría después en Mac OS. No
+se había hecho aún entonces, pero se hizo posteriormente.</p>
+  </li>
 </ul>
 
+
 <h3 id="insecurity">Inseguridad de Microsoft</h3>
 
 <p>A diferencia del resto de esta página, los errores que aquí se señalan no
@@ -130,33 +151,112 @@
 <cite>malware</cite>. Los mencionamos para desmontar la falsa suposición de
 que el software privativo de prestigio está libre de graves fallos.</p>
 
-<ul>
-
-<li>
+<ul class="blurbs">
+  <li id="M201705120">
   <p>Procedimientos para sacar provecho de fallos de Windows, que fueron
 desarrollados por la NSA y luego divulgados por el grupo Shadowbrokers,
 están ahora utilizándose para <a
 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>atacar
 con programas secuestradores a un gran número de equipos que operan con
-Windows</a>.
-       </p>
-</li>
+Windows</a>.</p>
+  </li>
 
-    <li><p>Un <a
+  <li id="M201608020">
+    <p>Un <a
 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>fallo
 en Internet Explorer y Edge</a> permite a un atacante obtener los datos
 identificativos de la cuenta de Microsoft si el usuario cae en la trampa de
 visitar un enlace malicioso.</p>
     </li>
-<li>
-<p><a
+
+  <li id="M201312040">
+    <p><a
 
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>Terminales
-de puntos de venta que funcionan con Windows han sido atacados y convertidos
-en una botnet con el propósito de obtener los números de las tarjetas de
-crédito de los clientes</a>.
-</p>
-</li>
+de puntos de venta que funcionan con Windows han sido atacados</a> y
+convertidos en una botnet con el propósito de obtener los números de las
+tarjetas de crédito de los clientes.</p>
+  </li>
+</ul>
+
+
+<h3 id="interference">Intromisiones de Microsoft</h3>
+
+<p>Diversos programas privativos a menudo desarreglan el sistema de
+usuario. Son similares al sabotaje, pero no lo bastante graves que se les
+pueda aplicar la palabra «sabotaje». No obstante, son molestos y dañinos. En
+esta sección ofrecemos algunos ejemplos de las intromisiones de Microsoft. 
</p>
+
+<ul class="blurbs">
+  <li id="M201809120">
+    <p>Una versión de Windows 10 <a
+href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
+sermonea a los usuarios que intentan instalar Firefox (o Chrome)</a>.</p>
+  </li>
+
+  <li id="M201803190">
+    <p>Microsoft pretende hacer que Windows <a
+href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox";>
+imponga el uso de su navegador, Edge, en determinadas circunstancias</a>.</p>
+
+    <p>La razón por la que Microsoft puede imponer cosas a los usuarios es que
+Windows no es libre.</p>
+  </li>
+
+  <li id="M201703170">
+    <p>Windows muestra <a
+href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
+anuncios invasivos de productos de Microsoft y de sus socios</a>.</p>
+
+    <p>El autor del artículo parte del supuesto de que Microsoft tiene 
derecho a
+controlar lo que Windows hace a los usuarios, siempre que no vaya «demasiado
+lejos». No estamos de acuerdo.</p>
+  </li>
+
+  <li id="M201608170">
+    <p> Tras <a 
href="/proprietary/malware-microsoft.html#windows10-forcing">forzar
+la descarga de Windows 10</a> en ordenadores que funcionaban con Windows 7 y
+8, Microsoft <a
+href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>hacía
+reaparecer reiteradamente una indicación que instaba a los usuarios a
+«actualizar» a Windows 10</a>, aunque estos ya lo hubieran rechazado con
+anterioridad, con la esperanza de que alguna vez erraran. Para hacerlo,
+Microsoft utilizó <a
+href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>técnicas
+de <cite>malware</cite> techniques</a>.</p>
+
+    <p>En la web de la Electronic Frontier Foundation se puede encontrar un
+detallado <a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+análisis de la estrategia de Microsoft</a>.</p>
+  </li>
+
+  <li id="M201603090">
+    <p>Microsoft ha hecho que los ordenadores con Windows de las empresas <a
+href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>animen
+a los usuarios a quejarse a los administradores del sistema de no
+«actualizar» los equipos a Windows 10</a>.</p>
+  </li>
+
+  <li id="M201601160">
+    <p>Microsoft <a
+href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>ya
+no ofrecerá soporte para el funcionamiento de Windows 7 y 8 en ninguno de
+los futuros procesadores Intel</a>. Para tales máquinas, solo estará
+disponible el más malévolo Windows 10. <a
+href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>Lo
+mismo para los procesadores AMD y Qualcomm</a>.</p>
+
+    <p>Windows 7 y 8 también son contrarios a la ética, por supuesto, porque 
son
+software privativo, pero este ejemplo de imposición por parte de Microsoft
+demuestra el poder que posee. </p>
 
+    <p>Los desarrolladores de software libre también dejan de mantener viejas
+versiones de sus programas, pero esto no implica ser injusto con los
+usuarios porque los usuarios de software libre tienen el control del
+software. Si el programa es importante para usted, puede unirse a otros
+usuarios y contratar a alguien para que adapte la vieja versión a futuras
+plataformas.</p>
+  </li>
 </ul>
 
 
@@ -165,255 +265,202 @@
 <p>Los problemas que se señalan en este sección no son estrictamente
 <cite>malware</cite>, ya que no implican la elaboración de un programa cuya
 modalidad de funcionamiento provoca daños al usuario. Pero se asemejan mucho
-al <cite>malware</cite> pues se trata de maniobras técnicas por parte de
+al <cite>malware</cite>, pues se trata de maniobras técnicas por parte de
 Microsoft que perjudican a los usuarios de software específico de 
Microsoft.</p>
 
-<ul>
-  <li><p> Microsoft <a
+<ul class="blurbs">
+  <li id="M201704194">
+    <p>Microsoft has hecho que Windows 7 y 8 dejen de funcionar en ciertos 
nuevos
+ordenadores, <a
+href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>obligando
+así a sus poseedores a cambiarse a Windows 10</a>.</p>
+  </li>
+
+  <li id="M201704134">
+    <p>Microsoft <a
 
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/";>ha
 dejado de dar mantenimiento para Windows 7 y 8 en los procesadores más
 recientes</a> de forma apresurada.</p>
+
     <p>No importa lo legítimas que pudieran ser las razones de Microsoft para 
no
 hacer ese trabajo de mantenimiento. Si ellos no quieren hacer el trabajo,
 deberían permitir que los usuarios lo hicieran.</p>
   </li>
 
-  <li>
-    <p>Microsoft has hecho que Windows 7 y 8 dejen de funcionar en ciertos 
nuevos
-ordenadores, <a
-href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>obligando
-así a sus poseedores a cambiarse a Windows 10</a>.</p>
+  <li id="M201606270">
+    <p id="windows10-forcing">En sus intentos de engañar a los usuarios de 
Windows 7 y 8 para instalar el
+sistema espía Windows 10 contra su voluntad, Microsoft forzó a sus
+ordenadores a <a
+href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>descargar
+sigilosamente... ¡todo Windows 10!</a> Al parecer, esto se hizo mediante una
+<a href="/proprietary/proprietary-back-doors.html#windows-update">puerta
+trasera universal</a>. Estas descargas no deseadas no solo <a
+href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>comprometieron
+importantes operaciones en zonas del mundo con una pobre conectividad</a>,
+sino que, además, mucha de la gente que permitió su instalación luego
+descubrió que esta «actualización» era en realidad una <a
+href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>regresión</a>.</p>
   </li>
 
-  <li><p>Una vez que Microsoft ha embaucado a un usuario para que acepte 
instalar
+  <li id="M201606010">
+    <p>Una vez que Microsoft ha embaucado a un usuario para que acepte instalar
 Windows 10, <a
-href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>este
+href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>este
 descubre que se le niega la opción de cancelar o posponer la fecha de
-instalación impuesta</a>.
-   </p>
+instalación impuesta</a>.</p>
+
    <p>Esto demuestra lo que venimos diciendo desde hace años: utilizar 
software
 privativo equivale a permitir que alguien tengan poder sobre nosotros, y
-tarde o temprano seremos ultrajados.</p></li>
-
-  <li><p>Microsoft <a
-href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>ya
-no ofrecerá soporte para el funcionamiento de Windows 7 y 8 en ninguno de
-los futuros procesadores Intel</a>. Para tales máquinas, solo estará
-disponible el más malévolo Windows 10. <a
-href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>Lo
-mismo para los procesadores AMD y Qualcomm</a>.
-  </p>
-  <p>Windows 7 y 8 también son contrarios a la ética, por supuesto, porque 
son
-software privativo, pero este ejemplo de imposición por parte de Microsoft
-demuestra el poder que posee. 
-  </p>
-  <p>Los desarrolladores de software libre también dejan de mantener viejas
-versiones de sus programas, pero esto no implica ser injusto con los
-usuarios porque los usuarios de software libre tienen el control del
-software. Si el programa es importante para usted, puede unirse a otros
-usuarios y contratar a alguien para que adapte la vieja versión a futuras
-plataformas.
-  </p></li>
+tarde o temprano seremos ultrajados.</p>
+  </li>
 
-  <li><p>Microsoft está  <a
-href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>forzando
-la actualización de Windows a la versión 10</a>, ignorando la opción de «no
-actualizar» que los usuarios pueden escoger en Windows 7 u 8. Esto confirma
-la existencia de una <a
-href="/proprietary/proprietary-back-doors.html">puerta trasera universal en
-Windows</a> 7 y 8.</p></li>
+  <li id="M201601310">
+    <p>El controlador privativo de FTDI para los chips de conversión de 
USB-serie
+ha sido diseñado para <a
+href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/";>sabotear
+los chips compatibles alternativos</a> de modo que ya no
+funcionen. Microsoft <a
+href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again";>lo
+está instalando automáticamente</a> como una «actualización».</p>
+  </li>
 
-  <li><p>Las «actualizaciones» de Windows 10 <a
+  <li id="M201511240">
+    <p>Las «actualizaciones» de Windows 10 <a
 
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>
-borran aplicacones</a> sin pedir permiso.</p></li>
-
-  <li><p>
-  Microsoft <a
-href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
-se entromete una y otra vez para que muchos usuarios instalen Windows
-10</a>.
-  </p></li>
-
-<li><p>
-Durante meses, Microsoft <a
-href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update";>
-ha estado engañando a los usuarios para que «actualizaran» a Windows 10</a>,
-si no prestaban atención y no lo rechazaban explícitamente.
-</p></li>
-
-  <li><p><a
-href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
-informa a la NSA de los errores de Windows antes de repararlos</a>.</p></li>
+borran aplicacones</a> sin pedir permiso.</p>
+  </li>
 
-  <li><p><a
-href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>Microsoft
+  <li id="M201503260">
+    <p><a
+href="https://www.computerworlduk.com/it-business/windows-xp-end-of-an-era-end-of-an-error-3569489/";>Microsoft
 dejó de distribuir parches de seguridad para Windows XP, excepto para
 algunos grandes usuarios que pagan cifras exorbitantes</a>.</p>
 
-  <p>De igual manera, Microsot <a
-href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/";>interrumpirá
+    <p>De igual manera, Microsoft <a
+href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/";>interrumpirá
 el soporte de algunas versiones de Internet Explorer</a>.</p>
 
   <p>Una persona o empresa tiene el derecho de dejar de desarrollar un programa
 en particular. Lo incorrecto aquí es que Microsoft lo hace después de haber
 logrado que los usuarios dependan de Microsoft, porque estos ya no son
-libres de encargar a otro programador que continúe el desarrollo.</p></li>
-</ul>
-
-<h3 id="interference">Intromisiones de Microsoft</h3>
-
-<p>Diversos programas privativos a menudo desarreglan el sistema de
-usuario. Son similares al sabotaje, pero no lo bastante graves que se les
-pueda aplicar la palabra «sabotaje». No obstante, son molestos y dañinos. En
-esta sección ofrecemos algunos ejemplos de las intromisiones de Microsoft. 
</p>
-
-<ul>
-  <li><p>Microsoft pretende hacer que Windows <a
-href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox";>
-imponga el uso de su navegador, Edge, en determinadas circunstancias</a>.</p>
-    <p>La razón por la que Microsoft puede imponer cosas a los usuarios es que
-Windows no es libre.</p></li>
-
-  <li><p>Windows muestra <a
-href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
-anuncios invasivos de productos de Microsoft y de sus socios</a>.</p>
-    <p>El autor del artículo parte del supuesto de que Microsoft tiene 
derecho a
-controlar lo que Windows hace a los usuarios, siempre que no vaya «demasiado
-lejos». No estamos de acuerdo.</p></li>
+libres de encargar a otro programador que continúe el desarrollo.</p>
+  </li>
   
-  <li><p>Microsoft inserta <a
-href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts";>molestos
-anuncios en el Explorador de archivos</a> para insistir a los usuarios en
-que se suscriban al servicio de OneDrive.</p></li>
+  <li id="M201306220">
+    <p><a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
+informa a la NSA de los errores de Windows antes de repararlos</a>.</p>
+  </li>
+</ul>
 
-<li>A fin de incrementar las cifras de instalación de Windows 10, Microsoft <a
-href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>hace
-descaradamente caso omiso de la privacidad y las opciones elegidas por los
-usuarios</a>.
-</li>
 
-<li><p>Microsoft ha comenzado a <a
-href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder";>
-molestar a los usuarios, odiosa y repetidamente, para que instalen Windows
-10</a>.</p></li>
-
-  <li><p>Microsoft <a
-href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml";>está
-engañando a los usuarios</a> <a
-href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>para
-sustituir Windows 7 por Windows 10</a>.</p></li>
+<h3 id="subscriptions">Suscripciones de Microsoft</h3>
 
-  <li><p>Microsoft ha hecho que los ordenadores con Windows de las empresas <a
-href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>animen
-a los usuarios a quejarse a los administradores del sistema de no
-«actualizar» los equipos a Windows 10</a>.</p></li>
+<ul class="blurbs">
+  <li id="M201507150">
+    <p>Microsoft Office obliga a los usuarios a <a
+href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>suscribirse
+a Office 365 para poder crear o editar documentos</a>.</p>
+  </li>
 </ul>
 
-<h3 id="surveillance">Vigilancia de Microsoft</h3>
 
-<ul>
+<h3 id="surveillance">Vigilancia de Microsoft</h3>
 
-<li><p>El programa de telemetría de Windows 10 envía a Microsoft 
información acerca
+<ul class="blurbs">
+  <li id="M201710134">
+    <p>El programa de telemetría de Windows 10 envía a Microsoft 
información acerca
 del ordenador del usuario y del uso que este hace de él.</p>
 
-<p>Más aún, para los usuarios que instalasen la cuarta actualización 
estable de
+    <p>Más aún, para los usuarios que instalasen la cuarta actualización 
estable de
 Windows 10, llamada «Creators Update», Windows elevó la vigilancia al 
máximo
 <a
 
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
 ajustando por defecto el nivel de telemetría a «Completo»</a>.</p>
 
-<p>El <a
+    <p>El <a
 
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level";>nivel
 de telemetría «Completo»</a> permite a los ingenieros de Microsoft acceder,
 entre otras cosas, a claves de registro <a
 href="https://technet.microsoft.com/en-us/library/cc939702.aspx";>que
 contienen información sensible, como la contraseña de inicio de sesión del
-administrador</a>.</p></li>
+administrador</a>.</p>
+  </li>
 
-<li><p>Los archivos DRM de Windows <a
+  <li id="M201702020">
+    <p>Los archivos restringidos con DRM <a
 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>pueden
 utilizarse para identificar a gente que está navegando mediante
-Tor</a>. Esta vulnerabilidad existe únicamente si se utiliza Windows.
-</p></li>
+Tor</a>. Esta vulnerabilidad existe únicamente si se utiliza Windows.</p>
+  </li>
 
-<li><p>Por defecto, Windows 10 <a
+  <li id="M201611240">
+    <p>Por defecto, Windows 10 <a
 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties";>envía
 información de depuración a Microsoft, volcados de memoria
-incluidos</a>. Ahora Microsoft se los proporciona a otra compañía.</p></li>
+incluidos</a>. Ahora Microsoft se los proporciona a otra compañía.</p>
+  </li>
 
-<li>Al parecer, <a
+  <li id="M201608171">
+    <p>A fin de incrementar las cifras de instalación de Windows 10, 
Microsoft <a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>hace
+descaradamente caso omiso de la privacidad y las opciones elegidas por los
+usuarios</a>.</p>
+  </li>
+
+  <li id="M201603170">
+    <p><a
+href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>
+Windows 10 tiene 13 opciones de fisgoneo</a>, todas activadas por defecto, y
+desactivarlas sería una tarea demasiado ardua para la mayor parte de los
+usuarios.</p>
+  </li>
+
+  <li id="M201601050">
+    <p>Al parecer, <a
 
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/";>
 Windows 10 envía a Microsoft datos sobre las aplicaciones que se están
-utilizando</a>.</li>
+utilizando</a>.</p>
+  </li>
 
-<li><p>Una puesta al día regresiva de Windows 10 borraba aplicaciones para la
+  <li id="M201511264">
+    <p>Una puesta al día regresiva de Windows 10 borraba aplicaciones para la
 detección de vigilancia. Luego otra insertaba un programa general de
 espionaje. Los usuarios lo advirtieron y se quejaron, de modo que Microsoft
 le cambió el nombre <a
-href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
-para que pareciera que lo habían eliminado</a>.</p>
+href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>para
+que pareciera que lo habían eliminado</a>.</p>
 
-<p>Utilizar software privativo es una invitación a recibir un trato de este
-tipo.</p></li>
-
-  <li><p>
-  <a
-href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>
-Windows 10 tiene 13 opciones de fisgoneo</a>, todas activadas por defecto, y
-desactivarlas sería una tarea demasiado ardua para la mayor parte de los
-usuarios.</p></li>
-
-  <li><p>
-  Windows 10 <a
-href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
-se entrega con una configuración predeterminada que no muestra ningún
-respeto por la privacidad</a>. Concede a Microsoft el «derecho» a husmear en
-los archivos del usuario, lo que escribe, lo que dice, su ubicación, sus
-contactos, los registros en el calendario y el historial de navegación, así
-como a conectar automáticamente el equipo a redes públicas inalámbricas y
-mostrarle al usuario anuncios personalizados.</p>
-
-  <p>Podemos suponer que Microsoft mira los archivos de los usuarios a pedido 
del
-gobierno de los Estados Unidos, aunque su «política de privacidad» no lo
-diga explícitamente. ¿Mirará también los archivos de los usuarios a pedido
-del gobierno chino?</p></li>
+    <p>Utilizar software privativo es una invitación a recibir un trato de 
este
+tipo.</p>
+  </li>
 
-  <li><p>
-  <a
+  <li id="M201508130">
+    <p><a
 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>Windows
 10 envía a Microsoft información para la identificación</a>, incluso cuando
 el usuario desactiva la función de búsqueda Bing y Cortana y activa los
-parámetros de protección de la privacidad. </p></li>
-
-  <li><p>La «identificación publicitaria», única para cada usuario, 
permite a otras
-compañías rastrear los sitios que visita cada usuario en particular.</p></li>
-
-  <li>Código espí­a en Windows 8: <a
-href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";><i>Windows
-Update</i> husmea en las actividades del usuario</a>. <a
-href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>Windows
-8.1 rastrea las búsquedas locales</a>, y <a
-href="http://www.marketoracle.co.uk/Article40836.html";> Windows contiene una
-clave secreta de la <abbr title="National Security Agency">NSA</abbr></a>
-cuyas funciones desconocemos.</li>
-
-  <li><p>
-  <a
-href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>El
-SkyDrive de Micrososft permite que la NSA examine directamente los datos de
-los usuarios</a>.</p>
+parámetros de protección de la privacidad. </p>
   </li>
 
-  <li><p>Programas espías en Skype: <a
-href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>
-http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
-Microsoft modificó Skype <a
-href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
-específicamente para espiar</a>.</p>
+  <li id="M201507300">
+    <p>Windows 10 <a
+href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>se
+entrega con una configuración predeterminada que no muestra ningún respeto
+por la privacidad</a>. Concede a Microsoft el «derecho» a husmear en los
+archivos del usuario, lo que escribe, lo que dice, su ubicación, sus
+contactos, los registros en el calendario y el historial de navegación, así
+como a conectar automáticamente el equipo a redes públicas inalámbricas y
+mostrarle al usuario anuncios personalizados.</p>
+
+    <p>Podemos suponer que Microsoft mira los archivos de los usuarios a 
petición
+del Gobierno de los Estados Unidos, aunque su «política de privacidad» no lo
+diga explícitamente. ¿Mirará también los archivos de los usuarios a 
petición
+del Gobierno chino?</p>
   </li>
 
-  <li><p>
-  Microsoft utiliza la «política de privacidad» de Windows 10 para imponer
+  <li id="M201506170">
+    <p>Microsoft utiliza la «política de privacidad» de Windows 10 para 
imponer
 abiertamente el «derecho» de mirar los archivos de los usuarios en cualquier
 momento.  El cifrado de disco completo en Windows 10 <a
 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/";>proporciona
@@ -432,23 +479,49 @@
 
   <p>Pareciera que Microsoft ha optado deliberadamente por convertir a Windows 
10
 en la máxima malignidad en toda dimensión, adueñarse de un poder total sobre
-todo aquel que no abandone Windows  ahora mismo.</p></li>
+todo aquel que no abandone Windows  ahora mismo.</p>
+  </li>
 
-</ul>
+  <li id="M201410040">
+    <p>Con el tiempo, cada vez es peor. <a
+href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>Windows
+10 reclama a los usuarios que concedan permiso para husmear en todas
+partes</a>, incluso en sus archivos y en las órdenes, texto o voz que
+introducen en el ordenador.</p>
+  </li>
 
-<h3 id="drm">Gestión digital de restricciones en Microsoft</h3>
-<ul>
-  <li><p><a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>Gestión
-digital de restricciones (<abbr title="Digital Restrictions
-Management">DRM</abbr> ) en Windows</a>, introducida para  aplicarla a los
-discos <a href="/proprietary/proprietary-drm.html#bluray">Bluray</a>. El
-artículo también menciona que la misma función dañina se implementaría
-después en Mac OS.</p></li>
+  <li id="M201405140">
+    <p><a
+href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>El
+SkyDrive de Micrososft permite que la NSA examine directamente los datos de
+los usuarios</a>.</p>
+  </li>
+
+  <li id="M201307110">
+    <p>Skype contiene <a
+href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>programas
+espía</a>. Microsoft modificó Skype <a
+href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
+específicamente para espiar</a>.</p>
+  </li>
+
+  <li id="M201307080">
+    <p>Código espí­a en versiones antiguas de Windows: <a
+href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";><i>Windows
+Update</i> husmea en las actividades del usuario</a>. <a
+href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>Windows
+8.1 rastrea las búsquedas locales</a>, y <a
+href="http://www.marketoracle.co.uk/Article40836.html";> Windows contiene una
+clave secreta de la <abbr title="National Security Agency">NSA</abbr></a>
+cuyas funciones desconocemos.</p>
+  </li>
 </ul>
 
+
 <h3 id="jails">Prisiones de Microsoft</h3>
-<ul>
-  <li>
+
+<ul class="blurbs">
+  <li id="M201706130">
     <p>Windows 10 S era una prisión: <a
 
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
 solo se podían instalar y ejecutar programas procedentes de la Windows
@@ -458,40 +531,37 @@
 especial de Windows 10 llamada <a
 
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq";>
 modo S</a>. La principal diferencia con Windows 10 S es que existe una
-manera sencilla de salir del modo S.</p></li>
+manera sencilla de salir del modo S.</p>
+  </li>
 
-  <li>
+  <li id="M201210080">
     <p><a
 
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>Windows
-8 para «dispositivos móviles» (ya desaparecido) era una 
prisión</a>.</p></li>
+8 para «dispositivos móviles» (ya desaparecido) era una prisión</a>.</p>
+  </li>
 </ul>
 
+
 <h3 id="tyrants">Tiranos de Microsoft</h3>
-<ul>
-<li>
-<p>Por descuido, Microsoft dejó abierta una vía que permitía a los usuarios
+
+<ul class="blurbs">
+  <li id="M201607150">
+    <p>Por descuido, Microsoft dejó abierta una vía que permitía a los 
usuarios
 instalar GNU/Linux en las tabletas con Windows RT. Pero ya ha <a
 
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
 «subsanado» el «error»</a>. Y tienen el descaro de llamarlo 
«protección» de
 los usuarios. El artículo habla de instalar «Linux», pero por el contexto se
 deduce que lo que instalan los usuarios es en realidad <a
-href="/gnu/linux-and-gnu.html">GNU/Linux</a>.
-</p>
-</li>
-  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>Los
-dispositivos móviles que vienen con Windows 8 son tiránicos</a>: impiden al
-usuario instalar sistemas operativos modificados u otros diferentes.</p></li>
-</ul>
-
-<h3 id="subscriptions">Suscripciones de Microsoft</h3>
+href="/gnu/linux-and-gnu.html">GNU/Linux</a>.</p>
+  </li>
 
-<ul>
-<li><p>Microsoft Office obliga a los usuarios a <a
-href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>suscribirse
-a Office 365 para poder crear o editar documentos</a>.</p>
-</li>
+  <li id="M201110110">
+    <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>Los
+dispositivos móviles que vienen con Windows 8 son tiránicos</a>.</p>
+  </li>
 </ul>
 
+
 <p>Como queda demostrado en esta página, si lo que quiere es eliminar el
 <cite>malware</cite> de su ordenador, lo primero que tiene que eliminar es
 Windows. </p>
@@ -571,7 +641,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2018/09/24 09:58:03 $
+$Date: 2018/10/17 12:59:17 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary/po/malware-microsoft.es-en.html 27 Jul 2018 10:01:00 -0000      
1.51
+++ proprietary/po/malware-microsoft.es-en.html 17 Oct 2018 12:59:18 -0000      
1.52
@@ -1,5 +1,10 @@
 <!--#include virtual="/server/header.html" -->
 <!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+     Please do not edit lists with items such as <li id="Mnnnnnnnn">!
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 <title>Microsoft's Software Is Malware
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
@@ -10,7 +15,7 @@
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary
 malware</a></p>
 
-<div class="highlight-para">
+<div class="comment">
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -29,81 +34,108 @@
 any malicious functionalities tempts the developer to impose some.
 </p>
 
+<div class="important" style="margin-bottom: 2em">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
 </div>
+</div>
 
-<div class="summary" style="margin-top: 2em">
+<div class="summary">
 <h3>Type&nbsp;of malware</h3>
 <ul>
-<li><a href="#back-doors">Back doors</a></li>
+  <li><a href="#back-doors">Back doors</a></li>
 <!--<li><a href="#censorship">Censorship</a></li>-->
-<li><a href="#insecurity">Insecurity</a></li>
-<li><a href="#sabotage">Sabotage</a></li>
-<li><a href="#interference">Interference</a></li>
-<li><a href="#surveillance">Surveillance</a></li>
-<li><a href="#drm">Digital restrictions
-    management</a> or &ldquo;DRM&rdquo; means functionalities designed
+  <li><a href="#drm">Digital restrictions
+    management</a> or &ldquo;DRM&rdquo;&mdash;functionalities designed
     to restrict what users can do with the data in their computers.</li>
-<li><a href="#jails">Jails</a>&mdash;systems
+  <li><a href="#insecurity">Insecurity</a></li>
+  <li><a href="#interference">Interference</a></li>
+  <li><a href="#jails">Jails</a>&mdash;systems
     that impose censorship on application programs.</li>
-<li><a href="#tyrants">Tyrants</a>&mdash;systems
+  <li><a href="#sabotage">Sabotage</a></li>
+  <li><a href="#subscriptions">Subscriptions</a></li>
+  <li><a href="#surveillance">Surveillance</a></li>
+  <li><a href="#tyrants">Tyrants</a>&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.</li>
-<li><a href="#subscriptions">Subscriptions</a></li>
 </ul>
 </div>
 
 <h3 id="back-doors">Microsoft Back Doors</h3>
-<ul>
-  <li><p><a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
-  Microsoft has already backdoored its disk encryption</a>.</p></li>
 
-  <li><p>Microsoft Windows has a universal back door through which <a 
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
+<ul class="blurbs">
+  <li id="M201608172">
+    <p id="windows-update">Microsoft
+    Windows has a universal back door through which <a
+    
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
   any change whatsoever can be imposed on the users</a>.</p>
 
-  <p>More information on when <a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
-  this was used</a>.</p>
+    <p>This was <a
+    href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
+    reported in 2007</a> for XP and Vista, and it seems
+    that Microsoft used the same method to push the <a
+    href="/proprietary/malware-microsoft.html#windows10-forcing">
+    Windows 10 downgrade</a> to computers running Windows 7 and 8.</p>
+
+    <p>In Windows 10, the universal back door
+    is no longer hidden; all &ldquo;upgrades&rdquo; will be <a
+    
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>
+    forcibly and immediately imposed</a>.</p>
+  </li>
+
+  <li id="M201512280">
+    <p>Microsoft has <a
+    
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+    backdoored its disk encryption</a>.</p>
+  </li>
+
+  <li id="M201308230">
+    <p>The German government <a
+    
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>veers
+    away from Windows 8 computers with TPM 2.0</a>, due to potential back
+    door capabilities of the TPM 2.0 chip.</p>
+  </li>
 
-  <p>In Windows 10, the universal back door is no longer hidden; all 
&ldquo;upgrades&rdquo; will be
-  <a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>forcibly
 and immediately imposed</a>.</p></li>
+  <li id="M201307300">
+    <p>Here is a suspicion that
+    we can't prove, but is worth thinking about: <a
+    
href="https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>
+    Writable microcode for Intel and AMD microprocessors</a> may be a
+    vehicle for the NSA to invade computers, with the help of Microsoft,
+    say respected security experts.</p>
+  </li>
 
-  <li><p><a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
-  Windows 8 also has a back door for remotely deleting apps</a>.</p>
+  <li id="M201112081">
+    <p>Windows 8 also has a back door for <a
+    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
+    remotely deleting apps</a>.</p>
 
   <p>You might well decide to let a security service that you trust
   remotely <em>deactivate</em> programs that it considers malicious.
   But there is no excuse for <em>deleting</em> the programs, and you
-  should have the right to decide who (if anyone) to trust in this 
way.</p></li>
-
-  <li><p>German government <a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>veers
-      away from Windows 8 computers with TPM 2.0 due to potential back
-      door capabilities of the TPM 2.0 chip</a>.</p>
+    should have the right to decide whom (if anyone) to trust in this
+    way.</p>
   </li>
+</ul>
 
-<li id="windows7-back-door"><p>Users reported that <a 
-    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
-    Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
-    Windows 10</a>.</p>
-
-    <p>Microsoft was in fact <a 
-    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
-    attacking computers that run Windows 7 and 8</a>, switching on a flag 
-    that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
-    had turned it off.</p>
-
-    <p>Later on, Microsoft published instructions on <a 
-    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/";>
-    how to permanently reject the downgrade to Windows 10</a>.</p>
 
-    <p>This seems to involve use of a back door in Windows 7 and 8.</p>
-</li>
+<h3 id="drm">Microsoft DRM</h3>
 
+<ul class="blurbs">
+  <li id="M200708131">
+    <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
+    in Windows</a>, introduced to cater to <a
+    href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks. 
+    (The article talks about how the same malware would later be
+    introduced in MacOS.  That had not been done at the time, but it was
+    done subsequently.)</p>
+  </li>
 </ul>
 
+
 <h3 id="insecurity">Microsoft Insecurity</h3>
 
 <p>These bugs are/were not intentional, so unlike the rest of the file
@@ -111,28 +143,109 @@
   supposition that prestigious proprietary software doesn't have grave
   bugs.</p>
 
-<ul>
-
-<li>
+<ul class="blurbs">
+  <li id="M201705120">
   <p>Exploits of bugs in Windows, which were developed by the NSA
-       and then leaked by the Shadowbrokers group, are now being used to
-       <a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>attack
 a great number
-       of Windows computers with ransomware</a>.
-       </p>
-</li>
-
-    <li><p>A <a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>flaw
 in Internet Explorer and Edge</a>
-    allows an attacker to retrieve Microsoft account credentials, if
-    the user is tricked into visiting a malicious link.</p>
-    </li>
-<li>
-<p><a 
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
-Point-of-sale terminals running Windows were taken over and turned
-into a botnet for the purpose of collecting customers' credit card
-numbers</a>.
-</p>
-</li>
+    and then leaked by the Shadowbrokers group, are now being used to <a
+    
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>attack
+    a great number of Windows computers with ransomware</a>.</p>
+  </li>
+
+  <li id="M201608020">
+    <p>A <a
+    
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>flaw
+    in Internet Explorer and Edge</a> allows an attacker to retrieve
+    Microsoft account credentials, if the user is tricked into visiting
+    a malicious link.</p>
+  </li>
+
+  <li id="M201312040">
+    <p><a
+    
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
+    Point-of-sale terminals running Windows were taken over</a> and
+    turned into a botnet for the purpose of collecting customers' credit
+    card numbers.</p>
+  </li>
+</ul>
+
+
+<h3 id="interference">Microsoft Interference</h3>
+
+<p>Various proprietary programs often mess up the user's system. They
+are like sabotage, but they are not grave enough to qualify for the word
+&ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This
+section describes examples of Microsoft committing interference.</p>
+
+<ul class="blurbs">
+  <li id="M201809120">
+    <p>One version of Windows 10 <a
+    
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
+    harangues users if they try to install Firefox (or Chrome)</a>.</p>
+  </li>
 
+  <li id="M201803190">
+    <p>Microsoft is planning to make Windows <a
+    
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox";>
+    impose use of its browser, Edge, in certain circumstances</a>.</p>
+
+    <p>The reason Microsoft can force things on users is that Windows
+    is nonfree.</p>
+  </li>
+
+  <li id="M201703170">
+    <p>Windows displays <a
+    
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
+    intrusive ads for Microsoft products and its partners'
+    products</a>.</p>
+
+    <p>The article's author starts from the premise that Microsoft has
+    a right to control what Windows does to users, as long as it doesn't
+    go &ldquo;too far&rdquo;. We disagree.</p>
+  </li>
+
+  <li id="M201608170">
+    <p> After <a 
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the 
download of Windows 10</a>
+    on computers that were running Windows 7 and 8, Microsoft <a
+    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
+    repeatedly switched on a flag that urged users to
+    &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned
+    it off, in the hope that some day they would fail to say no.
+    To do this, Microsoft used <a
+    
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
+    malware techniques</a>.</p>
+
+    <p>A detailed <a
+    
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+    analysis of Microsoft's scheme</a> is available on the Electronic
+    Frontier Foundation's website.</p>
+  </li>
+
+  <li id="M201603090">
+    <p>Microsoft has made companies'
+    Windows machines managed by the company's sysadmins <a
+    
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>harangue
+    users to complain to the sysadmins about not &ldquo;upgrading&rdquo;
+    to Windows 10</a>.</p>
+  </li>
+
+  <li id="M201601160">
+    <p>Microsoft has <a
+    
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>desupported
+    all future Intel CPUs for Windows 7 and 8</a>. Those
+    machines will be stuck with the nastier Windows 10.  <a
+    
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
+    AMD and Qualcomm CPUs, too</a>.</p>
+
+    <p>Of course, Windows 7 and 8 are unethical too, because they are
+    proprietary software.  But this example of Microsoft's wielding its
+    power demonstrates the power it holds.</p>
+
+    <p>Free software developers also stop maintaining old versions of
+    their programs, but this is not unfair to users because the users of
+    free software have control over it.  If it is important enough to you,
+    you and other users can hire someone to support the old version on
+    your future platforms.</p>
+  </li>
 </ul>
 
 
@@ -141,316 +254,300 @@
 <p>The wrongs in this section are not precisely malware, since they do
 not involve making the program that runs in a way that hurts the user.
 But they are a lot like malware, since they are technical Microsoft
-actions that harm to the users of specific Microsoft software.</p>
+actions that harm the users of specific Microsoft software.</p>
 
-<ul>
-  <li><p> Microsoft
-      <a 
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/";>
+<ul class="blurbs">
+  <li id="M201704194">
+    <p>Microsoft has made Windows 7
+    and 8 cease to function on certain new computers, <a
+    
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>effectively
+    forcing their owners to switch to Windows 10</a>.</p>
+  </li>
+
+  <li id="M201704134">
+    <p>Microsoft <a
+    
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/";>
        has dropped support for Windows 7 and 8 on recent processors</a>
       in a big hurry.</p>
+
     <p>It makes no difference what legitimate reasons Microsoft might
-      have for not doing work to support them. If it doesn't want to
-      do this work, it should let users do the work.</p>
+    have for not doing work to support them. If it doesn't want to do
+    this work, it should let users do the work.</p>
   </li>
 
-  <li>
-    <p>Microsoft has made Windows 7 and 8 cease to function on certain
-      new computers,
-      <a 
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>effectively
-      forcing their owners to switch to Windows 10</a>.</p>
+  <li id="M201606270">
+    <p id="windows10-forcing">In its efforts to trick users of Windows
+    7 and 8 into installing all-spying Windows 10 against their
+    will, Microsoft forced their computers to <a
+    
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
+    silently download&hellip; the whole of Windows 10</a>! Apparently,
+    this was done through a <a
+    href="/proprietary/proprietary-back-doors.html#windows-update">
+    universal back door</a>. Not only did the unwanted downloads <a
+    
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>
+    jeopardize important operations in regions of the world with poor
+    connectivity</a>, but many of the people who let installation proceed
+    found out that this &ldquo;upgrade&rdquo; was in fact a <a
+    
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
+    downgrade</a>.</p>
   </li>
 
-  <li><p>Once Microsoft has tricked a user into accepting installation
-   of Windows
-   10, <a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>they
+  <li id="M201606010">
+    <p>Once Microsoft has tricked a user
+    into accepting installation of Windows 10, <a
+    
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>they
    find that they are denied the option to cancel or even postpone the
-   imposed date of installation</a>.
-   </p>
+    imposed date of installation</a>.</p>
+
    <p>This demonstrates what we've said for years: using proprietary
-   software means letting someone have power over you, and you're
-   going to get screwed sooner or later.</p></li>
+    software means letting someone have power over you, and you're going
+    to get screwed sooner or later.</p>
+  </li>
 
-  <li><p>Microsoft
-  has <a 
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>desupported
-  all future Intel CPUs for Windows 7 and 8</a>. Those machines will
-  be stuck with the nastier Windows 10.
-  <a 
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
-  AMD and Qualcomm CPUs, too</a>.
-  </p>
-  <p>Of course, Windows 7 and 8 are unethical too, because they are
-  proprietary software.  But this example of Microsoft's wielding its
-  power demonstrates the power it holds.
-  </p>
-  <p>Free software developers also stop maintaining old versions of
-  their programs, but this is not unfair to users because the
-  users of free software have control over it.  If it is important
-  enough to you, you and other users can hire someone to support
-  the old version on your future platforms.
-  </p></li>
-
-  <li><p>Microsoft
-    is <a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
-    forcibly pushing Windows
-    update to its version 10</a>, ignoring the flag on Windows 7 or 8
-    that you could set to not upgrade.  This reaffirms the presence of
-    a <a href="/proprietary/proprietary-back-doors.html">universal
-    back door in Windows</a> 7 and 8.</p></li>
+  <li id="M201601310">
+    <p>FTDI's proprietary driver
+    for its USB-to-serial chips has been designed to <a
+    
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/";>sabotage
+    alternative compatible chips</a>
+    so that they no longer work. Microsoft is <a
+    
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again";>installing
+    this automatically</a> as an &ldquo;upgrade&rdquo;.</p>
+  </li>
 
-  <li><p>Windows 10 &ldquo;upgrades&rdquo; <a
+  <li id="M201511240">
+    <p>Windows 10 &ldquo;upgrades&rdquo; <a
       
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>
-      delete applications</a> without asking permission.</p></li>
+    delete applications</a> without asking permission.</p>
+  </li>
 
-  <li><p>
-  Microsoft is <a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
-  repeatedly nagging many users to install Windows 10</a>.
-  </p></li>
-
-<li><p>
-Microsoft was for months <a
-href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update";>
-tricking users into &ldquo;upgrading&rdquo; to Windows 10</a>, if they
-failed to notice and say no.
-</p></li>
-
-  <li><p><a
-href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
-  Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
-
-  <li><p><a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>
-  Microsoft cut off security fixes for Windows XP, except to some big users
-  that pay exorbitantly.</a></p>
-
-  <p>Microsoft is going to
-  <a 
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/";>
-  cut off support for some Internet Explorer versions</a> in the same way.</p>
-
-  <p>A person or company has the right to cease to work on a
-  particular program; the wrong here is Microsoft does this after having
-  made the users dependent on Microsoft, because they are not free to ask
-  anyone else to work on the program for them.</p></li>
-</ul>
+  <li id="M201503260">
+    <p><a
+    
href="https://www.computerworlduk.com/it-business/windows-xp-end-of-an-era-end-of-an-error-3569489/";>Microsoft
+    cut off security fixes for Windows XP, except to some big users that
+    pay exorbitantly</a>.</p>
+
+    <p>Microsoft is going to <a
+    
href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/";>
+    cut off support for some Internet Explorer versions</a> in the same
+    way.</p>
+
+    <p>A person or company has the right to cease to work on a particular
+    program; the wrong here is Microsoft does this after having made the
+    users dependent on Microsoft, because they are not free to ask anyone
+    else to work on the program for them.</p>
+  </li>
 
-<h3 id="interference">Microsoft Interference</h3>
+  <li id="M201306220">
+    <p><a
+    
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
+    informs the NSA of bugs in Windows before fixing them</a>.</p>
+  </li>
+</ul>
 
-<p>Various proprietary programs often mess up the user's system. They are like 
sabotage, but they are not grave enough to qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
-interference.</p>
 
-<ul>
-  <li><p>Microsoft is planning to make Windows <a
-      
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox";>
-      impose use of its browser, Edge, in certain circumstances</a>.</p>
-    <p>The reason Microsoft can force things on users is that Windows is
-      nonfree.</p></li>
+<h3 id="subscriptions">Microsoft Subscriptions</h3>
 
-  <li><p>Windows displays
-      <a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
-       intrusive ads for Microsoft products and its
-       partners' products</a>.</p>
-    <p>The article's author starts from the premise that Microsoft
-      has a right to control what Windows does to users, as long as it
-      doesn't go &ldquo;too far&rdquo;. We disagree.</p></li>
-  
-  <li><p>Microsoft inserts <a
-href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts";>
-      annoying advertisements inside of the File Explorer</a> to nag
-      users to buy subscriptions for the OneDrive service.</p></li>
-
-<li>In order to increase Windows 10's install base, Microsoft
-<a
-href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
-blatantly disregards user choice and privacy</a>.
-</li>
-
-<li><p>Microsoft has
-started <a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder";>nagging
-users obnoxiously and repeatedly to install Windows 10</a>.</p></li>
-
-  <li><p>Microsoft
-      <a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml";>is
-        tricking
-        users</a> <a
-href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
-into replacing Windows 7 with Windows 10</a>.</p></li>
-
-  <li><p>Microsoft has made companies' Windows machines managed by the
-company's
-sysadmins <a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>harangue
-users to complain to the sysadmins about not &ldquo;upgrading&rdquo; to Windows
-10</a>.</p></li>
+<ul class="blurbs">
+  <li id="M201507150">
+    <p>Microsoft Office forces users <a
+    
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
+    subscribe to Office 365 to be able to create/edit documents</a>.</p>
+  </li>
 </ul>
 
-<h3 id="surveillance">Microsoft Surveillance</h3>
-
-<ul>
 
-<li><p>Windows 10 telemetry program sends information to Microsoft about the
-user's computer and their use of the computer.</p>
+<h3 id="surveillance">Microsoft Surveillance</h3>
 
-<p>Furthermore, for users who installed the fourth stable build of
-Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the
-surveillance <a
-href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
+<ul class="blurbs">
+  <li id="M201710134">
+    <p>Windows 10 telemetry program sends information to Microsoft about
+    the user's computer and their use of the computer.</p>
+
+    <p>Furthermore, for users who installed the
+    fourth stable build of Windows 10, called the
+    &ldquo;Creators Update,&rdquo; Windows maximized the surveillance <a
+    
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
     by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p>
 
-<p>The <a
-href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level";>
+    <p>The <a
+    
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level";>
  &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows
- engineers to access, among other things, registry keys
- <a href="https://technet.microsoft.com/en-us/library/cc939702.aspx";>which
+    engineers to access, among other things, registry keys <a
+    href="https://technet.microsoft.com/en-us/library/cc939702.aspx";>which
  can contain sensitive information like administrator's login
- password</a>.</p></li>
+    password</a>.</p>
+  </li>
 
-<li><p>Windows DRM
-files <a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>can
-be used to identify people browsing through Tor</a>. The vulnerability
-exists only if you use Windows.
-</p></li>
-
-<li><p>By default, Windows 10 <a 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties";>sends
-debugging information to Microsoft, including core dumps</a>. Microsoft
-now distributes them to another company.</p></li>
-
-<li>It appears <a
-href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/";>
-Windows 10 sends data to Microsoft about what applications are 
-running</a>.</li>
-
-<li><p>A downgrade to Windows 10 deleted surveillance-detection
-applications.  Then another downgrade inserted a general spying
-program.  Users noticed this and complained, so Microsoft
-renamed it <a
-href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
-to give users the impression it was gone</a>.</p>
-
-<p>To use proprietary software is to invite such treatment.</p></li>
-
-  <li><p>
-  <a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>
-  Windows 10 comes with 13 screens of snooping options</a>, all enabled by 
default,
-  and turning them off would be daunting to most users.</p></li>
-
-  <li><p>
-  Windows 10 <a 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
-  ships with default settings that show no regard for the
-  privacy of its users</a>, giving Microsoft the &ldquo;right&rdquo;
-  to snoop on the users' files, text input, voice input,
-  location info, contacts, calendar records and web browsing
-  history, as well as automatically connecting the machines to open
-  hotspots and showing targeted ads.</p>
-
-  <p>We can suppose Microsoft look at users' files for the US government on
-  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
-  look at users' files for the Chinese government on demand?</p></li>
-
-  <li><p>
-  <a 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>
-  Windows 10 sends identifiable information to Microsoft</a>, even if a user
-  turns off its Bing search and Cortana features, and activates the
-  privacy-protection settings.</p></li>
-
-  <li><p>The unique &ldquo;advertising ID&rdquo; for each user enables other 
companies to
-  track the browsing of each specific user.</p></li>
-
-  <li>Spyware in Windows 8: <a 
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
-  Windows Update snoops on the user.</a>
-  <a 
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
-  Windows 8.1 snoops on local searches.</a> And there's a
-  <a href="http://www.marketoracle.co.uk/Article40836.html";>
-  secret NSA key in Windows</a>, whose functions we don't know.</li>
-
-  <li><p>
-  <a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
-  Microsoft SkyDrive allows the NSA to directly examine users' data.</a></p>
-  </li>
-
-  <li><p>Spyware in Skype:
-      <a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
-      Microsoft changed Skype
-      <a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
-      specifically for spying</a>.</p>
+  <li id="M201702020">
+    <p>DRM-restricted files can be used to <a
+    
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>
+    identify people browsing through Tor</a>. The vulnerability exists
+    only if you use Windows.</p>
+  </li>
+
+  <li id="M201611240">
+    <p>By default, Windows 10 <a
+    
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties";>sends
+    debugging information to Microsoft, including core dumps</a>. Microsoft
+    now distributes them to another company.</p>
+  </li>
+
+  <li id="M201608171">
+    <p>In order to increase Windows 10's install base, Microsoft <a
+    
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+    blatantly disregards user choice and privacy</a>.</p>
+  </li>
+
+  <li id="M201603170">
+    <p><a
+    
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>
+    Windows 10 comes with 13 screens of snooping options</a>, all enabled
+    by default, and turning them off would be daunting to most users.</p>
+  </li>
+
+  <li id="M201601050">
+    <p>It appears <a
+    
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/";>
+    Windows 10 sends data to Microsoft about what applications are
+    running</a>.</p>
+  </li>
+
+  <li id="M201511264">
+    <p>A downgrade to Windows 10 deleted surveillance-detection
+    applications.  Then another downgrade inserted a general spying
+    program.  Users noticed this and complained, so Microsoft renamed it <a
+    
href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
+    to give users the impression it was gone</a>.</p>
+
+    <p>To use proprietary software is to invite such treatment.</p>
   </li>
 
-  <li><p>
-  Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose a
-  &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full disk
-  encryption <a 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/";>
+  <li id="M201508130">
+    <p><a
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>
+    Windows 10 sends identifiable information to Microsoft</a>, even if
+    a user turns off its Bing search and Cortana features, and activates
+    the privacy-protection settings.</p>
+  </li>
+
+  <li id="M201507300">
+    <p>Windows 10 <a
+    
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
+    ships with default settings that show no regard for the privacy of
+    its users</a>, giving Microsoft the &ldquo;right&rdquo; to snoop on
+    the users' files, text input, voice input, location info, contacts,
+    calendar records and web browsing history, as well as automatically
+    connecting the machines to open hotspots and showing targeted ads.</p>
+
+    <p>We can suppose Microsoft look at users' files for the US government
+    on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
+    say so. Will it look at users' files for the Chinese government
+    on demand?</p>
+  </li>
+
+  <li id="M201506170">
+    <p>Microsoft uses Windows 10's &ldquo;privacy policy&rdquo;
+    to overtly impose a &ldquo;right&rdquo; to look at
+    users' files at any time. Windows 10 full disk encryption <a
+    
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/";>
   gives Microsoft a key</a>.</p>
 
-  <p>Thus, Windows is overt malware in regard to surveillance,
-  as in other issues.</p>
+    <p>Thus, Windows is overt malware in regard to surveillance, as in
+    other issues.</p>
 
-  <p>We can suppose Microsoft look at users' files for the US government on
-  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
-  look at users' files for the Chinese government on demand?</p>
+    <p>We can suppose Microsoft look at users' files for the US government
+    on demand, though the &ldquo;privacy policy&rdquo; does not explicit
+    say so. Will it look at users' files for the Chinese government
+    on demand?</p>
 
-  <p>The unique &ldquo;advertising ID&rdquo; for each user enables other 
companies to
-  track the browsing of each specific user.</p>
+    <p>The unique &ldquo;advertising ID&rdquo; for each user enables
+    other companies to track the browsing of each specific user.</p>
 
   <p>It's as if Microsoft has deliberately chosen to make Windows 10
   maximally evil on every dimension; to make a grab for total power
-  over anyone that doesn't drop Windows now.</p></li>
+    over anyone that doesn't drop Windows now.</p>
+  </li>
 
-</ul>
+  <li id="M201410040">
+    <p>It only gets worse with time.  <a
+    
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
+    Windows 10 requires users to give permission for total snooping</a>,
+    including their files, their commands, their text input, and their
+    voice input.</p>
+  </li>
 
-<h3 id="drm">Microsoft DRM</h3>
-<ul>
-  <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>
-  DRM (digital restrictions mechanisms) in Windows</a>, introduced to
-  cater to <a href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
-  (The article also talks about how the same malware would later be introduced
-  in MacOS.)</p></li>
+  <li id="M201405140">
+    <p><a
+    
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
+    Microsoft SkyDrive allows the NSA to directly examine users'
+    data</a>.</p>
+  </li>
+
+  <li id="M201307110">
+    <p>Skype contains <a
+    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>spyware</a>.
+    Microsoft changed Skype <a
+    
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
+    specifically for spying</a>.</p>
+  </li>
+
+  <li id="M201307080">
+    <p>Spyware in older versions of Windows: <a
+    href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
+    Windows Update snoops on the user</a>. <a
+    
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
+    Windows 8.1 snoops on local searches</a>. And there's a <a
+    href="http://www.marketoracle.co.uk/Article40836.html";> secret NSA
+    key in Windows</a>, whose functions we don't know.</p>
+  </li>
 </ul>
 
+
 <h3 id="jails">Microsoft Jails</h3>
-<ul>
-  <li>
+
+<ul class="blurbs">
+  <li id="M201706130">
     <p>Windows 10 S was a jail: <a
       
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
-      only programs from the Windows Store could be installed and
-      executed</a>. It was however possible to <a
+    only programs from the Windows Store could be
+    installed and executed</a>. It was however possible to <a
       
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide";>
-      upgrade to Windows 10 Pro</a>. The successor of Windows 10 S is a
-      special configuration of Windows 10 called <a
+    upgrade to Windows 10 Pro</a>. The successor of Windows
+    10 S is a special configuration of Windows 10 called <a
       
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq";>
-      S mode</a>. The major difference with Windows 10 S is that there
-      is an easy way to switch out of S mode.</p></li>
+    S mode</a>. The major difference with Windows 10 S is that there is
+    an easy way to switch out of S mode.</p>
+  </li>
 
-  <li>
-    <p><a 
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
+  <li id="M201210080">
+    <p><a
+    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
       Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
-      jail</a>.</p></li>
+    jail</a>.</p>
+  </li>
 </ul>
 
+
 <h3 id="tyrants">Microsoft Tyrants</h3>
-<ul>
-<li>
-<p>Microsoft accidentally left a way for users to install GNU/Linux
-on Windows RT tablets, but now it has <a
-href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
-    &ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. They have the
-gall to call this &ldquo;protecting&rdquo; the users.  The article
-talks of installing &ldquo;Linux&rdquo;, but the context shows it is
-really <a href="/gnu/linux-and-gnu.html">GNU/Linux</a> that users
-install.
-</p>
-</li>
-  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
-  Mobile devices that come with Windows 8 are tyrants</a>: they block
-  users from installing other or modified operating systems.</p></li>
-</ul>
 
-<h3 id="subscriptions">Microsoft Subscriptions</h3>
+<ul class="blurbs">
+  <li id="M201607150">
+    <p>Microsoft accidentally left a way for users
+    to install GNU/Linux on Windows RT tablets, but now it has <a
+    
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
+    &ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. They have the gall
+    to call this &ldquo;protecting&rdquo; the users.  The article talks
+    of installing &ldquo;Linux&rdquo;, but the context shows it is really
+    <a href="/gnu/linux-and-gnu.html">GNU/Linux</a> that users install.</p>
+  </li>
 
-<ul>
-<li><p>Microsoft Office forces
-      users <a 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
-      subscribe to Office 365 to be able to create/edit
-      documents</a>.</p>
-</li>
+  <li id="M201110110">
+    <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
+    Mobile devices that come with Windows 8 are tyrants</a>.</p>
+  </li>
 </ul>
 
+
 <p>As this page shows, if you do want to clean your computer of malware,
 the first software to delete is Windows.</p>
 
@@ -511,7 +608,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/07/27 10:01:00 $
+$Date: 2018/10/17 12:59:18 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]